CVE-2025-42599
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Description
Active! mail 6 BuildInfo: 6.60.05008561 and earlier contains a stack-based buffer overflow vulnerability. Receiving a specially crafted request created and sent by a remote unauthenticated attacker may lead to arbitrary code execution and/or a denial-of-service (DoS) condition.
Analysis
Active! mail 6 contains a stack-based buffer overflow allowing unauthenticated remote code execution and denial of service through crafted requests, exploited in attacks against Japanese organizations in April 2025.
Technical Context
The CWE-121 stack overflow in Active! mail's request processing allows crafted requests to overflow a stack buffer, enabling arbitrary code execution on the mail server.
Affected Products
['Active! mail 6 BuildInfo: 6.60.05008561 and earlier']
Remediation
Apply vendor patches. Restrict access to the Active! mail web interface. Monitor for unauthorized access to email data.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today