vendor:
Snes9K
by:
Abdullah Aliç
7.5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: Snes9K
Affected Version From: 0.0.9z
Affected Version To: 0.0.9z
Patch Exists: NO
Related CWE:
CPE: a:snes9k_project:snes9k:0.0.9z
Platforms Tested: Windows XP Professional sp3(ENG)
2018
Snes9K 0.0.9z – Buffer Overflow (SEH)
This exploit takes advantage of a buffer overflow vulnerability in Snes9K version 0.0.9z. By pasting the contents of boom.txt into the Socket Port Number field under Netplay -> Options, an attacker can connect to the victim machine on port 4444. The exploit payload is a windows/shell_bind_tcp payload generated using msfvenom.
Mitigation:
Update to a patched version of Snes9K or use alternative emulation software.