MJM QuickPlayer (likely now referred to as MJM Player) version 2010 contains a stack-based buffer overflow vulnerability triggered by opening a malicious .s3m music file. The flaw occurs due to improper bounds checking in the file parser, allowing an attacker to overwrite memory and execute arbitrary code. Exploitation is achieved via a crafted payload that bypasses DEP and ASLR protections using ROP techniques, and requires user interaction to open the file.
Metrics
Affected Vendors & Products
References
History
Fri, 22 Aug 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 20 Aug 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | MJM QuickPlayer (likely now referred to as MJM Player) version 2010 contains a stack-based buffer overflow vulnerability triggered by opening a malicious .s3m music file. The flaw occurs due to improper bounds checking in the file parser, allowing an attacker to overwrite memory and execute arbitrary code. Exploitation is achieved via a crafted payload that bypasses DEP and ASLR protections using ROP techniques, and requires user interaction to open the file. | |
Title | MJM QuickPlayer <= 2010 .s3m Stack-Based Buffer Overflow | |
Weaknesses | CWE-121 | |
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-08-22T16:13:23.600Z
Reserved: 2025-08-18T19:15:31.498Z
Link: CVE-2011-10023

Updated: 2025-08-22T16:13:15.502Z

Status : Awaiting Analysis
Published: 2025-08-20T16:15:34.870
Modified: 2025-08-22T18:09:17.710
Link: CVE-2011-10023

No data.

No data.