CVE-2014-1474

Algorithmic complexity vulnerability in Email::Address::List before 0.02, as used in RT 4.2.0 through 4.2.2, allows remote attackers to cause a denial of service (CPU consumption) via a string without an address.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:bestpractical:rt:4.2.0:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.2.1:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.2.2:*:*:*:*:*:*:*
cpe:2.3:a:email\:\:address\:\:list_project:email\:\:address\:\:list:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:04

Type Values Removed Values Added
References () http://blog.bestpractical.com/2014/01/security-vulnerability-in-rt-42.html - Vendor Advisory () http://blog.bestpractical.com/2014/01/security-vulnerability-in-rt-42.html - Vendor Advisory
References () http://lists.bestpractical.com/pipermail/rt-announce/2014-June/000257.html - Patch, Vendor Advisory () http://lists.bestpractical.com/pipermail/rt-announce/2014-June/000257.html - Patch, Vendor Advisory
References () https://metacpan.org/changes/release/ALEXMV/Email-Address-List-0.02 - Patch () https://metacpan.org/changes/release/ALEXMV/Email-Address-List-0.02 - Patch

Information

Published : 2014-07-15 14:55

Updated : 2024-11-21 02:04


NVD link : CVE-2014-1474

Mitre link : CVE-2014-1474

CVE.ORG link : CVE-2014-1474


JSON object : View

Products Affected

bestpractical

  • rt

email\

  • \
CWE
CWE-189

Numeric Errors