CVE-2015-7686

Algorithmic complexity vulnerability in Address.pm in the Email-Address module 1.908 and earlier for Perl allows remote attackers to cause a denial of service (CPU consumption) via a crafted string containing a list of e-mail addresses in conjunction with parenthesis characters that can be associated with nested comments. NOTE: the default configuration in 1.908 mitigates this vulnerability but misparses certain realistic comments.
Configurations

Configuration 1 (hide)

cpe:2.3:a:email-address_project:email-address:*:*:*:*:*:perl:*:*

History

21 Nov 2024, 02:37

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2015/09/27/1 - () http://www.openwall.com/lists/oss-security/2015/09/27/1 -
References () http://www.openwall.com/lists/oss-security/2015/10/02/13 - () http://www.openwall.com/lists/oss-security/2015/10/02/13 -
References () https://forum.bestpractical.com/t/security-vulnerabilities-in-rt-2017-06-15/32016 - () https://forum.bestpractical.com/t/security-vulnerabilities-in-rt-2017-06-15/32016 -

Information

Published : 2015-10-06 01:59

Updated : 2024-11-21 02:37


NVD link : CVE-2015-7686

Mitre link : CVE-2015-7686

CVE.ORG link : CVE-2015-7686


JSON object : View

Products Affected

email-address_project

  • email-address
CWE
CWE-20

Improper Input Validation

CWE-399

Resource Management Errors