Search for vulnerabilities
Vulnerability details: VCID-sxdk-76zw-aaae
Vulnerability ID VCID-sxdk-76zw-aaae
Aliases CVE-2018-13300
Summary In FFmpeg 3.2 and 4.0.1, an improper argument (AVCodecParameters) passed to the avpriv_request_sample function in the handle_eac3 function in libavformat/movenc.c may trigger an out-of-array read while converting a crafted AVI file to MPEG4, leading to a denial of service and possibly an information disclosure.
Status Published
Exploitability 0.5
Weighted Severity 7.3
Risk 3.6
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-13300.html
epss 0.00206 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00206 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00206 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00206 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00206 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00206 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00206 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00206 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00206 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00206 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00206 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00206 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00695 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00695 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00695 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00695 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00695 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00695 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00695 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00695 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00695 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00695 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00695 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00695 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00722 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00722 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00722 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00722 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00722 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00722 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00722 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00722 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00722 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00722 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00722 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00722 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00722 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00722 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00722 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00722 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00722 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00722 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00722 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00722 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00722 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00722 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00722 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00722 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00722 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00722 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00722 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00722 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00722 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00722 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00722 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00722 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00722 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00722 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00722 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00722 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00722 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00722 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00722 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00722 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00737 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00737 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00737 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00737 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00737 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00737 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00737 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00737 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00737 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00737 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00737 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00737 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00737 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00737 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00737 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00737 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00737 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00737 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.00737 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
epss 0.01505 https://api.first.org/data/v1/epss?cve=CVE-2018-13300
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10001
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12458
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13300
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13302
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14394
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1999010
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1999012
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1999013
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6392
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6621
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7557
cvssv3 4.4 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv2 5.8 https://nvd.nist.gov/vuln/detail/CVE-2018-13300
cvssv3 8.1 https://nvd.nist.gov/vuln/detail/CVE-2018-13300
Reference id Reference type URL
http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-13300.html
https://api.first.org/data/v1/epss?cve=CVE-2018-13300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13302
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14394
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1999010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1999012
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1999013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6621
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7557
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/FFmpeg/FFmpeg/commit/95556e27e2c1d56d9e18f5db34d6f756f3011148
https://github.com/FFmpeg/FFmpeg/commit/e6d3fd942f772f54ab6a5ca619cdaadef26b7702
https://www.debian.org/security/2018/dsa-4249
http://www.securityfocus.com/bid/104675
cpe:2.3:a:ffmpeg:ffmpeg:4.0.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ffmpeg:ffmpeg:4.0.1:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
CVE-2018-13300 https://nvd.nist.gov/vuln/detail/CVE-2018-13300
No exploits are available.
Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:P/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2018-13300
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2018-13300
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.59004
EPSS Score 0.00206
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.