Description
A stack-based buffer overflow in Forcepoint Email Security version 8.5 allows an attacker to craft malicious input and potentially crash a process creating a denial-of-service. While no known Remote Code Execution (RCE) vulnerabilities exist, as with all buffer overflows, the possibility of RCE cannot be completely ruled out. Data Execution Protection (DEP) is already enabled on the Email appliance as a risk mitigation.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-8339 | A stack-based buffer overflow in Forcepoint Email Security version 8.5 allows an attacker to craft malicious input and potentially crash a process creating a denial-of-service. While no known Remote Code Execution (RCE) vulnerabilities exist, as with all buffer overflows, the possibility of RCE cannot be completely ruled out. Data Execution Protection (DEP) is already enabled on the Email appliance as a risk mitigation. |
References
History
No history.
Status: PUBLISHED
Assigner: forcepoint
Published:
Updated: 2024-08-05T10:24:32.909Z
Reserved: 2018-09-05T00:00:00.000Z
Link: CVE-2018-16530
No data.
Status : Modified
Published: 2019-04-09T19:29:00.273
Modified: 2024-11-21T03:52:55.660
Link: CVE-2018-16530
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD