VYPR
Unrated severityNVD Advisory· Published Jul 3, 2014· Updated May 6, 2026

CVE-2014-0477

CVE-2014-0477

Description

The parse function in Email::Address module before 1.905 for Perl uses an inefficient regular expression, which allows remote attackers to cause a denial of service (CPU consumption) via an empty quoted string in an RFC 2822 address.

Affected products

37
  • Email\/\36 versions
    cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.880:*:*:*:*:perl:*:*+ 35 more
    • cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.880:*:*:*:*:perl:*:*
    • cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.881:*:*:*:*:perl:*:*
    • cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.882:*:*:*:*:perl:*:*
    • cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.883:*:*:*:*:perl:*:*
    • cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.884:*:*:*:*:perl:*:*
    • cpe:2.3:a:email\:\:address_module_project:email\:\:address:*:*:*:*:*:perl:*:*range: <=1.904
    • cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.1:*:*:*:*:perl:*:*
    • cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.2:*:*:*:*:perl:*:*
    • cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.3:*:*:*:*:perl:*:*
    • cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.5:*:*:*:*:perl:*:*
    • cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.6:*:*:*:*:perl:*:*
    • cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.7:*:*:*:*:perl:*:*
    • cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.80:*:*:*:*:perl:*:*
    • cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.85:*:*:*:*:perl:*:*
    • cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.86:*:*:*:*:perl:*:*
    • cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.870:*:*:*:*:perl:*:*
    • cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.871:*:*:*:*:perl:*:*
    • cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.885:*:*:*:*:perl:*:*
    • cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.886:*:*:*:*:perl:*:*
    • cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.887:*:*:*:*:perl:*:*
    • cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.888:*:*:*:*:perl:*:*
    • cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.889:*:*:*:*:perl:*:*
    • cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.890:*:*:*:*:perl:*:*
    • cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.891:*:*:*:*:perl:*:*
    • cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.892:*:*:*:*:perl:*:*
    • cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.893:*:*:*:*:perl:*:*
    • cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.897:*:*:*:*:perl:*:*
    • cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.898:*:*:*:*:perl:*:*
    • cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.899:*:*:*:*:perl:*:*
    • cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.900:*:*:*:*:perl:*:*
    • cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.901:*:*:*:*:perl:*:*
    • cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.902:*:*:*:*:perl:*:*
    • cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.903:*:*:*:*:perl:*:*
    • cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.894:*:*:*:*:perl:*:*
    • cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.895:*:*:*:*:perl:*:*
    • cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.896:*:*:*:*:perl:*:*
  • cpe:2.3:o:fedoraproject:fedora:*:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

9

News mentions

0

No linked articles in our index yet.