A stack-based buffer overflow in Forcepoint Email Security version 8.5 allows an attacker to craft malicious input and potentially crash a process creating a denial-of-service. While no known Remote Code Execution (RCE) vulnerabilities exist, as with all buffer overflows, the possibility of RCE cannot be completely ruled out. Data Execution Protection (DEP) is already enabled on the Email appliance as a risk mitigation.
References
Link | Resource |
---|---|
https://help.forcepoint.com/security/CVE/CVE-2018-16530.html | Vendor Advisory |
https://support.forcepoint.com/KBArticle?id=000016621 | Permissions Required Vendor Advisory |
https://help.forcepoint.com/security/CVE/CVE-2018-16530.html | Vendor Advisory |
https://support.forcepoint.com/KBArticle?id=000016621 | Permissions Required Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:52
Type | Values Removed | Values Added |
---|---|---|
References | () https://help.forcepoint.com/security/CVE/CVE-2018-16530.html - Vendor Advisory | |
References | () https://support.forcepoint.com/KBArticle?id=000016621 - Permissions Required, Vendor Advisory |
Information
Published : 2019-04-09 19:29
Updated : 2024-11-21 03:52
NVD link : CVE-2018-16530
Mitre link : CVE-2018-16530
CVE.ORG link : CVE-2018-16530
JSON object : View
Products Affected
forcepoint
- email_security
CWE
CWE-787
Out-of-bounds Write