Stack Buffer Overflow CVE-2025-42599 in Active! Mail 6.60.05008561
CVE-2025-42599 Published on April 18, 2025
Active! mail 6 BuildInfo: 6.60.05008561 and earlier contains a stack-based buffer overflow vulnerability. Receiving a specially crafted request created and sent by a remote unauthenticated attacker may lead to arbitrary code execution and/or a denial-of-service (DoS) condition.
Known Exploited Vulnerability
This Qualitia Active! Mail Stack-Based Buffer Overflow Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Qualitia Active! Mail contains a stack-based buffer overflow vulnerability that allows a remote, unauthenticated attacker to execute arbitrary or trigger a denial-of-service via a specially crafted request.
The following remediation steps are recommended / required by May 19, 2025: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Weakness Type
What is a Stack Overflow Vulnerability?
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
CVE-2025-42599 has been classified to as a Stack Overflow vulnerability or weakness.
Products Associated with CVE-2025-42599
Want to know whenever a new CVE is published for Qualitia Active Mail? stack.watch will email you.
Affected Versions
QUALITIA CO., LTD. Active! mail 6 Version BuildInfo: 6.60.05008561 and earlier is affected by CVE-2025-42599Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.