Lucene search

K
amazonAmazonALAS-2014-402
HistorySep 17, 2014 - 9:44 p.m.

Medium: lua

2014-09-1721:44:00
alas.aws.amazon.com
18

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

EPSS

0.003

Percentile

69.9%

Issue Overview:

Buffer overflow in the vararg functions in ldo.c in Lua 5.1 through 5.2.x before 5.2.3 allows context-dependent attackers to cause a denial of service (crash) via a small number of arguments to a function with a large number of fixed arguments.

Affected Packages:

lua

Issue Correction:
Run yum update lua to update your system.

New Packages:

i686:  
    lua-5.1.4-4.1.9.amzn1.i686  
    lua-devel-5.1.4-4.1.9.amzn1.i686  
    lua-debuginfo-5.1.4-4.1.9.amzn1.i686  
    lua-static-5.1.4-4.1.9.amzn1.i686  
  
src:  
    lua-5.1.4-4.1.9.amzn1.src  
  
x86_64:  
    lua-devel-5.1.4-4.1.9.amzn1.x86_64  
    lua-debuginfo-5.1.4-4.1.9.amzn1.x86_64  
    lua-static-5.1.4-4.1.9.amzn1.x86_64  
    lua-5.1.4-4.1.9.amzn1.x86_64  

Additional References

Red Hat: CVE-2014-5461

Mitre: CVE-2014-5461

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

EPSS

0.003

Percentile

69.9%