{"api_version":"1","generated_at":"2026-04-23T08:04:05+00:00","cve":"CVE-2018-16530","urls":{"html":"https://cve.report/CVE-2018-16530","api":"https://cve.report/api/cve/CVE-2018-16530.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2018-16530","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2018-16530"},"summary":{"title":"CVE-2018-16530","description":"A stack-based buffer overflow in Forcepoint Email Security version 8.5 allows an attacker to craft malicious input and potentially crash a process creating a denial-of-service. While no known Remote Code Execution (RCE) vulnerabilities exist, as with all buffer overflows, the possibility of RCE cannot be completely ruled out. Data Execution Protection (DEP) is already enabled on the Email appliance as a risk mitigation.","state":"PUBLIC","assigner":"psirt@forcepoint.com","published_at":"2019-04-09 19:29:00","updated_at":"2022-10-28 19:22:00"},"problem_types":["CWE-787"],"metrics":[],"references":[{"url":"https://help.forcepoint.com/security/CVE/CVE-2018-16530.html","name":"https://help.forcepoint.com/security/CVE/CVE-2018-16530.html","refsource":"MISC","tags":[],"title":"Security Advisory: Buffer Overflow Vulnerability in Email Security (CVE-2018-16530)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://support.forcepoint.com/KBArticle?id=000016621","name":"https://support.forcepoint.com/KBArticle?id=000016621","refsource":"MISC","tags":["Mitigation","Patch","Vendor Advisory"],"title":"KB Article | Forcepoint Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2018-16530","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-16530","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2018","cve_id":"16530","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"forcepoint","cpe5":"email_security","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"16530","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"forcepoint","cpe5":"email_security","cpe6":"8.5.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"16530","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"forcepoint","cpe5":"email_security","cpe6":"8.5.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"16530","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"forcepoint","cpe5":"email_security","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2018-16530","ASSIGNER":"psirt@forcepoint.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Forcepoint","product":{"product_data":[{"product_name":"Forcepoint Email Security","version":{"version_data":[{"version_value":"8.5"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Stack-based Buffer Overflow"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://support.forcepoint.com/KBArticle?id=000016621","url":"https://support.forcepoint.com/KBArticle?id=000016621"},{"refsource":"MISC","name":"https://help.forcepoint.com/security/CVE/CVE-2018-16530.html","url":"https://help.forcepoint.com/security/CVE/CVE-2018-16530.html"}]},"description":{"description_data":[{"lang":"eng","value":"A stack-based buffer overflow in Forcepoint Email Security version 8.5 allows an attacker to craft malicious input and potentially crash a process creating a denial-of-service. While no known Remote Code Execution (RCE) vulnerabilities exist, as with all buffer overflows, the possibility of RCE cannot be completely ruled out. Data Execution Protection (DEP) is already enabled on the Email appliance as a risk mitigation."}]}},"nvd":{"publishedDate":"2019-04-09 19:29:00","lastModifiedDate":"2022-10-28 19:22:00","problem_types":["CWE-787"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":7.5},"severity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:forcepoint:email_security:8.5.3:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:forcepoint:email_security:8.5.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2018","CveId":"16530","Ordinal":"133323","Title":"CVE-2018-16530","CVE":"CVE-2018-16530","Year":"2018"},"notes":[{"CveYear":"2018","CveId":"16530","Ordinal":"1","NoteData":"A stack-based buffer overflow in Forcepoint Email Security version 8.5 allows an attacker to craft malicious input and potentially crash a process creating a denial-of-service. While no known Remote Code Execution (RCE) vulnerabilities exist, as with all buffer overflows, the possibility of RCE cannot be completely ruled out. Data Execution Protection (DEP) is already enabled on the Email appliance as a risk mitigation.","Type":"Description","Title":null},{"CveYear":"2018","CveId":"16530","Ordinal":"2","NoteData":"2019-04-09","Type":"Other","Title":"Published"},{"CveYear":"2018","CveId":"16530","Ordinal":"3","NoteData":"2019-04-09","Type":"Other","Title":"Modified"}]}}}