Overview
- Description
- A stack-based buffer overflow in Forcepoint Email Security version 8.5 allows an attacker to craft malicious input and potentially crash a process creating a denial-of-service. While no known Remote Code Execution (RCE) vulnerabilities exist, as with all buffer overflows, the possibility of RCE cannot be completely ruled out. Data Execution Protection (DEP) is already enabled on the Email appliance as a risk mitigation.
- Source
- psirt@forcepoint.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-787
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:forcepoint:email_security:8.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DAE606FF-8D95-4DA7-8A13-C24C7FCCD8E2" }, { "criteria": "cpe:2.3:a:forcepoint:email_security:8.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F954B655-E3BC-4D8D-8C3B-DFF973568D6E" } ], "operator": "OR" } ] } ]