#VU107879 Stack-based buffer overflow in Active! mail - CVE-2025-42599

 

#VU107879 Stack-based buffer overflow in Active! mail - CVE-2025-42599

Published: April 23, 2025 / Updated: April 23, 2025


Vulnerability identifier: #VU107879
Vulnerability risk: Critical
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Red
CVE-ID: CVE-2025-42599
CWE-ID: CWE-121
Exploitation vector: Remote access
Exploit availability: The vulnerability is being exploited in the wild
Vulnerable software:
Active! mail
Software vendor:
QUALITIA CO., LTD.

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when handling requests. A remote unauthenticated attacker can send a specially crafted request to the server, trigger a stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Note, the vulnerability is being actively exploited in the wild.


Remediation

Install updates from vendor's website.

External links