Home

Description

GTA San Andreas Multiplayer (SA-MP) server version 0.3.1.1 is vulnerable to a stack-based buffer overflow triggered by parsing a malformed server.cfg configuration file. The vulnerability allows local attackers to execute arbitrary code when the server binary (samp-server.exe) processes a crafted echo directive containing excessive input. The original 'sa-mp.com' site is defunct, but the community maintains mirrors and forks that may be vulnerable.

PUBLISHED Reserved 2025-08-12 | Published 2025-08-13 | Updated 2025-08-14 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Problem types

CWE-121 Stack-based Buffer Overflow

Product status

Default status
unknown

0.3.1.1
affected

Credits

Silent_Dream finder

References

raw.githubusercontent.com/.../windows/fileformat/gta_samp.rb exploit

www.exploit-db.com/exploits/17893 exploit

www.exploit-db.com/exploits/18038 exploit

www.vulncheck.com/advisories/gta-sa-mp-buffer-overflow third-party-advisory

cve.org (CVE-2011-10014)

nvd.nist.gov (CVE-2011-10014)

Download JSON