Skip to main content

CVE-2023-49558: n/a in n/a

Medium
VulnerabilityCVE-2023-49558cvecve-2023-49558
Published: Tue Jan 02 2024 (01/02/2024, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

An issue in YASM 1.3.0.86.g9def allows a remote attacker to cause a denial of service via the expand_mmac_params function in the modules/preprocs/nasm/nasm-pp.c component.

AI-Powered Analysis

AILast updated: 07/04/2025, 05:39:55 UTC

Technical Analysis

CVE-2023-49558 is a medium-severity vulnerability identified in YASM version 1.3.0.86.g9def, specifically within the expand_mmac_params function located in the modules/preprocs/nasm/nasm-pp.c component. YASM is an assembler used for compiling assembly language code, often utilized in software development and reverse engineering contexts. The vulnerability allows a remote attacker to cause a denial of service (DoS) condition. The attack vector requires local access (AV:L), meaning the attacker must have local access to the system where YASM is running. The attack complexity is low (AC:L), no privileges are required (PR:N), but user interaction is necessary (UI:R). The scope is unchanged (S:U), and the impact affects availability only (A:H), with no impact on confidentiality or integrity. This suggests that exploitation leads to a crash or hang of the YASM process, disrupting its normal operation and potentially affecting dependent build or analysis workflows. No known exploits are currently reported in the wild, and no patches or vendor advisories are linked, indicating that mitigation may require manual code updates or workarounds. The lack of a specified vendor or product name beyond YASM limits the ability to pinpoint affected distributions or software bundles that include this assembler. Given the nature of YASM as a development tool, the attack surface is primarily development environments or build systems that incorporate YASM for assembling code.

Potential Impact

For European organizations, the primary impact of this vulnerability lies in disruption of software development and build processes that rely on YASM. Organizations involved in software development, embedded systems, or reverse engineering that use YASM could experience denial of service conditions, leading to delays in build pipelines or analysis tasks. While this does not directly compromise data confidentiality or integrity, the availability impact can affect operational efficiency and project timelines. In critical infrastructure or industries with stringent development cycles (e.g., automotive, aerospace, telecommunications), such disruptions could cascade into broader operational delays. However, since exploitation requires local access and user interaction, the risk of widespread remote attacks is limited. Organizations with strict access controls and user policies may face lower risk. The absence of known exploits reduces immediate threat levels but does not eliminate the need for vigilance, especially in environments where YASM is integrated into automated build or continuous integration systems.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first identify all instances of YASM 1.3.0.86.g9def in their environments, particularly within development and build systems. Since no official patches are currently available, organizations should consider the following specific actions: 1) Restrict local access to systems running YASM to trusted users only, minimizing the risk of unauthorized local exploitation. 2) Implement strict user interaction policies and monitor for unusual activity involving YASM processes. 3) Where feasible, replace or upgrade YASM to a later version if available, or apply community patches if any exist. 4) Integrate YASM execution within sandboxed or containerized environments to limit the impact of potential crashes. 5) Enhance logging and monitoring around build systems to quickly detect and respond to denial of service symptoms. 6) Coordinate with software supply chain teams to assess dependencies on YASM and prepare contingency plans for build disruptions. 7) Engage with the open-source community or maintainers of YASM for updates or patches addressing this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-11-27T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f0dc1182aa0cae27ff31d

Added to database: 6/3/2025, 2:59:13 PM

Last enriched: 7/4/2025, 5:39:55 AM

Last updated: 8/13/2025, 10:17:50 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats