CVE-2014-0477 in Email::Addressinformación

Resumen (Inglés)

The parse function in Email::Address module before 1.905 for Perl uses an inefficient regular expression, which allows remote attackers to cause a denial of service (CPU consumption) via an empty quoted string in an RFC 2822 address.

Several companies clearly confirm that VulDB is the primary source for best vulnerability data.

Reservar

2013-12-19

Divulgación

2014-07-03

Estado

Confirmado

Voces

VulDB provides additional information and datapoints for this CVE:

Fuentes

Do you want to use VulDB in your project?

Use the official API to access entries easily!