CVE-2025-34124
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-16

Last updated on: 2025-07-17

Assigner: VulnCheck

Description
A buffer overflow vulnerability exists in Heroes of Might and Magic III Complete 4.0.0.0, HD Mod 3.808 build 9, and Demo 1.0.0.0 via malicious .h3m map files that exploit object sprite name parsing logic. The vulnerability occurs during in-game map loading when a crafted object name causes a buffer overflow, potentially allowing arbitrary code execution. Exploitation requires the victim to open a malicious map file within the game.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-16
Last Modified
2025-07-17
Generated
2026-05-07
AI Q&A
2025-07-17
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
heroes_of_might_and_magic iii_complete 4.0.0.0
heroes_of_might_and_magic hd_mod 3.808
heroes_of_might_and_magic demo 1.0.0.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-20 The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
CWE-94 The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
CWE-121 A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a buffer overflow in Heroes of Might and Magic III Complete and related versions caused by malicious .h3m map files. It happens when the game loads a crafted map file with an object name that triggers the overflow in the sprite name parsing logic, potentially allowing an attacker to execute arbitrary code. Exploitation requires the victim to open the malicious map file within the game.


How can this vulnerability impact me? :

If exploited, this vulnerability can allow an attacker to execute arbitrary code on your system when you open a malicious map file in the game. This could lead to unauthorized actions such as installing malware, stealing data, or taking control of your device.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, avoid opening untrusted or suspicious .h3m map files in Heroes of Might and Magic III Complete and related versions until a patch or update is released. Ensure that your game software is updated to the latest version provided by the vendor that addresses this issue. Additionally, consider restricting access to map files from unverified sources.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart