Active! mail 6 BuildInfo: 6.60.05008561 and earlier contains a stack-based buffer overflow vulnerability. Receiving a specially crafted request created and sent by a remote unauthenticated attacker may lead to arbitrary code execution and/or a denial-of-service (DoS) condition.
History

Fri, 18 Apr 2025 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 18 Apr 2025 04:00:00 +0000

Type Values Removed Values Added
Description Active! mail 6 BuildInfo: 6.60.05008561 and earlier contains a stack-based buffer overflow vulnerability. Receiving a specially crafted request created and sent by a remote unauthenticated attacker may lead to arbitrary code execution and/or a denial-of-service (DoS) condition.
Weaknesses CWE-121
References
Metrics cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published:

Updated: 2025-04-18T12:01:16.676Z

Reserved: 2025-04-16T11:57:12.046Z

Link: CVE-2025-42599

cve-icon Vulnrichment

Updated: 2025-04-18T11:49:53.381Z

cve-icon NVD

Status : Received

Published: 2025-04-18T04:15:30.557

Modified: 2025-04-18T04:15:30.557

Link: CVE-2025-42599

cve-icon Redhat

No data.