Search for vulnerabilities
Vulnerability details: VCID-8znp-mys9-aaah
Vulnerability ID VCID-8znp-mys9-aaah
Aliases CVE-2012-4412
Summary Integer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a heap-based buffer overflow.
Status Published
Exploitability 2.0
Weighted Severity 6.8
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
epss 0.04621 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.04621 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.04621 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.04621 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.04621 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.04621 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.04621 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.04621 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.04621 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.04621 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.04621 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.04621 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.04621 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.04621 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.20081 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.20081 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.20081 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.27471 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.27471 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.27471 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.27471 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.27471 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.27471 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.27471 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.27471 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.27471 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.27471 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.27471 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.27471 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.27471 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.28867 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.28867 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.28867 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.28867 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.28867 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.28867 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.28867 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.28867 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.28867 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.28867 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.28867 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.28867 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.28867 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.28867 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.28867 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.28867 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.28867 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.28867 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.28867 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.28867 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.28867 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.28867 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.28867 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.28867 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.28867 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.28867 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.28867 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.28867 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.28867 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.28867 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.28867 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.28867 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.28867 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.28867 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.28867 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.28867 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.28867 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.28867 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.28867 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.28867 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
epss 0.2938 https://api.first.org/data/v1/epss?cve=CVE-2012-4412
cvssv2 7.5 https://nvd.nist.gov/vuln/detail/CVE-2012-4412
Reference id Reference type URL
http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4412.json
https://api.first.org/data/v1/epss?cve=CVE-2012-4412
https://bugzilla.redhat.com/show_bug.cgi?id=855385
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4412
http://seclists.org/fulldisclosure/2019/Jun/18
http://secunia.com/advisories/55113
http://sourceware.org/bugzilla/show_bug.cgi?id=14547
https://seclists.org/bugtraq/2019/Jun/14
https://security.gentoo.org/glsa/201503-04
http://www.mandriva.com/security/advisories?name=MDVSA-2013:283
http://www.mandriva.com/security/advisories?name=MDVSA-2013:284
http://www.openwall.com/lists/oss-security/2012/09/07/9
http://www.ubuntu.com/usn/USN-1991-1
687530 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687530
cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
CVE-2012-4412 https://nvd.nist.gov/vuln/detail/CVE-2012-4412
CVE-2012-4412;OSVDB-98142 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/37783.c
CVE-2012-4412;OSVDB-98142 Exploit https://www.securityfocus.com/bid/55462/info
USN-1991-1 https://usn.ubuntu.com/1991-1/
Data source Exploit-DB
Date added Sept. 7, 2012
Description GNU glibc - 'strcoll()' Routine Integer Overflow
Ransomware campaign use Known
Source publication date Sept. 7, 2012
Exploit type dos
Platform linux
Source update date Aug. 16, 2015
Source URL https://www.securityfocus.com/bid/55462/info
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2012-4412
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.92778
EPSS Score 0.04621
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.