CVE-2014-0477
The parse function in Email::Address module before 1.905 for Perl uses an inefficient regular expression, which allows remote attackers to cause a denial of service (CPU consumption) via an empty quoted string in an RFC 2822 address.
View on NVDSeverity
N/A
EPSS
Probability of exploitation (next 30 days): 0.0142 (1.4%)
Percentile: 80.7%
EPSS: 2026-05-06
Affects
email\:\fedoraproject:fedoraTechnical description
The parse function in Email::Address module before 1.905 for Perl uses an inefficient regular expression, which allows remote attackers to cause a denial of service (CPU consumption) via an empty quoted string in an RFC 2822 address.
Published: 7/3/2014, 5:55:05 PM
Last modified: 5/6/2026, 10:30:45 PM
References
- http://seclists.org/oss-sec/2014/q2/563
- http://secunia.com/advisories/59212
- http://secunia.com/advisories/59333
- http://secunia.com/advisories/61981
- http://www.debian.org/security/2014/dsa-2969
- https://bugzilla.redhat.com/show_bug.cgi?id=1110723
- https://github.com/rjbs/Email-Address/blob/master/Changes
- https://github.com/rjbs/Email-Address/commit/83f8306117115729ac9346523762c0c396251eb5