CVE-2014-0477 in Email::Address
Summary
The parse function in Email::Address module before 1.905 for Perl uses an inefficient regular expression, which allows remote attackers to cause a denial of service (CPU consumption) via an empty quoted string in an RFC 2822 address.
Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
Reservation
12/19/2013
Disclosure
07/03/2014
Status
Confirmed
Entries
VulDB provides additional information and datapoints for this CVE:
| ID | Vulnerability | CWE | Exp | Cou | CVE |
|---|---|---|---|---|---|
| 70267 | Email::Address incorrect regex | 185 | Not defined | Official fix | CVE-2014-0477 |