Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.
References
Link | Resource |
---|---|
http://lua-users.org/lists/lua-l/2021-11/msg00186.html | Exploit Mailing List Technical Description Vendor Advisory |
http://lua-users.org/lists/lua-l/2021-12/msg00007.html | Exploit Mailing List Vendor Advisory |
http://lua-users.org/lists/lua-l/2021-12/msg00015.html | Mailing List Vendor Advisory |
http://lua-users.org/lists/lua-l/2021-12/msg00030.html | Mailing List Vendor Advisory |
https://github.com/Lua-Project/lua-5.4.4-sandbox-escape-with-new-vulnerability | Exploit Third Party Advisory |
Configurations
History
21 Mar 2022, 05:17
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) http://lua-users.org/lists/lua-l/2021-11/msg00186.html - Exploit, Mailing List, Technical Description, Vendor Advisory | |
References | (MISC) http://lua-users.org/lists/lua-l/2021-12/msg00030.html - Mailing List, Vendor Advisory | |
References | (MISC) https://github.com/Lua-Project/lua-5.4.4-sandbox-escape-with-new-vulnerability - Exploit, Third Party Advisory | |
References | (MISC) http://lua-users.org/lists/lua-l/2021-12/msg00007.html - Exploit, Mailing List, Vendor Advisory | |
References | (MISC) http://lua-users.org/lists/lua-l/2021-12/msg00015.html - Mailing List, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 6.3 |
CPE | cpe:2.3:a:lua:lua:*:*:*:*:*:*:*:* | |
CWE | CWE-416 |
14 Mar 2022, 15:51
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-03-14 15:15
Updated : 2024-02-04 22:29
NVD link : CVE-2021-44964
Mitre link : CVE-2021-44964
CVE.ORG link : CVE-2021-44964
JSON object : View
Products Affected
lua
- lua
CWE
CWE-416
Use After Free