{"api_version":"1","generated_at":"2026-05-05T14:19:08+00:00","cve":"CVE-2018-1999012","urls":{"html":"https://cve.report/CVE-2018-1999012","api":"https://cve.report/api/cve/CVE-2018-1999012.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2018-1999012","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2018-1999012"},"summary":{"title":"CVE-2018-1999012","description":"FFmpeg before commit 9807d3976be0e92e4ece3b4b1701be894cd7c2e1 contains a CWE-835: Infinite loop vulnerability in pva format demuxer that can result in a Vulnerability that allows attackers to consume excessive amount of resources like CPU and RAM. This attack appear to be exploitable via specially crafted PVA file has to be provided as input. This vulnerability appears to have been fixed in 9807d3976be0e92e4ece3b4b1701be894cd7c2e1 and later.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2018-07-23 15:29:00","updated_at":"2019-10-03 00:03:00"},"problem_types":["CWE-835"],"metrics":[],"references":[{"url":"https://github.com/FFmpeg/FFmpeg/commit/9807d3976be0e92e4ece3b4b1701be894cd7c2e1","name":"https://github.com/FFmpeg/FFmpeg/commit/9807d3976be0e92e4ece3b4b1701be894cd7c2e1","refsource":"CONFIRM","tags":["Issue Tracking","Patch","Third Party Advisory"],"title":"avformat/pva: Check for EOF before retrying in read_part_of_packet() · FFmpeg/FFmpeg@9807d39 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00041.html","name":"[debian-lts-announce] 20190330 [SECURITY] [DLA 1740-1] libav security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 1740-1] libav security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/104896","name":"104896","refsource":"BID","tags":["Third Party Advisory","VDB Entry"],"title":"FFmpeg Multiple Security Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2018-1999012","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1999012","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2018","cve_id":"1999012","vulnerable":"1","versionEndIncluding":"4.0.1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ffmpeg","cpe5":"ffmpeg","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2018-1999012","qid":"500902","title":"Alpine Linux Security Update for ffmpeg"},{"cve":"CVE-2018-1999012","qid":"502272","title":"Alpine Linux Security Update for ffmpeg4"},{"cve":"CVE-2018-1999012","qid":"504745","title":"Alpine Linux Security Update for ffmpeg"},{"cve":"CVE-2018-1999012","qid":"504763","title":"Alpine Linux Security Update for ffmpeg4"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","DATE_ASSIGNED":"2018-07-20T20:44:32.978420","DATE_REQUESTED":"2018-07-13T16:07:18","ID":"CVE-2018-1999012","REQUESTER":"paulcher@icloud.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"FFmpeg before commit 9807d3976be0e92e4ece3b4b1701be894cd7c2e1 contains a CWE-835: Infinite loop vulnerability in pva format demuxer that can result in a Vulnerability that allows attackers to consume excessive amount of resources like CPU and RAM. This attack appear to be exploitable via specially crafted PVA file has to be provided as input. This vulnerability appears to have been fixed in 9807d3976be0e92e4ece3b4b1701be894cd7c2e1 and later."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"104896","refsource":"BID","url":"http://www.securityfocus.com/bid/104896"},{"name":"https://github.com/FFmpeg/FFmpeg/commit/9807d3976be0e92e4ece3b4b1701be894cd7c2e1","refsource":"CONFIRM","url":"https://github.com/FFmpeg/FFmpeg/commit/9807d3976be0e92e4ece3b4b1701be894cd7c2e1"},{"refsource":"MLIST","name":"[debian-lts-announce] 20190330 [SECURITY] [DLA 1740-1] libav security update","url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00041.html"}]}},"nvd":{"publishedDate":"2018-07-23 15:29:00","lastModifiedDate":"2019-10-03 00:03:00","problem_types":["CWE-835"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":6.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:N/A:C","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE","baseScore":7.1},"severity":"HIGH","exploitabilityScore":8.6,"impactScore":6.9,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*","versionEndIncluding":"4.0.1","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2018","CveId":"1999012","Ordinal":"131241","Title":"CVE-2018-1999012","CVE":"CVE-2018-1999012","Year":"2018"},"notes":[{"CveYear":"2018","CveId":"1999012","Ordinal":"1","NoteData":"FFmpeg before commit 9807d3976be0e92e4ece3b4b1701be894cd7c2e1 contains a CWE-835: Infinite loop vulnerability in pva format demuxer that can result in a Vulnerability that allows attackers to consume excessive amount of resources like CPU and RAM. This attack appear to be exploitable via specially crafted PVA file has to be provided as input. This vulnerability appears to have been fixed in 9807d3976be0e92e4ece3b4b1701be894cd7c2e1 and later.","Type":"Description","Title":null},{"CveYear":"2018","CveId":"1999012","Ordinal":"2","NoteData":"2018-07-23","Type":"Other","Title":"Published"},{"CveYear":"2018","CveId":"1999012","Ordinal":"3","NoteData":"2019-03-30","Type":"Other","Title":"Modified"}]}}}