Stack-Based Buffer Overflow in Active! mail by Qualitia
CVE-2025-42599

9.8CRITICAL

Key Information:

Vendor
Qualitia Co., Ltd.
Status
Active! Mail 6
Vendor
CVE Published:
18 April 2025

Badges

πŸ”₯ Trending nowπŸ“ˆ TrendedπŸ“ˆ Score: 9,240

What is CVE-2025-42599?

CVE-2025-42599 is a vulnerability identified in Active! mail, a product developed by Qualitia Co., Ltd. Designed for email management, Active! mail is utilized by organizations to streamline communication processes. The vulnerability involves a stack-based buffer overflow, which could allow remote, unauthenticated attackers to exploit the system. If successfully executed, this could result in severe repercussions for organizations, including arbitrary code execution or denial-of-service (DoS) conditions, compromising the integrity and availability of email services vital for business operations.

Technical Details

CVE-2025-42599 specifically affects Active! mail versions 6 BuildInfo: 6.60.05008561 and earlier. The vulnerability arises when the application processes specially crafted requests sent by an attacker. Due to the nature of the buffer overflow, the application could overwrite critical areas in memory, leading to unexpected behavior. This could enable attackers to execute arbitrary code, manipulate data, or cause service interruptions.

Potential impact of CVE-2025-42599

  1. Arbitrary Code Execution: Attackers could leverage the vulnerability to run unauthorized commands, potentially leading to full system compromise, data exfiltration, or the installation of malicious software.

  2. Denial of Service (DoS): The exploitation of this vulnerability could result in service disruptions, rendering the email system inoperable. This could severely impact organizational communication and productivity.

  3. Data Integrity Risks: The ability to execute arbitrary code may allow attackers to alter, delete, or corrupt data handled by the Active! mail system, posing significant risks to data integrity and compliance with regulatory requirements.

Affected Version(s)

Active! mail 6 BuildInfo: 6.60.05008561 and earlier

References

CVSS V3.0

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • πŸ“ˆ

    Vulnerability started trending

  • Vulnerability published

  • Vulnerability Reserved

.