Vulnerabilities > CVE-2019-6706 - Use After Free vulnerability in multiple products

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
HIGH
network
low complexity
lua
canonical
CWE-416
nessus
exploit available

Summary

Lua 5.3.5 has a use-after-free in lua_upvaluejoin in lapi.c. For example, a crash outcome might be achieved by an attacker who is able to trigger a debug.upvaluejoin call in which the arguments have certain relationships.

Vulnerable Configurations

Part Description Count
Application
Lua
1
OS
Canonical
3

Common Weakness Enumeration (CWE)

Exploit-Db

fileexploits/multiple/dos/46246.txt
idEDB-ID:46246
last seen2019-01-25
modified2019-01-25
platformmultiple
port
published2019-01-25
reporterExploit-DB
sourcehttps://www.exploit-db.com/download/46246
titleLua 5.3.5 - 'debug.upvaluejoin' Use After Free
typedos

Nessus

  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2019-0247-1.NASL
    descriptionThis update for lua53 fixes the following issues : Security issue fixed : CVE-2019-6706: Fixed a use-after-free bug in the lua_upvaluejoin function of lapi.c (bsc#1123043) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id121617
    published2019-02-06
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/121617
    titleSUSE SLED15 / SLES15 Security Update : lua53 (SUSE-SU-2019:0247-1)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2019-EE57BDA7AE.NASL
    descriptionSecurity fix for CVE-2019-6706. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id121446
    published2019-01-30
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/121446
    titleFedora 29 : lua (2019-ee57bda7ae)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2019-175.NASL
    descriptionThis update for lua53 fixes the following issues : Security issue fixed : - CVE-2019-6706: Fixed a use-after-free bug in the lua_upvaluejoin function of lapi.c (bsc#1123043) This update was imported from the SUSE:SLE-15:Update update project.
    last seen2020-06-01
    modified2020-06-02
    plugin id122222
    published2019-02-15
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/122222
    titleopenSUSE Security Update : lua53 (openSUSE-2019-175)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-1776.NASL
    descriptionAccording to the version of the lua packages installed, the EulerOS installation on the remote host is affected by the following vulnerability : - Lua 5.3.5 has a use-after-free in lua_upvaluejoin in lapi.c. For example, a crash outcome might be achieved by an attacker who is able to trigger a debug.upvaluejoin call in which the arguments have certain relationships.(CVE-2019-6706) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-05-03
    modified2019-07-25
    plugin id127013
    published2019-07-25
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/127013
    titleEulerOS 2.0 SP8 : lua (EulerOS-SA-2019-1776)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-2339.NASL
    descriptionAccording to the version of the lua packages installed, the EulerOS Virtualization for ARM 64 installation on the remote host is affected by the following vulnerability : - Lua 5.3.5 has a use-after-free in lua_upvaluejoin in lapi.c. For example, a crash outcome might be achieved by an attacker who is able to trigger a debug.upvaluejoin call in which the arguments have certain relationships.(CVE-2019-6706) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id131504
    published2019-12-03
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/131504
    titleEulerOS Virtualization for ARM 64 3.0.3.0 : lua (EulerOS-SA-2019-2339)
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-3941-1.NASL
    descriptionFady Othman discovered that Lua incorrectly handled certain scripts. An attacker could possibly use this issue to cause a denial of service. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id123933
    published2019-04-09
    reporterUbuntu Security Notice (C) 2019 Canonical, Inc. / NASL script (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/123933
    titleUbuntu 16.04 LTS / 18.04 LTS / 18.10 : lua5.3 vulnerability (USN-3941-1)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2019-3706.NASL
    descriptionAn update for lua is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language. Security Fix(es) : * lua: use-after-free in lua_upvaluejoin in lapi.c resulting in denial of service (CVE-2019-6706) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes : For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.
    last seen2020-06-01
    modified2020-06-02
    plugin id130573
    published2019-11-06
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/130573
    titleRHEL 8 : lua (RHSA-2019:3706)

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/151335/lua535-useafterfree.txt
idPACKETSTORM:151335
last seen2019-01-29
published2019-01-25
reporterFady Mohamed Osman
sourcehttps://packetstormsecurity.com/files/151335/Lua-5.3.5-Use-After-Free.html
titleLua 5.3.5 Use-After-Free

Redhat

advisories
bugzilla
id1670019
titleCVE-2019-6706 lua: use-after-free in lua_upvaluejoin in lapi.c resulting in denial of service
oval
OR
  • commentRed Hat Enterprise Linux must be installed
    ovaloval:com.redhat.rhba:tst:20070304026
  • AND
    • commentRed Hat Enterprise Linux 8 is installed
      ovaloval:com.redhat.rhba:tst:20193384074
    • OR
      • AND
        • commentlua-libs is earlier than 0:5.3.4-11.el8
          ovaloval:com.redhat.rhsa:tst:20193706001
        • commentlua-libs is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhsa:tst:20193706002
      • AND
        • commentlua-debugsource is earlier than 0:5.3.4-11.el8
          ovaloval:com.redhat.rhsa:tst:20193706003
        • commentlua-debugsource is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhsa:tst:20193706004
      • AND
        • commentlua is earlier than 0:5.3.4-11.el8
          ovaloval:com.redhat.rhsa:tst:20193706005
        • commentlua is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhsa:tst:20193706006
      • AND
        • commentlua-devel is earlier than 0:5.3.4-11.el8
          ovaloval:com.redhat.rhsa:tst:20193706007
        • commentlua-devel is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhsa:tst:20193706008
rhsa
idRHSA-2019:3706
released2019-11-05
severityModerate
titleRHSA-2019:3706: lua security and bug fix update (Moderate)
rpms
  • lua-0:5.3.4-11.el8
  • lua-debuginfo-0:5.3.4-11.el8
  • lua-debugsource-0:5.3.4-11.el8
  • lua-devel-0:5.3.4-11.el8
  • lua-libs-0:5.3.4-11.el8
  • lua-libs-debuginfo-0:5.3.4-11.el8