Vulnerability Description
Algorithmic complexity vulnerability in Email::Address::List before 0.02, as used in RT 4.2.0 through 4.2.2, allows remote attackers to cause a denial of service (CPU consumption) via a string without an address.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Bestpractical | Rt | 4.2.0 |
| Email\ | \ | <= 0.01, address\ |
Related Weaknesses (CWE)
References
- http://blog.bestpractical.com/2014/01/security-vulnerability-in-rt-42.htmlVendor Advisory
- http://lists.bestpractical.com/pipermail/rt-announce/2014-June/000257.htmlPatchVendor Advisory
- https://metacpan.org/changes/release/ALEXMV/Email-Address-List-0.02Patch
- http://blog.bestpractical.com/2014/01/security-vulnerability-in-rt-42.htmlVendor Advisory
- http://lists.bestpractical.com/pipermail/rt-announce/2014-June/000257.htmlPatchVendor Advisory
- https://metacpan.org/changes/release/ALEXMV/Email-Address-List-0.02Patch
FAQ
What is CVE-2014-1474?
CVE-2014-1474 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Algorithmic complexity vulnerability in Email::Address::List before 0.02, as used in RT 4.2.0 through 4.2.2, allows remote attackers to cause a denial of service (CPU consumption) via a string without...
How severe is CVE-2014-1474?
CVE-2014-1474 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-1474?
Check the references section above for vendor advisories and patch information. Affected products include: Bestpractical Rt, Email\ \.