Integer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a heap-based buffer overflow.
- http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html
- http://seclists.org/fulldisclosure/2019/Jun/18
- http://sourceware.org/bugzilla/show_bug.cgi?id=14547
- https://seclists.org/bugtraq/2019/Jun/14
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/mudongliang/LinuxFlaw
- https://github.com/oneoy/cve-