Vulnerability Name: | CVE-2021-44964 (CCN-221784) | ||||||||||||||||||
Assigned: | 2021-11-29 | ||||||||||||||||||
Published: | 2021-11-29 | ||||||||||||||||||
Updated: | 2022-03-21 | ||||||||||||||||||
Summary: | Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file. | ||||||||||||||||||
CVSS v3 Severity: | 6.3 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H) 5.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C)
3.5 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
6.1 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P)
| ||||||||||||||||||
Vulnerability Type: | CWE-416 | ||||||||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-44964 Source: MISC Type: Exploit, Mailing List, Technical Description, Vendor Advisory http://lua-users.org/lists/lua-l/2021-11/msg00186.html Source: MISC Type: Exploit, Mailing List, Vendor Advisory http://lua-users.org/lists/lua-l/2021-12/msg00007.html Source: MISC Type: Mailing List, Vendor Advisory http://lua-users.org/lists/lua-l/2021-12/msg00015.html Source: MISC Type: Mailing List, Vendor Advisory http://lua-users.org/lists/lua-l/2021-12/msg00030.html Source: XF Type: UNKNOWN lua-cve202144964-sec-bypass(221784) Source: CCN Type: Lua GIT Repository lua-5.4.4-sandbox-escape Source: MISC Type: Exploit, Third Party Advisory https://github.com/Lua-Project/lua-5.4.4-sandbox-escape-with-new-vulnerability | ||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: ![]() | ||||||||||||||||||
Oval Definitions | |||||||||||||||||||
| |||||||||||||||||||
BACK |