First published: Sun Jul 06 2014(Updated: )
Email::Address module before 1.904 for Perl uses an inefficient regular expression, which allows remote attackers to cause a denial of service (CPU consumption) via vectors related to "backtracking into the phrase," a different vulnerability than CVE-2014-0477.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
email\ \ | <=1.903 | |
email\ \ | =address_module_project-email\ | |
email\ \ | =address_module_project-email\ | |
email\ \ | =address_module_project-email\ | |
email\ \ | =address_module_project-email\ | |
email\ \ | =address_module_project-email\ | |
email\ \ | =address_module_project-email\ | |
email\ \ | =address_module_project-email\ | |
email\ \ | =address_module_project-email\ | |
email\ \ | =address_module_project-email\ | |
email\ \ | =address_module_project-email\ | |
email\ \ | =address_module_project-email\ | |
email\ \ | =address_module_project-email\ | |
email\ \ | =address_module_project-email\ | |
email\ \ | =address_module_project-email\ | |
email\ \ | =address_module_project-email\ | |
email\ \ | =address_module_project-email\ | |
email\ \ | =address_module_project-email\ | |
email\ \ | =address_module_project-email\ | |
email\ \ | =address_module_project-email\ | |
email\ \ | =address_module_project-email\ | |
email\ \ | =address_module_project-email\ | |
email\ \ | =address_module_project-email\ | |
email\ \ | =address_module_project-email\ | |
email\ \ | =address_module_project-email\ | |
email\ \ | =address_module_project-email\ | |
email\ \ | =address_module_project-email\ | |
email\ \ | =address_module_project-email\ | |
email\ \ | =address_module_project-email\ | |
email\ \ | =address_module_project-email\ | |
email\ \ | =address_module_project-email\ | |
email\ \ | =address_module_project-email\ | |
email\ \ | =address_module_project-email\ | |
email\ \ | =address_module_project-email\ | |
email\ \ | =address_module_project-email\ |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4720 is classified as a denial of service vulnerability due to excessive CPU consumption caused by inefficient regular expressions in the Email::Address module.
To fix CVE-2014-4720, you should update the Email::Address module to version 1.904 or later.
CVE-2014-4720 affects Email::Address versions prior to 1.904.
Yes, CVE-2014-4720 allows remote attackers to exploit the vulnerability to cause a denial of service.
CVE-2014-4720 affects the Perl programming language due to the Email::Address module.