← Volver a CVEs
CVE-2018-25223
CRITICAL9.8
Descripcion
Crashmail 1.6 contains a stack-based buffer overflow vulnerability that allows remote attackers to execute arbitrary code by sending malicious input to the application. Attackers can craft payloads with ROP chains to achieve code execution in the application context, with failed attempts potentially causing denial of service.
Detalles CVE
Puntuacion CVSS v3.19.8
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado3/28/2026
Ultima modificacion4/2/2026
Fuentenvd
Avistamientos honeypot0
Productos afectados
ftnapps:crashmail_ii
Debilidades (CWE)
CWE-787
Referencias
http://exploitpack.com(disclosure@vulncheck.com)
http://ftnapps.sourceforge.net/crashmail.html(disclosure@vulncheck.com)
https://www.exploit-db.com/exploits/44331(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/crashmail-stack-based-buffer-overflow-remote-code-execution(disclosure@vulncheck.com)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.