{"id":"UBUNTU-CVE-2014-4720","details":"Email::Address module before 1.904 for Perl uses an inefficient regular expression, which allows remote attackers to cause a denial of service (CPU consumption) via vectors related to \"backtracking into the phrase,\" a different vulnerability than CVE-2014-0477.","modified":"2025-07-16T07:17:18.857610Z","published":"2014-07-06T23:55:00Z","withdrawn":"2025-07-18T16:43:03Z","upstream":["CVE-2014-4720"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-4720"},{"type":"REPORT","url":"https://github.com/rjbs/Email-Address/blob/master/Changes"},{"type":"REPORT","url":"http://seclists.org/oss-sec/2014/q2/563"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2014-4720"}],"affected":[{"package":{"name":"libemail-address-perl","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/libemail-address-perl@1.905-2?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.905-2"}]}],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"libemail-address-perl","binary_version":"1.905-2"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2014/UBUNTU-CVE-2014-4720.json"}}],"schema_version":"1.7.3","severity":[{"type":"Ubuntu","score":"low"}]}