First published: Tue Apr 09 2019(Updated: )
A stack-based buffer overflow in Forcepoint Email Security version 8.5 allows an attacker to craft malicious input and potentially crash a process creating a denial-of-service. While no known Remote Code Execution (RCE) vulnerabilities exist, as with all buffer overflows, the possibility of RCE cannot be completely ruled out. Data Execution Protection (DEP) is already enabled on the Email appliance as a risk mitigation.
Credit: psirt@forcepoint.com
Affected Software | Affected Version | How to fix |
---|---|---|
Forcepoint Email Security | =8.5.0 | |
Forcepoint Email Security | =8.5.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16530 is a stack-based buffer overflow vulnerability in Forcepoint Email Security version 8.5.
CVE-2018-16530 has a severity rating of 9.8 (critical).
CVE-2018-16530 allows an attacker to craft malicious input and potentially crash a process, leading to denial-of-service.
No, there are no known Remote Code Execution (RCE) vulnerabilities associated with CVE-2018-16530.
To fix CVE-2018-16530, it is recommended to update to the latest version of Forcepoint Email Security.