Description
A buffer overflow vulnerability exists in Heroes of Might and Magic III Complete 4.0.0.0, HD Mod 3.808 build 9, and Demo 1.0.0.0 via malicious .h3m map files that exploit object sprite name parsing logic. The vulnerability occurs during in-game map loading when a crafted object name causes a buffer overflow, potentially allowing arbitrary code execution. Exploitation requires the victim to open a malicious map file within the game.
Published: 2025-07-16
Score: 8.4 High
EPSS: 12.6% Moderate
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A buffer overflow occurs during the parsing of object sprite names in .h3m map files for Heroes of Might and Magic III. The overflow is triggered by a crafted object name that exceeds the intended buffer size, overwriting control data and potentially allowing execution of arbitrary code within the game process. The weakness aligns with CWE‑121 (Stack‑Based Buffer Overflow), CWE‑20 (Improper Input Validation), and CWE‑94 (Improper Control of Generation of Code). If successfully exploited, an attacker can run arbitrary code with the privileges of the user running the game, compromising confidentiality, integrity, and availability of the host system.

Affected Systems

The vulnerability applies to 3DO Company’s Heroes of Might and Magic III, specifically the Complete 4.0.0.0 release, HD Mod 3.808 build 9, and the Demo 1.0.0.0 build. All affected versions parse .h3m files in the same manner that triggers the overflow, so any installation of these builds is vulnerable. No other vendors, products, firmware, or external devices are impacted.

Risk and Exploitability

The CVSS score of 8.4 classifies this issue as high severity. An EPSS score of 13% indicates a moderate likelihood of exploitation in the wild. The vulnerability is currently not listed in the CISA KEV catalog, but the existence of a public Metasploit module and Exploit‑DB references shows that attackers can weaponize the flaw. Exploitation requires a victim to launch the game and open a malicious map file, so the attack vector is primarily local or file‑based; it can be triggered by social engineering or malicious downloads.

Generated by OpenCVE AI on April 28, 2026 at 01:03 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to an official patch or newer version of Heroes of Might and Magic III that removes the defective object sprite name parsing logic.
  • Avoid opening .h3m files from untrusted or unknown sources; treat any downloaded map files as potentially malicious.
  • Implement endpoint protection or application whitelisting to block execution of the game when it attempts to parse suspicious map files.

Generated by OpenCVE AI on April 28, 2026 at 01:03 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-21747 A buffer overflow vulnerability exists in Heroes of Might and Magic III Complete 4.0.0.0, HD Mod 3.808 build 9, and Demo 1.0.0.0 via malicious .h3m map files that exploit object sprite name parsing logic. The vulnerability occurs during in-game map loading when a crafted object name causes a buffer overflow, potentially allowing arbitrary code execution. Exploitation requires the victim to open a malicious map file within the game.
History

Thu, 17 Jul 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 16 Jul 2025 21:30:00 +0000

Type Values Removed Values Added
Description A buffer overflow vulnerability exists in Heroes of Might and Magic III Complete 4.0.0.0, HD Mod 3.808 build 9, and Demo 1.0.0.0 via malicious .h3m map files that exploit object sprite name parsing logic. The vulnerability occurs during in-game map loading when a crafted object name causes a buffer overflow, potentially allowing arbitrary code execution. Exploitation requires the victim to open a malicious map file within the game.
Title Heroes of Might and Magic III .h3m Map File Buffer Overflow
Weaknesses CWE-121
CWE-20
CWE-94
References
Metrics cvssV4_0

{'score': 8.4, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-07T14:09:44.406Z

Reserved: 2025-04-15T19:15:22.561Z

Link: CVE-2025-34124

cve-icon Vulnrichment

Updated: 2025-07-17T19:39:38.351Z

cve-icon NVD

Status : Deferred

Published: 2025-07-16T22:15:23.840

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-34124

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T01:15:15Z

Weaknesses