CVE-2014-5461

Name
CVE-2014-5461
Description
Buffer overflow in the vararg functions in ldo.c in Lua 5.1 through 5.2.x before 5.2.3 allows context-dependent attackers to cause a denial of service (crash) via a small number of arguments to a function with a large number of fixed arguments.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Exploit http://www.openwall.com/lists/oss-security/2014/08/21/4
Third Party Advisory http://www.securityfocus.com/bid/69342
Exploit http://www.openwall.com/lists/oss-security/2014/08/21/1
Third Party Advisory http://www.debian.org/security/2014/dsa-3016
Third Party Advisory http://www.debian.org/security/2014/dsa-3015
Patch http://www.lua.org/bugs.html#5.2.2-1
Mailing List http://www.openwall.com/lists/oss-security/2014/08/27/2
SECUNIA http://secunia.com/advisories/59890
SECUNIA http://secunia.com/advisories/60869
Third Party Advisory http://www.ubuntu.com/usn/USN-2338-1
Third Party Advisory http://lists.opensuse.org/opensuse-updates/2014-09/msg00030.html
Third Party Advisory http://advisories.mageia.org/MGASA-2014-0414.html
Broken Link http://www.mandriva.com/security/advisories?name=MDVSA-2015:144
SECUNIA http://secunia.com/advisories/61411
GENTOO https://security.gentoo.org/glsa/201701-53

Match rules

CPE URI Source package Min version Max version
cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:* opensuse == None == 12.3
cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:* opensuse == None == 13.1

Vulnerable and fixed packages

Source package Branch Version Maintainer Status