Impact
Snes9K 0.0.9z contains a buffer overflow in the Netplay Socket Port Number field. A local attacker can enter a crafted payload through the Netplay Options menu, overwriting a structured exception handler and gaining arbitrary code execution on the system. The flaw directly compromises the confidentiality, integrity, and availability of the host where the emulator runs.
Affected Systems
The vulnerability affects the Sourceforge Snes9K emulator version 0.0.9z. No other versions or products are listed as affected.
Risk and Exploitability
With a CVSS score of 8.6, the flaw is considered high severity. The EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog, suggesting limited known exploitation but still posing a significant risk. The exploit requires local access to the machine running Snes9K and the attacker must launch the Netplay Options dialog to inject the overflow. Because it achieves code execution through SEH chain exploitation, a determined adversary could gain full control of the targeted system.
OpenCVE Enrichment