Security Advisories (2)
CVE-2014-4720 (2014-07-06)

Email::Address module before 1.904 for Perl uses an inefficient regular expression, which allows remote attackers to cause a denial of service (CPU consumption) via vectors related to "backtracking into the phrase," a different vulnerability than CVE-2014-0477.

CVE-2018-12558 (2018-06-19)

The parse() method in the Email::Address module through 1.909 for Perl is vulnerable to Algorithmic complexity on specially prepared input, leading to Denial of Service. Prepared special input that caused this problem contained 30 form-field characters ("\f").

Changes for version 1.86 - 2006-07-21

  • update docs
  • tweak regex for approximate 50% performance boost ...but bug 16320 is still true: Email::Address can be VERY slow https://rt.cpan.org/Ticket/Display.html?id=16320

Modules

RFC 2822 Address Parsing and Creation