CVE-2018-16530

A stack-based buffer overflow in Forcepoint Email Security version 8.5 allows an attacker to craft malicious input and potentially crash a process creating a denial-of-service. While no known Remote Code Execution (RCE) vulnerabilities exist, as with all buffer overflows, the possibility of RCE cannot be completely ruled out. Data Execution Protection (DEP) is already enabled on the Email appliance as a risk mitigation.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:forcepoint:email_security:8.5.0:*:*:*:*:*:*:*
cpe:2.3:a:forcepoint:email_security:8.5.3:*:*:*:*:*:*:*

History

21 Nov 2024, 03:52

Type Values Removed Values Added
References () https://help.forcepoint.com/security/CVE/CVE-2018-16530.html - Vendor Advisory () https://help.forcepoint.com/security/CVE/CVE-2018-16530.html - Vendor Advisory
References () https://support.forcepoint.com/KBArticle?id=000016621 - Permissions Required, Vendor Advisory () https://support.forcepoint.com/KBArticle?id=000016621 - Permissions Required, Vendor Advisory

Information

Published : 2019-04-09 19:29

Updated : 2024-11-21 03:52


NVD link : CVE-2018-16530

Mitre link : CVE-2018-16530

CVE.ORG link : CVE-2018-16530


JSON object : View

Products Affected

forcepoint

  • email_security
CWE
CWE-787

Out-of-bounds Write