CVE-2018-25223 PUBLISHED

Crashmail 1.6 Stack-based Buffer Overflow Remote Code Execution

Assigner: VulnCheck
Reserved: 28.03.2026 Published: 28.03.2026 Updated: 28.03.2026

Crashmail 1.6 contains a stack-based buffer overflow vulnerability that allows remote attackers to execute arbitrary code by sending malicious input to the application. Attackers can craft payloads with ROP chains to achieve code execution in the application context, with failed attempts potentially causing denial of service.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 9.3

Product Status

Vendor crashmail
Product Crashmail
Versions
  • Version 1.6 is affected

Credits

  • Juan Sacco <jsacco@exploitpack.com>, jsacco@exploitpack.com" finder

References

Problem Types

  • Out-of-bounds Write CWE