Vulnerability Name:

CVE-2022-33099 (CCN-230275)

Assigned:2022-05-20
Published:2022-05-20
Updated:2022-11-05
Summary:An issue in the component luaG_runerror of Lua v5.4.4 and below leads to a heap-buffer overflow when a recursive error occurs.
CVSS v3 Severity:7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
6.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
6.5 Medium (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)
5.7 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-787
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2022-33099

Source: XF
Type: UNKNOWN
lua-cve202233099-bo(230275)

Source: CCN
Type: Lua GIT Repository
Save stack space while handling errors

Source: MISC
Type: Patch, Third Party Advisory
https://github.com/lua/lua/commit/42d40581dd919fb134c07027ca1ce0844c670daf

Source: FEDORA
Type: Mailing List, Third Party Advisory
FEDORA-2022-b9ed35a7ad

Source: FEDORA
Type: Mailing List, Third Party Advisory
FEDORA-2022-5b5889f43a

Source: MISC
Type: Exploit, Mailing List, Vendor Advisory
https://lua-users.org/lists/lua-l/2022-05/msg00035.html

Source: MISC
Type: Exploit, Mailing List, Vendor Advisory
https://lua-users.org/lists/lua-l/2022-05/msg00042.html

Source: MISC
Type: Exploit, Mailing List, Vendor Advisory
https://lua-users.org/lists/lua-l/2022-05/msg00073.html

Source: CCN
Type: Lua GIT Repository
Lua

Source: MISC
Type: Exploit, Patch, Vendor Advisory
https://www.lua.org/bugs.html#Lua-stack%20overflow%20when%20C%20stack%20overflows%20while%20handling%20an%20error:~:text=Lua%2Dstack%20overflow%20when%20C%20stack%20overflows%20while%20handling%20an%20error

Source: CCN
Type: Mend Vulnerability Database
CVE-2022-33099

Vulnerable Configuration:Configuration 1:
  • cpe:/a:lua:lua:*:*:*:*:*:*:*:* (Version >= 5.4.2 and <= 5.4.4)

  • Configuration 2:
  • cpe:/o:fedoraproject:fedora:35:*:*:*:*:*:*:*
  • OR cpe:/o:fedoraproject:fedora:36:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/a:redhat:enterprise_linux:9:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/a:redhat:enterprise_linux:9::appstream:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/a:redhat:enterprise_linux:9::crb:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:9:*:*:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:9::baseos:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:lua:lua:5.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:lua:lua:5.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:lua:lua:5.3.5:*:*:*:*:*:*:*
  • OR cpe:/a:lua:lua:5.4.0:-:*:*:*:*:*:*
  • OR cpe:/a:lua:lua:5.4.4:*:*:*:*:*:*:*
  • OR cpe:/a:lua:lua:5.4.2:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:com.redhat.rhsa:def:20227329
    P
    RHSA-2022:7329: lua security update (Moderate)
    2022-11-02
    BACK
    lua lua *
    fedoraproject fedora 35
    fedoraproject fedora 36
    lua lua 5.1.4
    lua lua 5.2.2
    lua lua 5.3.5
    lua lua 5.4.0 -
    lua lua 5.4.4
    lua lua 5.4.2