Description
Snes9K 0.0.9z contains a buffer overflow vulnerability in the Netplay Socket Port Number field that allows local attackers to trigger a structured exception handler (SEH) overwrite. Attackers can craft a malicious payload and paste it into the Socket Port Number field via the Netplay Options menu to achieve code execution through SEH chain exploitation.
Problem types
Product status
Credits
Abdullah Alıç
References
www.exploit-db.com/exploits/45598 (ExploitDB-45598)
sourceforge.net/projects/snes9k/ (Official Product Homepage)
sourceforge.net/projects/snes9k/files/latest/download (Product Reference)
www.vulncheck.com/...-buffer-overflow-seh-via-netplay-socket (VulnCheck Advisory: Snes9K 0.0.9z Buffer Overflow SEH via Netplay Socket)