CVE-2012-4412
GNU Glibc < 2.17 - Numeric Error
Title source: ruleDescription
Integer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a heap-based buffer overflow.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Jan iankko Lieskovsky · cdoslinux
https://www.exploit-db.com/exploits/37783
github
WORKING POC
by gitcollect · cpoc
https://github.com/gitcollect/CVE_Exploits/tree/master/cve-2012-4412
References (11)
Scores
EPSS
0.1870
EPSS Percentile
95.3%
Details
CWE
CWE-189
Status
published
Products (26)
gnu/glibc
2.0
gnu/glibc
2.0.1
gnu/glibc
2.0.2
gnu/glibc
2.0.3
gnu/glibc
2.0.4
gnu/glibc
2.0.5
gnu/glibc
2.0.6
gnu/glibc
2.1
gnu/glibc
2.1.1
gnu/glibc
2.1.1.6
... and 16 more
Published
Oct 09, 2013
Tracked Since
Feb 18, 2026