5
CVSSv2

CVE-2014-5461

Published: 04/09/2014 Updated: 03/05/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Buffer overflow in the vararg functions in ldo.c in Lua 5.1 up to and including 5.2.x prior to 5.2.3 allows context-dependent malicious users to cause a denial of service (crash) via a small number of arguments to a function with a large number of fixed arguments.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

opensuse opensuse 12.3

opensuse opensuse 13.1

canonical ubuntu linux 12.04

canonical ubuntu linux 14.04

debian debian linux 7.0

lua lua 5.1.3

lua lua 5.1.4

lua lua 5.1.2

lua lua 5.1.5

lua lua 5.1.1

lua lua 5.1

lua lua 5.2.1

lua lua 5.2.0

lua lua 5.2.2

mageia mageia 3.0

mageia mageia 4.0

Vendor Advisories

Lua could be made to crash or run programs ...
A heap-based overflow vulnerability was found in the way Lua, a simple, extensible, embeddable programming language, handles varargs functions with many fixed parameters called with few arguments, leading to application crashes or, potentially, arbitrary code execution For the stable distribution (wheezy), this problem has been fixed in version 5 ...
A heap-based overflow vulnerability was found in the way Lua, a simple, extensible, embeddable programming language, handles varargs functions with many fixed parameters called with few arguments, leading to application crashes or, potentially, arbitrary code execution For the stable distribution (wheezy), this problem has been fixed in version 5 ...
Buffer overflow in the vararg functions in ldoc in Lua 51 through 52x before 523 allows context-dependent attackers to cause a denial of service (crash) via a small number of arguments to a function with a large number of fixed arguments ...
Buffer overflow in the vararg functions in ldoc in Lua 51 through 52x before 523 allows context-dependent attackers to cause a denial of service (crash) via a small number of arguments to a function with a large number of fixed arguments ...
A buffer overflow in the vararg functions in ldoc in Lua 51 through 52x before 523 allows context-dependent attackers to cause a denial of service (crash) via a small number of arguments to a function with a large number of fixed arguments ...

Github Repositories

Lunacy is a fork of Lua 5.1 being actively maintained

Lunacy is a fork of Lua 515 (why 51? Because it's about 20% smaller than Lua 53 and because there’s a lot of code based on Lua 51: Roblox Luau, LuaJIT, Gopher Lua, Adobe Lightroom Classic, etc) designed to be a tiny yet powerful stand alone scripting language This is designed to be compiled as a tiny Windows binary, but it also compiles and runs in Linux (Cen