{"id":"UBUNTU-CVE-2018-12558","details":"The parse() method in the Email::Address module through 1.909 for Perl is vulnerable to Algorithmic complexity on specially prepared input, leading to Denial of Service. Prepared special input that caused this problem contained 30 form-field characters (\"\\f\").","modified":"2025-10-24T04:47:05Z","published":"2018-06-20T14:29:00Z","upstream":["CVE-2018-12558"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-12558"},{"type":"REPORT","url":"http://www.openwall.com/lists/oss-security/2018/06/19/3"},{"type":"REPORT","url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901873"},{"type":"REPORT","url":"https://metacpan.org/pod/Email::Address"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2018-12558"}],"affected":[{"package":{"name":"libemail-address-perl","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/libemail-address-perl@1.908-1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.905-2","1.908-1"],"ecosystem_specific":{"binaries":[{"binary_name":"libemail-address-perl","binary_version":"1.908-1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-12558.json"}},{"package":{"name":"libemail-address-perl","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/libemail-address-perl@1.908-1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.908-1"],"ecosystem_specific":{"binaries":[{"binary_name":"libemail-address-perl","binary_version":"1.908-1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-12558.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]}