Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2015-7686

Опубликовано: 06 окт. 2015
Источник: nvd
CVSS2: 7.8
EPSS Низкий

Описание

Algorithmic complexity vulnerability in Address.pm in the Email-Address module 1.908 and earlier for Perl allows remote attackers to cause a denial of service (CPU consumption) via a crafted string containing a list of e-mail addresses in conjunction with parenthesis characters that can be associated with nested comments. NOTE: the default configuration in 1.908 mitigates this vulnerability but misparses certain realistic comments.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:email-address_project:email-address:*:*:*:*:*:perl:*:*
Версия до 1.908 (включая)

EPSS

Процентиль: 77%
0.01026
Низкий

7.8 High

CVSS2

Дефекты

CWE-20

Связанные уязвимости

ubuntu
около 10 лет назад

Algorithmic complexity vulnerability in Address.pm in the Email-Address module 1.908 and earlier for Perl allows remote attackers to cause a denial of service (CPU consumption) via a crafted string containing a list of e-mail addresses in conjunction with parenthesis characters that can be associated with nested comments. NOTE: the default configuration in 1.908 mitigates this vulnerability but misparses certain realistic comments.

redhat
около 10 лет назад

Algorithmic complexity vulnerability in Address.pm in the Email-Address module 1.908 and earlier for Perl allows remote attackers to cause a denial of service (CPU consumption) via a crafted string containing a list of e-mail addresses in conjunction with parenthesis characters that can be associated with nested comments. NOTE: the default configuration in 1.908 mitigates this vulnerability but misparses certain realistic comments.

debian
около 10 лет назад

Algorithmic complexity vulnerability in Address.pm in the Email-Addres ...

github
больше 3 лет назад

Algorithmic complexity vulnerability in Address.pm in the Email-Address module 1.908 and earlier for Perl allows remote attackers to cause a denial of service (CPU consumption) via a crafted string containing a list of e-mail addresses in conjunction with parenthesis characters that can be associated with nested comments. NOTE: the default configuration in 1.908 mitigates this vulnerability but misparses certain realistic comments.

EPSS

Процентиль: 77%
0.01026
Низкий

7.8 High

CVSS2

Дефекты

CWE-20