Vulnerability Description
Buffer overflow in the vararg functions in ldo.c in Lua 5.1 through 5.2.x before 5.2.3 allows context-dependent attackers to cause a denial of service (crash) via a small number of arguments to a function with a large number of fixed arguments.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Opensuse | Opensuse | 12.3 |
| Canonical | Ubuntu Linux | 12.04 |
| Debian | Debian Linux | 7.0 |
| Lua | Lua | 5.1 |
| Mageia | Mageia | 3.0 |
Related Weaknesses (CWE)
References
- http://advisories.mageia.org/MGASA-2014-0414.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00030.htmlThird Party Advisory
- http://secunia.com/advisories/59890
- http://secunia.com/advisories/60869
- http://secunia.com/advisories/61411
- http://www.debian.org/security/2014/dsa-3015Third Party Advisory
- http://www.debian.org/security/2014/dsa-3016Third Party Advisory
- http://www.lua.org/bugs.html#5.2.2-1PatchVendor Advisory
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:144Broken Link
- http://www.openwall.com/lists/oss-security/2014/08/21/1ExploitMailing ListPatch
- http://www.openwall.com/lists/oss-security/2014/08/21/4ExploitMailing ListPatch
- http://www.openwall.com/lists/oss-security/2014/08/27/2Mailing ListThird Party Advisory
- http://www.securityfocus.com/bid/69342Third Party AdvisoryVDB Entry
- http://www.ubuntu.com/usn/USN-2338-1Third Party Advisory
- https://security.gentoo.org/glsa/201701-53
FAQ
What is CVE-2014-5461?
CVE-2014-5461 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Buffer overflow in the vararg functions in ldo.c in Lua 5.1 through 5.2.x before 5.2.3 allows context-dependent attackers to cause a denial of service (crash) via a small number of arguments to a func...
How severe is CVE-2014-5461?
CVE-2014-5461 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-5461?
Check the references section above for vendor advisories and patch information. Affected products include: Opensuse Opensuse, Canonical Ubuntu Linux, Debian Debian Linux, Lua Lua, Mageia Mageia.