First published: Tue Jul 15 2014(Updated: )
Algorithmic complexity vulnerability in Email::Address::List before 0.02, as used in RT 4.2.0 through 4.2.2, allows remote attackers to cause a denial of service (CPU consumption) via a string without an address.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Best Practical Solutions Request Tracker | =4.2.0 | |
Best Practical Solutions Request Tracker | =4.2.1 | |
Best Practical Solutions Request Tracker | =4.2.2 | |
Email\ \ | <=0.01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1474 is considered a moderate severity vulnerability due to its potential for denial of service.
To fix CVE-2014-1474, update Email::Address::List to version 0.02 or later and upgrade RT to version 4.2.3 or later.
CVE-2014-1474 affects RT versions 4.2.0 to 4.2.2 and Email::Address::List versions up to 0.01.
CVE-2014-1474 is an algorithmic complexity vulnerability that allows a denial of service through excessive CPU consumption.
Yes, CVE-2014-1474 can be exploited remotely by sending a specially crafted string that lacks an address.