Search for vulnerabilities
Vulnerability details: VCID-fnav-hxbn-aaae
Vulnerability ID VCID-fnav-hxbn-aaae
Aliases CVE-2018-6621
Summary The decode_frame function in libavcodec/utvideodec.c in FFmpeg through 3.2 allows remote attackers to cause a denial of service (out of array read) via a crafted AVI file.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-6621.html
epss 0.00609 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00609 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00609 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00609 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00609 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00609 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00609 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00609 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00609 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00609 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00609 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00682 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00682 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00682 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00682 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00682 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00682 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00682 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00682 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00682 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00682 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00682 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00682 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00682 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00682 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00682 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00682 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00682 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00682 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00682 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00682 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00682 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00682 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00682 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00682 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00682 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00682 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00682 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00682 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00682 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00682 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00682 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00682 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00682 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00682 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00682 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00682 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00682 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00812 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00812 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00812 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00812 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00812 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00812 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00812 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00812 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00812 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00812 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00812 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00812 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00812 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00812 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00812 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00812 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00812 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00812 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00812 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00812 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00812 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00812 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00812 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00812 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00812 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00812 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00812 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00812 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00812 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00812 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00812 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.00928 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.01413 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.01413 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.01413 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
epss 0.01413 https://api.first.org/data/v1/epss?cve=CVE-2018-6621
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10001
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12458
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13300
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13302
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14394
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1999010
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1999012
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1999013
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6392
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6621
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7557
generic_textual Medium https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/118e1b0b3370dd1c0da442901b486689efd1654b
cvssv2 4.3 https://nvd.nist.gov/vuln/detail/CVE-2018-6621
cvssv3 6.5 https://nvd.nist.gov/vuln/detail/CVE-2018-6621
cvssv3.1 6.5 https://nvd.nist.gov/vuln/detail/CVE-2018-6621
Reference id Reference type URL
http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-6621.html
https://api.first.org/data/v1/epss?cve=CVE-2018-6621
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13302
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14394
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1999010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1999012
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1999013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6621
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7557
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/118e1b0b3370dd1c0da442901b486689efd1654b
https://github.com/FFmpeg/FFmpeg/commit/22aa37c0fedf14531783189a197542a055959b6c
https://lists.debian.org/debian-lts-announce/2019/01/msg00006.html
https://www.debian.org/security/2018/dsa-4249
http://www.securityfocus.com/bid/102950
cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
CVE-2018-6621 https://nvd.nist.gov/vuln/detail/CVE-2018-6621
No exploits are available.
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2018-6621
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2018-6621
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2018-6621
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.79030
EPSS Score 0.00609
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.