CVE-2011-10014
GTA SA-MP server.cfg Buffer Overflow
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
GTA San Andreas Multiplayer (SA-MP) server version 0.3.1.1 is vulnerable to a stack-based buffer overflow triggered by parsing a malformed server.cfg configuration file. The vulnerability allows local attackers to execute arbitrary code when the server binary (samp-server.exe) processes a crafted echo directive containing excessive input. The original 'sa-mp.com' site is defunct, but the community maintains mirrors and forks that may be vulnerable.
| CWE | CWE-121 |
| Vendor | sa-mp team |
| Product | san andreas multiplayer |
| Published | Aug 13, 2025 |
| Last Updated | Apr 7, 2026 |
Stay Ahead of the Next One
Get instant alerts for sa-mp team san andreas multiplayer
Be the first to know when new unknown vulnerabilities affecting sa-mp team san andreas multiplayer are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
SA-MP Team / San Andreas Multiplayer
0.3.1.1
References
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/fileformat/gta_samp.rb exploit-db.com: https://www.exploit-db.com/exploits/17893 exploit-db.com: https://www.exploit-db.com/exploits/18038 vulncheck.com: https://www.vulncheck.com/advisories/gta-sa-mp-buffer-overflow
Credits
Silent_Dream