Security Advisories (2)
CVE-2014-4720 (2014-07-06)

Email::Address module before 1.904 for Perl uses an inefficient regular expression, which allows remote attackers to cause a denial of service (CPU consumption) via vectors related to "backtracking into the phrase," a different vulnerability than CVE-2014-0477.

CVE-2018-12558 (2018-06-19)

The parse() method in the Email::Address module through 1.909 for Perl is vulnerable to Algorithmic complexity on specially prepared input, leading to Denial of Service. Prepared special input that caused this problem contained 30 form-field characters ("\f").

Changes for version 1.899 - 2013-08-02

  • repackaged, pointed at new bugtracker
  • fallback overloads are enabled, so "cmp" will now compare with string overloads... which still might not be what you expect
  • code has been futzed with to rely on some 5.6-isms, rather than trying to be 5.005 compatible
  • a warning has been added: calling ->parse in scalar context gets undefined behavior

Modules

RFC 2822 Address Parsing and Creation