| Vulnerability Name: | CVE-2015-7686 (CCN-107602) | ||||||||||||||||||||||||||||||||||||||||||||
| Assigned: | 2015-10-02 | ||||||||||||||||||||||||||||||||||||||||||||
| Published: | 2015-10-02 | ||||||||||||||||||||||||||||||||||||||||||||
| Updated: | 2017-07-04 | ||||||||||||||||||||||||||||||||||||||||||||
| Summary: | Algorithmic complexity vulnerability in Address.pm in the Email-Address module 1.908 and earlier for Perl allows remote attackers to cause a denial of service (CPU consumption) via a crafted string containing a list of e-mail addresses in conjunction with parenthesis characters that can be associated with nested comments. Note: the default configuration in 1.908 mitigates this vulnerability but misparses certain realistic comments. | ||||||||||||||||||||||||||||||||||||||||||||
| CVSS v3 Severity: | 7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 6.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:U/RC:R)
| ||||||||||||||||||||||||||||||||||||||||||||
| CVSS v2 Severity: | 7.8 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C)
| ||||||||||||||||||||||||||||||||||||||||||||
| Vulnerability Type: | CWE-399 CWE-20 | ||||||||||||||||||||||||||||||||||||||||||||
| Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2015-7686 Source: CCN Type: CPAN Web site Email::Address - search.cpan.org Source: CCN Type: oss-sec Mailing List, Sun, 27 Sep 2015 09:53:59 +0200 DoS attack through Email-Address perl module v1.907 (CVE id request) Source: MLIST Type: UNKNOWN [oss-security] 20150927 DoS attack through Email-Address perl module v1.907 (CVE id request) Source: CCN Type: oss-security Mailing List, Fri, 2 Oct 2015 17:43:40 -0400 (EDT) Re: DoS attack through Email-Address perl module v1.907 (CVE id request) Source: MLIST Type: UNKNOWN [oss-security] 20151002 Re: DoS attack through Email-Address perl module v1.907 (CVE id request) Source: XF Type: UNKNOWN perl-emailaddr-cve20157686-dos(107602) Source: CONFIRM Type: UNKNOWN https://forum.bestpractical.com/t/security-vulnerabilities-in-rt-2017-06-15/32016 Source: CCN Type: WhiteSource Vulnerability Database CVE-2015-7686 | ||||||||||||||||||||||||||||||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||||||
| Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||
| BACK | |||||||||||||||||||||||||||||||||||||||||||||