JVN#22348866
        Active! mail vulnerable to stack-based buffer overflow
                Critical
              
      
      Overview
Active! mail provided by QUALITIA CO., LTD. contains a stack-based buffer overflow vulnerability.
Products Affected
- Active! mail 6 BuildInfo: 6.60.05008561 and earlier
Description
Active! mail provided by QUALITIA CO., LTD. contains a stack-based buffer overflow vulnerability (CWE-121).
The developer states that attacks exploiting the vulnerability has been observed.
Impact
Receiving a specially crafted request created and sent by a remote unauthenticated attacker may lead to arbitrary code execution and/or a denial-of-service (DoS) condition.
Solution
Update the Software
Update the software according to the information provided by the developer.
The developer has released the following version to address this vulnerability.
- Active! mail 6 BuildInfo: 6.60.06008562
Vendor Status
| Vendor | Link | 
| QUALITIA CO., LTD. | Important Notice Regarding Vulnerability for Active! mail 6 (Text in Japanese) | 
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
| Attack Vector(AV) | Physical (P) | Local (L) | Adjacent (A) | Network (N) | 
|---|---|---|---|---|
| Attack Complexity(AC) | High (H) | Low (L) | ||
| Privileges Required(PR) | High (H) | Low (L) | None (N) | |
| User Interaction(UI) | Required (R) | None (N) | ||
| Scope(S) | Unchanged (U) | Changed (C) | ||
| Confidentiality Impact(C) | None (N) | Low (L) | High (H) | |
| Integrity Impact(I) | None (N) | Low (L) | High (H) | |
| Availability Impact(A) | None (N) | Low (L) | High (H) | 
Credit
QUALITIA CO., LTD. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and QUALITIA CO., LTD. coordinated under the Information Security Early Warning Partnership.
Other Information
| JPCERT Alert | JPCERT-AT-2025-0010 Alert Regarding Stack-based Buffer Overflow Vulnerability in Active! mail (Text in Japanese) | 
| JPCERT Reports |  | 
| CERT Advisory |  | 
| CPNI Advisory |  | 
| TRnotes |  | 
| CVE | CVE-2025-42599 | 
| JVN iPedia | JVNDB-2025-000027 | 
Update History
- 2025/04/18
- Information under the section [Vendor Status] and [Other Information] was updated.
