6.3 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
0.001 Low
EPSS
Percentile
31.4%
lua5 is vulnerable to privilege escalation. The vulnerability exists due to a Use after free in garbage collector and finalizer of lgc.c allowing an attacker to perform Sandbox Escape via a crafted script file.
CPE | Name | Operator | Version |
---|---|---|---|
lua5.4:sid | eq | 5.4.1-1 | |
lua5.4:sid | eq | 5.4.2-2 | |
lua5.4:bookworm | eq | 5.4.3-1 | |
lua5.4:sid | eq | 5.4.1-1 | |
lua5.4:sid | eq | 5.4.2-2 | |
lua5.4:bookworm | eq | 5.4.3-1 |
lua-users.org/lists/lua-l/2021-11/msg00186.html
lua-users.org/lists/lua-l/2021-12/msg00007.html
lua-users.org/lists/lua-l/2021-12/msg00015.html
lua-users.org/lists/lua-l/2021-12/msg00030.html
github.com/Lua-Project/lua-5.4.4-sandbox-escape-with-new-vulnerability
security-tracker.debian.org/tracker/CVE-2021-44964
6.3 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
0.001 Low
EPSS
Percentile
31.4%