Vulnerability Details : CVE-2014-1474
Algorithmic complexity vulnerability in Email::Address::List before 0.02, as used in RT 4.2.0 through 4.2.2, allows remote attackers to cause a denial of service (CPU consumption) via a string without an address.
Vulnerability category: Denial of service
Products affected by CVE-2014-1474
- cpe:2.3:a:bestpractical:rt:4.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:rt:4.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:rt:4.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:email\:\:address\:\:list_project:email\:\:address\:\:list:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-1474
0.54%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 65 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-1474
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2014-1474
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-1474
-
http://lists.bestpractical.com/pipermail/rt-announce/2014-June/000257.html
[rt-announce] RT 4.2.5 releasedPatch;Vendor Advisory
-
https://metacpan.org/changes/release/ALEXMV/Email-Address-List-0.02
Changes - metacpan.orgPatch
-
http://blog.bestpractical.com/2014/01/security-vulnerability-in-rt-42.html
Security vulnerability in RT 4.2 — Best Practical SolutionsVendor Advisory
Jump to