CVE-2014-5461
Summary
| CVE | CVE-2014-5461 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2014-09-04 17:55:00 UTC |
| Updated | 2023-05-03 12:15:00 UTC |
| Description | Buffer overflow in the vararg functions in ldo.c in Lua 5.1 through 5.2.x before 5.2.3 allows context-dependent attackers to cause a denial of service (crash) via a small number of arguments to a function with a large number of fixed arguments. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Debian -- Security Information -- DSA-3015-1 lua5.1 |
DEBIAN |
www.debian.org |
Third Party Advisory |
| Security Advisory SA60869 - Ubuntu update for lua5.1 - Secunia |
SECUNIA |
secunia.com |
|
| openSUSE-SU-2014:1145-1: moderate: lua |
SUSE |
lists.opensuse.org |
Third Party Advisory |
| Support / Security / Advisories / / MDVSA-2015:144 | Mandriva |
MANDRIVA |
www.mandriva.com |
Broken Link |
| Lua: Buffer overflow (GLSA 201701-53) — Gentoo security |
GENTOO |
security.gentoo.org |
|
| oss-security - Re: Lua CVE request [was Re: CVE request: possible overflow in vararg functions] |
MLIST |
www.openwall.com |
Mailing List, Third Party Advisory |
| Security Advisory SA59890 - Debian update for lua5.1 and lua5.2 - Secunia |
SECUNIA |
secunia.com |
|
| oss-security - CVE request: possible overflow in vararg functions |
MLIST |
www.openwall.com |
Exploit, Mailing List, Patch, Third Party Advisory |
| Mageia Advisory: MGASA-2014-0414 - Updated lua and lua5.1 packages fix security vulnerability |
CONFIRM |
advisories.mageia.org |
Third Party Advisory |
| Lua: Multiple Vulnerabilities (GLSA 202305-23) — Gentoo security |
GENTOO |
security.gentoo.org |
|
| USN-2338-1: Lua vulnerability | Ubuntu |
UBUNTU |
www.ubuntu.com |
Third Party Advisory |
| Lua 'ldo.c' Remote Code Execution Vulnerability |
BID |
www.securityfocus.com |
Third Party Advisory, VDB Entry |
| Debian -- Security Information -- DSA-3016-1 lua5.2 |
DEBIAN |
www.debian.org |
Third Party Advisory |
| oss-security - Re: CVE request: possible overflow in vararg functions |
MLIST |
www.openwall.com |
Exploit, Mailing List, Patch, Third Party Advisory |
| Lua: bugs |
CONFIRM |
www.lua.org |
Patch, Vendor Advisory |
| About Secunia Research | Flexera |
SECUNIA |
secunia.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 671057 EulerOS Security Update for lua (EulerOS-SA-2019-2382)
- 710557 Gentoo Linux Lua Buffer overflow Vulnerability (GLSA 201701-53)
- 710717 Gentoo Linux Lua Multiple Vulnerabilities (GLSA 202305-23)