Description
Algorithmic complexity vulnerability in Address.pm in the Email-Address module 1.908 and earlier for Perl allows remote attackers to cause a denial of service (CPU consumption) via a crafted string containing a list of e-mail addresses in conjunction with parenthesis characters that can be associated with nested comments. NOTE: the default configuration in 1.908 mitigates this vulnerability but misparses certain realistic comments.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-987-1 | request-tracker4 security update |
Debian DSA |
DSA-3882-1 | request-tracker4 security update |
EUVD |
EUVD-2015-7588 | Algorithmic complexity vulnerability in Address.pm in the Email-Address module 1.908 and earlier for Perl allows remote attackers to cause a denial of service (CPU consumption) via a crafted string containing a list of e-mail addresses in conjunction with parenthesis characters that can be associated with nested comments. NOTE: the default configuration in 1.908 mitigates this vulnerability but misparses certain realistic comments. |
References
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T07:58:58.824Z
Reserved: 2015-10-02T00:00:00.000Z
Link: CVE-2015-7686
No data.
Status : Deferred
Published: 2015-10-06T01:59:33.673
Modified: 2025-04-12T10:46:40.837
Link: CVE-2015-7686
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD