CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
AI Score
Confidence
High
EPSS
Percentile
69.9%
It was discovered that Lua incorrectly handled certain vararg functions
with a large number of fixed parameters. An attacker could use this issue
to cause Lua applications to crash, resulting in a denial of service, or
possibly execute arbitrary code.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 14.04 | noarch | liblua5.1-0 | < 5.1.5-5ubuntu0.1 | UNKNOWN |
Ubuntu | 14.04 | noarch | liblua5.1-0-dbg | < 5.1.5-5ubuntu0.1 | UNKNOWN |
Ubuntu | 14.04 | noarch | liblua5.1-0-dev | < 5.1.5-5ubuntu0.1 | UNKNOWN |
Ubuntu | 14.04 | noarch | lua5.1 | < 5.1.5-5ubuntu0.1 | UNKNOWN |
Ubuntu | 12.04 | noarch | liblua5.1-0 | < 5.1.4-12ubuntu1.1 | UNKNOWN |
Ubuntu | 12.04 | noarch | liblua5.1-0-dbg | < 5.1.4-12ubuntu1.1 | UNKNOWN |
Ubuntu | 12.04 | noarch | liblua5.1-0-dev | < 5.1.4-12ubuntu1.1 | UNKNOWN |
Ubuntu | 12.04 | noarch | lua5.1 | < 5.1.4-12ubuntu1.1 | UNKNOWN |