Perl 'email: address' local DoS Vulnerability
Release date:
Updated on:
Affected Systems:
Perl Email: Address <1.905
Description:
--------------------------------------------------------------------------------
Bugtraq id: 68084
CVE (CAN) ID: CVE-2014-0477
Perl is a high-level, general, literal, and dynamic programming language. Email: Address is a module used for parsing and creating RFC 2822 addresses.
In versions earlier than Email: Address 1.905, the local denial of service vulnerability exists in the implementation of Email: Address: parse. After successful exploitation, local attackers can cause a denial of service.
Perl obtains cpu usage
Linux Socket for inter-machine communication (Perl)
Pop and push functions in Perl
[Perl script] finds the error information in the log and sends an email
Extract data from MySQL using Perl for statistical analysis code
<* Source: Bastian Blank
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
Perl
----
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
[1] https://metacpan.org/release/Email-Address
[2] https://github.com/rjbs/Email-Address/commit/83f8306117115729ac9346523762c0c396251eb5
[3] https://github.com/rjbs/Email-Address/blob/master/Changes
This article permanently updates the link address: