Published:2025/04/18  Last Updated:2025/04/18

JVN#22348866
Active! mail vulnerable to stack-based buffer overflow
Critical

Overview

Active! mail provided by QUALITIA CO., LTD. contains a stack-based buffer overflow vulnerability.

Products Affected

  • Active! mail 6 BuildInfo: 6.60.05008561 and earlier

Description

Active! mail provided by QUALITIA CO., LTD. contains a stack-based buffer overflow vulnerability (CWE-121).

The developer states that attacks exploiting the vulnerability has been observed.

Impact

Receiving a specially crafted request created and sent by a remote unauthenticated attacker may lead to arbitrary code execution and/or a denial-of-service (DoS) condition.

Solution

Update the Software
Update the software according to the information provided by the developer.
The developer has released the following version to address this vulnerability.

  • Active! mail 6 BuildInfo: 6.60.06008562

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

CVSS v3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score: 9.8
Attack Vector(AV) Physical (P) Local (L) Adjacent (A) Network (N)
Attack Complexity(AC) High (H) Low (L)
Privileges Required(PR) High (H) Low (L) None (N)
User Interaction(UI) Required (R) None (N)
Scope(S) Unchanged (U) Changed (C)
Confidentiality Impact(C) None (N) Low (L) High (H)
Integrity Impact(I) None (N) Low (L) High (H)
Availability Impact(A) None (N) Low (L) High (H)

Credit

QUALITIA CO., LTD. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and QUALITIA CO., LTD. coordinated under the Information Security Early Warning Partnership.

Other Information

JPCERT Alert JPCERT-AT-2025-0010
Alert Regarding Stack-based Buffer Overflow Vulnerability in Active! mail (Text in Japanese)
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2025-42599
JVN iPedia JVNDB-2025-000027

Update History

2025/04/18
Information under the section [Vendor Status] and [Other Information] was updated.