Active! mail 6 BuildInfo: 6.60.05008561 and earlier contains a stack-based buffer overflow vulnerability. Receiving a specially crafted request created and sent by a remote unauthenticated attacker may lead to arbitrary code execution and/or a denial-of-service (DoS) condition.
References
Link | Resource |
---|---|
https://jvn.jp/en/jp/JVN22348866/ | Third Party Advisory |
https://www.qualitia.com/jp/news/2025/04/18_1030.html | Vendor Advisory |
Configurations
History
29 Apr 2025, 19:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://jvn.jp/en/jp/JVN22348866/ - Third Party Advisory | |
References | () https://www.qualitia.com/jp/news/2025/04/18_1030.html - Vendor Advisory | |
CPE | cpe:2.3:a:qualitia:active\!_mail:*:*:*:*:*:*:*:* | |
First Time |
Qualitia
Qualitia active\! Mail |
29 Apr 2025, 01:00
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
18 Apr 2025, 04:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-18 04:15
Updated : 2025-04-29 19:46
NVD link : CVE-2025-42599
Mitre link : CVE-2025-42599
CVE.ORG link : CVE-2025-42599
JSON object : View
Products Affected
qualitia
- active\!_mail
CWE
CWE-121
Stack-based Buffer Overflow