Algorithmic complexity vulnerability in Address.pm in the Email-Address module 1.908 and earlier for Perl allows remote attackers to cause a denial of service (CPU consumption) via a crafted string containing a list of e-mail addresses in conjunction with parenthesis characters that can be associated with nested comments. NOTE: the default configuration in 1.908 mitigates this vulnerability but misparses certain realistic comments.
References
Configurations
History
21 Nov 2024, 02:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2015/09/27/1 - | |
References | () http://www.openwall.com/lists/oss-security/2015/10/02/13 - | |
References | () https://forum.bestpractical.com/t/security-vulnerabilities-in-rt-2017-06-15/32016 - |
Information
Published : 2015-10-06 01:59
Updated : 2024-11-21 02:37
NVD link : CVE-2015-7686
Mitre link : CVE-2015-7686
CVE.ORG link : CVE-2015-7686
JSON object : View
Products Affected
email-address_project
- email-address