Stack Buffer Overflow CVE-2025-42599 in Active! Mail 6.60.05008561
CVE-2025-42599 Published on April 18, 2025

Active! mail 6 BuildInfo: 6.60.05008561 and earlier contains a stack-based buffer overflow vulnerability. Receiving a specially crafted request created and sent by a remote unauthenticated attacker may lead to arbitrary code execution and/or a denial-of-service (DoS) condition.

NVD

Known Exploited Vulnerability

This Qualitia Active! Mail Stack-Based Buffer Overflow Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Qualitia Active! Mail contains a stack-based buffer overflow vulnerability that allows a remote, unauthenticated attacker to execute arbitrary or trigger a denial-of-service via a specially crafted request.

The following remediation steps are recommended / required by May 19, 2025: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Weakness Type

What is a Stack Overflow Vulnerability?

A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).

CVE-2025-42599 has been classified to as a Stack Overflow vulnerability or weakness.


Products Associated with CVE-2025-42599

Want to know whenever a new CVE is published for Qualitia Active Mail? stack.watch will email you.

 

Affected Versions

QUALITIA CO., LTD. Active! mail 6 Version BuildInfo: 6.60.05008561 and earlier is affected by CVE-2025-42599

Exploit Probability

EPSS
2.76%
Percentile
85.80%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.