First published: Tue Jun 19 2018(Updated: )
The parse() method in the Email::Address module through 1.909 for Perl is vulnerable to Algorithmic complexity on specially prepared input, leading to Denial of Service. Prepared special input that caused this problem contained 30 form-field characters ("\f").
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/libemail-address-perl | <=1.908-1<=1.909-1 | 1.908-1+deb9u1 1.912-1 |
debian/libemail-address-perl | 1.912-1 1.913-1 | |
email\ \ | <=1.909 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-12558 has a medium severity level due to the potential for Denial of Service through algorithmic complexity.
To fix CVE-2018-12558, you should upgrade to libemail-address-perl version 1.912-1 or later.
Affected versions of libemail-address-perl include those up to and including 1.909.
CVE-2018-12558 can be exploited through specially crafted inputs, making it possible to cause a Denial of Service remotely.
CVE-2018-12558 impacts the Email::Address module of Perl.