CVE-2015-7686
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
06/10/2015
Last modified:
12/04/2025
Description
Algorithmic complexity vulnerability in Address.pm in the Email-Address module 1.908 and earlier for Perl allows remote attackers to cause a denial of service (CPU consumption) via a crafted string containing a list of e-mail addresses in conjunction with parenthesis characters that can be associated with nested comments. NOTE: the default configuration in 1.908 mitigates this vulnerability but misparses certain realistic comments.
Impact
Base Score 2.0
7.80
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:email-address_project:email-address:*:*:*:*:*:perl:*:* | 1.908 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.openwall.com/lists/oss-security/2015/09/27/1
- http://www.openwall.com/lists/oss-security/2015/10/02/13
- https://forum.bestpractical.com/t/security-vulnerabilities-in-rt-2017-06-15/32016
- http://www.openwall.com/lists/oss-security/2015/09/27/1
- http://www.openwall.com/lists/oss-security/2015/10/02/13
- https://forum.bestpractical.com/t/security-vulnerabilities-in-rt-2017-06-15/32016



