Unrated severityNVD Advisory· Published Jul 3, 2014· Updated May 6, 2026
CVE-2014-0477
CVE-2014-0477
Description
The parse function in Email::Address module before 1.905 for Perl uses an inefficient regular expression, which allows remote attackers to cause a denial of service (CPU consumption) via an empty quoted string in an RFC 2822 address.
Affected products
37cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.880:*:*:*:*:perl:*:*+ 35 more
- cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.880:*:*:*:*:perl:*:*
- cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.881:*:*:*:*:perl:*:*
- cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.882:*:*:*:*:perl:*:*
- cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.883:*:*:*:*:perl:*:*
- cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.884:*:*:*:*:perl:*:*
- cpe:2.3:a:email\:\:address_module_project:email\:\:address:*:*:*:*:*:perl:*:*range: <=1.904
- cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.1:*:*:*:*:perl:*:*
- cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.2:*:*:*:*:perl:*:*
- cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.3:*:*:*:*:perl:*:*
- cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.5:*:*:*:*:perl:*:*
- cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.6:*:*:*:*:perl:*:*
- cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.7:*:*:*:*:perl:*:*
- cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.80:*:*:*:*:perl:*:*
- cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.85:*:*:*:*:perl:*:*
- cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.86:*:*:*:*:perl:*:*
- cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.870:*:*:*:*:perl:*:*
- cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.871:*:*:*:*:perl:*:*
- cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.885:*:*:*:*:perl:*:*
- cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.886:*:*:*:*:perl:*:*
- cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.887:*:*:*:*:perl:*:*
- cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.888:*:*:*:*:perl:*:*
- cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.889:*:*:*:*:perl:*:*
- cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.890:*:*:*:*:perl:*:*
- cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.891:*:*:*:*:perl:*:*
- cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.892:*:*:*:*:perl:*:*
- cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.893:*:*:*:*:perl:*:*
- cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.897:*:*:*:*:perl:*:*
- cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.898:*:*:*:*:perl:*:*
- cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.899:*:*:*:*:perl:*:*
- cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.900:*:*:*:*:perl:*:*
- cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.901:*:*:*:*:perl:*:*
- cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.902:*:*:*:*:perl:*:*
- cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.903:*:*:*:*:perl:*:*
- cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.894:*:*:*:*:perl:*:*
- cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.895:*:*:*:*:perl:*:*
- cpe:2.3:a:email\:\:address_module_project:email\:\:address:1.896:*:*:*:*:perl:*:*
- cpe:2.3:o:fedoraproject:fedora:*:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- github.com/rjbs/Email-Address/commit/83f8306117115729ac9346523762c0c396251eb5nvdExploitPatch
- seclists.org/oss-sec/2014/q2/563nvd
- secunia.com/advisories/59212nvd
- secunia.com/advisories/59333nvd
- secunia.com/advisories/61981nvd
- www.debian.org/security/2014/dsa-2969nvd
- bugzilla.redhat.com/show_bug.cginvd
- github.com/rjbs/Email-Address/blob/master/Changesnvd
- metacpan.org/release/RJBS/Email-Address-1.905nvd
News mentions
0No linked articles in our index yet.