A stack-based buffer overflow in Forcepoint Email Security version 8.5 allows an attacker to craft malicious input and potentially crash a process creating a denial-of-service. While no known Remote Code Execution (RCE) vulnerabilities exist, as with all buffer overflows, the possibility of RCE cannot be completely ruled out. Data Execution Protection (DEP) is already enabled on the Email appliance as a risk mitigation.
                
            References
                    | Link | Resource | 
|---|---|
| https://help.forcepoint.com/security/CVE/CVE-2018-16530.html | Vendor Advisory | 
| https://support.forcepoint.com/KBArticle?id=000016621 | Permissions Required Vendor Advisory | 
| https://help.forcepoint.com/security/CVE/CVE-2018-16530.html | Vendor Advisory | 
| https://support.forcepoint.com/KBArticle?id=000016621 | Permissions Required Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
            
            
  | 
    
History
                    21 Nov 2024, 03:52
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://help.forcepoint.com/security/CVE/CVE-2018-16530.html - Vendor Advisory | |
| References | () https://support.forcepoint.com/KBArticle?id=000016621 - Permissions Required, Vendor Advisory | 
Information
                Published : 2019-04-09 19:29
Updated : 2024-11-21 03:52
NVD link : CVE-2018-16530
Mitre link : CVE-2018-16530
CVE.ORG link : CVE-2018-16530
JSON object : View
Products Affected
                forcepoint
- email_security
 
CWE
                
                    
                        
                        CWE-787
                        
            Out-of-bounds Write
