### [CVE-2012-4412](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4412) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20n%2Fa%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Integer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a heap-based buffer overflow. ### POC #### Reference - http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html - http://seclists.org/fulldisclosure/2019/Jun/18 - http://sourceware.org/bugzilla/show_bug.cgi?id=14547 - https://seclists.org/bugtraq/2019/Jun/14 #### Github - https://github.com/mudongliang/LinuxFlaw - https://github.com/oneoy/cve-