Search for vulnerabilities
Vulnerability details: VCID-b8j6-pf4z-jffy
Vulnerability ID VCID-b8j6-pf4z-jffy
Aliases CVE-2018-13300
Summary In FFmpeg 3.2 and 4.0.1, an improper argument (AVCodecParameters) passed to the avpriv_request_sample function in the handle_eac3 function in libavformat/movenc.c may trigger an out-of-array read while converting a crafted AVI file to MPEG4, leading to a denial of service and possibly an information disclosure.
Status Published
Exploitability 0.5
Weighted Severity 7.3
Risk 3.6
Affected and Fixed Packages Package Details
Weaknesses (1)
Reference id Reference type URL
https://api.first.org/data/v1/epss?cve=CVE-2018-13300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13302
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14394
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1999010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1999012
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1999013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6621
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7557
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/FFmpeg/FFmpeg/commit/95556e27e2c1d56d9e18f5db34d6f756f3011148
https://github.com/FFmpeg/FFmpeg/commit/e6d3fd942f772f54ab6a5ca619cdaadef26b7702
https://www.debian.org/security/2018/dsa-4249
http://www.securityfocus.com/bid/104675
cpe:2.3:a:ffmpeg:ffmpeg:4.0.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:4.0.1:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
CVE-2018-13300 https://nvd.nist.gov/vuln/detail/CVE-2018-13300
No exploits are available.
Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:P/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2018-13300
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2018-13300
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.70988
EPSS Score 0.00695
Published At July 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:30:41.287339+00:00 Alpine Linux Importer Import https://secdb.alpinelinux.org/v3.18/community.json 37.0.0