Security Advisories (2)
CVE-2014-4720 (2014-07-06)

Email::Address module before 1.904 for Perl uses an inefficient regular expression, which allows remote attackers to cause a denial of service (CPU consumption) via vectors related to "backtracking into the phrase," a different vulnerability than CVE-2014-0477.

CVE-2018-12558 (2018-06-19)

The parse() method in the Email::Address module through 1.909 for Perl is vulnerable to Algorithmic complexity on specially prepared input, leading to Denial of Service. Prepared special input that caused this problem contained 30 form-field characters ("\f").

Changes for version 1.883 - 2006-11-25

  • resolve bug 23565, as_string didn't work on 5.8.0 (weird!)
  • improve skip behavior for cache-cow.t with older Scalar::Util

Modules

RFC 2822 Address Parsing and Creation