Description
The parse function in Email::Address module before 1.905 for Perl uses an inefficient regular expression, which allows remote attackers to cause a denial of service (CPU consumption) via an empty quoted string in an RFC 2822 address.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2969-1 | libemail-address-perl security update |
EUVD |
EUVD-2014-0512 | The parse function in Email::Address module before 1.905 for Perl uses an inefficient regular expression, which allows remote attackers to cause a denial of service (CPU consumption) via an empty quoted string in an RFC 2822 address. |
References
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: debian
Published:
Updated: 2024-08-06T09:20:17.944Z
Reserved: 2013-12-19T00:00:00.000Z
Link: CVE-2014-0477
No data.
Status : Deferred
Published: 2014-07-03T17:55:05.937
Modified: 2025-04-12T10:46:40.837
Link: CVE-2014-0477
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD