CVE-2011-10024
HIGHMJM Core Player 2011 - Buffer Overflow
Title source: llmDescription
MJM Core Player (likely now referred to as MJM Player) 2011 is vulnerable to a stack-based buffer overflow when parsing specially crafted .s3m music files. The vulnerability arises from improper bounds checking in the file parser, allowing an attacker to overwrite memory on the stack and execute arbitrary code. Exploitation is triggered when a user opens a malicious .s3m file, and the exploit bypasses DEP and ASLR protections using a ROP chain.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubylocalwindows
https://www.exploit-db.com/exploits/17230
metasploit
WORKING POC
GOOD
by rick2600 · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/fileformat/mjm_coreplayer2011_s3m.rb
References (5)
Scores
CVSS v4
8.4
EPSS
0.0815
EPSS Percentile
92.2%
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-121
Status
published
Products (1)
MJM Software/Core Player
2011
Published
Aug 20, 2025
Tracked Since
Feb 18, 2026