CVE-2010-20119
CommuniCrypt Mail <= 1.16 ANSMTP/AOSMTP ActiveX Control Buffer Overflow
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
CommuniCrypt Mail versions up to and including 1.16 contains a stack-based buffer overflow vulnerability in its ANSMTP.dll and AOSMTP.dll ActiveX controls, specifically within the AddAttachments() method. This method fails to properly validate the length of input strings, allowing data to exceed the bounds of a fixed-size stack buffer. When invoked with an overly long string, the control can corrupt adjacent memory structures, including exception handlers, leading to potential control flow disruption.
| CWE | CWE-121 |
| Vendor | communicrypt software |
| Product | communicrypt mail |
| Published | Aug 21, 2025 |
| Last Updated | Apr 7, 2026 |
Stay Ahead of the Next One
Get instant alerts for communicrypt software communicrypt mail
Be the first to know when new unknown vulnerabilities affecting communicrypt software communicrypt mail are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
CommuniCrypt Software / CommuniCrypt Mail
* โค 1.16
References
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/browser/communicrypt_mail_activex.rb exploit-db.com: https://www.exploit-db.com/exploits/12663 broadcom.com: https://www.broadcom.com/support/security-center/attacksignatures/detail?asid=24374 softwarelode.com: https://softwarelode.com/4185/details-communicrypt-mail.html fortiguard.com: https://www.fortiguard.com/encyclopedia/ips/23099 vulncheck.com: https://www.vulncheck.com/advisories/communicrypt-mail-activex-control-buffer-overflow
Credits
Lincoln