CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H
EPSS
Percentile
28.1%
Use after free in garbage collector and finalizer of lgc.c in Lua
interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a
crafted script file.
lua-users.org/lists/lua-l/2021-11/msg00186.html
lua-users.org/lists/lua-l/2021-12/msg00007.html
lua-users.org/lists/lua-l/2021-12/msg00015.html
lua-users.org/lists/lua-l/2021-12/msg00030.html
github.com/Lua-Project/lua-5.4.4-sandbox-escape-with-new-vulnerability
launchpad.net/bugs/cve/CVE-2021-44964
nvd.nist.gov/vuln/detail/CVE-2021-44964
security-tracker.debian.org/tracker/CVE-2021-44964
www.cve.org/CVERecord?id=CVE-2021-44964
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H
EPSS
Percentile
28.1%