Home

Description

Magix Musik Maker 16 is vulnerable to a stack-based buffer overflow due to improper handling of .mmm arrangement files. The vulnerability arises from an unsafe strcpy() operation that fails to validate input length, allowing attackers to overwrite the Structured Exception Handler (SEH). By crafting a malicious .mmm file, an attacker can trigger the overflow when the file is opened, potentially leading to arbitrary code execution. This vulnerability was remediated in version 17.

PUBLISHED Reserved 2025-08-18 | Published 2025-08-20 | Updated 2025-08-22 | Assigner VulnCheck




HIGH: 8.4CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-121: Stack-based Buffer Overflow

Product status

Default status
unaffected

*
affected

Credits

acidgen finder

References

raw.githubusercontent.com/...rmat/magix_musikmaker_16_mmm.rb exploit

www.exploit-db.com/exploits/17329 exploit

www.exploit-db.com/exploits/17313 exploit

www.magix.com/us/music-editing/music-maker/ product

www.darkreading.com/...ith-threat-of-german-anti-hacking-law media-coverage

web.archive.org/...gix-music-maker-16-stack-buffer-overflow/ technical-description exploit patch

www.vulncheck.com/...musik-maker-stack-based-buffer-overflow third-party-advisory

cve.org (CVE-2011-10021)

nvd.nist.gov (CVE-2011-10021)

Download JSON