Security Advisories (2)
CVE-2014-4720 (2014-07-06)

Email::Address module before 1.904 for Perl uses an inefficient regular expression, which allows remote attackers to cause a denial of service (CPU consumption) via vectors related to "backtracking into the phrase," a different vulnerability than CVE-2014-0477.

CVE-2018-12558 (2018-06-19)

The parse() method in the Email::Address module through 1.909 for Perl is vulnerable to Algorithmic complexity on specially prepared input, leading to Denial of Service. Prepared special input that caused this problem contained 30 form-field characters ("\f").

Changes for version 1.882 - 2006-11-22

  • fix bug 21270, do not allow changes to objects to pollute the cache
  • packaging improvements
  • make test suite easier to manage
  • improve honesty of documentation (we are not complete, (yet))

Modules

RFC 2822 Address Parsing and Creation