MJM QuickPlayer (likely now referred to as MJM Player) version 2010 contains a stack-based buffer overflow vulnerability triggered by opening a malicious .s3m music file. The flaw occurs due to improper bounds checking in the file parser, allowing an attacker to overwrite memory and execute arbitrary code. Exploitation is achieved via a crafted payload that bypasses DEP and ASLR protections using ROP techniques, and requires user interaction to open the file.
Metrics
Affected Vendors & Products
References
History
Wed, 20 Aug 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | MJM QuickPlayer (likely now referred to as MJM Player) version 2010 contains a stack-based buffer overflow vulnerability triggered by opening a malicious .s3m music file. The flaw occurs due to improper bounds checking in the file parser, allowing an attacker to overwrite memory and execute arbitrary code. Exploitation is achieved via a crafted payload that bypasses DEP and ASLR protections using ROP techniques, and requires user interaction to open the file. | |
Title | MJM QuickPlayer <= 2010 .s3m Stack-Based Buffer Overflow | |
Weaknesses | CWE-121 | |
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-08-20T15:37:52.354Z
Updated: 2025-08-20T15:37:52.354Z
Reserved: 2025-08-18T19:15:31.498Z
Link: CVE-2011-10023

No data.

Status : Received
Published: 2025-08-20T16:15:34.870
Modified: 2025-08-20T16:15:34.870
Link: CVE-2011-10023

No data.