CVE-2023-49558: n/a in n/a
An issue in YASM 1.3.0.86.g9def allows a remote attacker to cause a denial of service via the expand_mmac_params function in the modules/preprocs/nasm/nasm-pp.c component.
AI Analysis
Technical Summary
CVE-2023-49558 is a medium-severity vulnerability identified in YASM version 1.3.0.86.g9def, specifically within the expand_mmac_params function located in the modules/preprocs/nasm/nasm-pp.c component. YASM is an assembler used for compiling assembly language code, often utilized in software development and reverse engineering contexts. The vulnerability allows a remote attacker to cause a denial of service (DoS) condition. The attack vector requires local access (AV:L), meaning the attacker must have local access to the system where YASM is running. The attack complexity is low (AC:L), no privileges are required (PR:N), but user interaction is necessary (UI:R). The scope is unchanged (S:U), and the impact affects availability only (A:H), with no impact on confidentiality or integrity. This suggests that exploitation leads to a crash or hang of the YASM process, disrupting its normal operation and potentially affecting dependent build or analysis workflows. No known exploits are currently reported in the wild, and no patches or vendor advisories are linked, indicating that mitigation may require manual code updates or workarounds. The lack of a specified vendor or product name beyond YASM limits the ability to pinpoint affected distributions or software bundles that include this assembler. Given the nature of YASM as a development tool, the attack surface is primarily development environments or build systems that incorporate YASM for assembling code.
Potential Impact
For European organizations, the primary impact of this vulnerability lies in disruption of software development and build processes that rely on YASM. Organizations involved in software development, embedded systems, or reverse engineering that use YASM could experience denial of service conditions, leading to delays in build pipelines or analysis tasks. While this does not directly compromise data confidentiality or integrity, the availability impact can affect operational efficiency and project timelines. In critical infrastructure or industries with stringent development cycles (e.g., automotive, aerospace, telecommunications), such disruptions could cascade into broader operational delays. However, since exploitation requires local access and user interaction, the risk of widespread remote attacks is limited. Organizations with strict access controls and user policies may face lower risk. The absence of known exploits reduces immediate threat levels but does not eliminate the need for vigilance, especially in environments where YASM is integrated into automated build or continuous integration systems.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first identify all instances of YASM 1.3.0.86.g9def in their environments, particularly within development and build systems. Since no official patches are currently available, organizations should consider the following specific actions: 1) Restrict local access to systems running YASM to trusted users only, minimizing the risk of unauthorized local exploitation. 2) Implement strict user interaction policies and monitor for unusual activity involving YASM processes. 3) Where feasible, replace or upgrade YASM to a later version if available, or apply community patches if any exist. 4) Integrate YASM execution within sandboxed or containerized environments to limit the impact of potential crashes. 5) Enhance logging and monitoring around build systems to quickly detect and respond to denial of service symptoms. 6) Coordinate with software supply chain teams to assess dependencies on YASM and prepare contingency plans for build disruptions. 7) Engage with the open-source community or maintainers of YASM for updates or patches addressing this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-2023-49558: n/a in n/a
Description
An issue in YASM 1.3.0.86.g9def allows a remote attacker to cause a denial of service via the expand_mmac_params function in the modules/preprocs/nasm/nasm-pp.c component.
AI-Powered Analysis
Technical Analysis
CVE-2023-49558 is a medium-severity vulnerability identified in YASM version 1.3.0.86.g9def, specifically within the expand_mmac_params function located in the modules/preprocs/nasm/nasm-pp.c component. YASM is an assembler used for compiling assembly language code, often utilized in software development and reverse engineering contexts. The vulnerability allows a remote attacker to cause a denial of service (DoS) condition. The attack vector requires local access (AV:L), meaning the attacker must have local access to the system where YASM is running. The attack complexity is low (AC:L), no privileges are required (PR:N), but user interaction is necessary (UI:R). The scope is unchanged (S:U), and the impact affects availability only (A:H), with no impact on confidentiality or integrity. This suggests that exploitation leads to a crash or hang of the YASM process, disrupting its normal operation and potentially affecting dependent build or analysis workflows. No known exploits are currently reported in the wild, and no patches or vendor advisories are linked, indicating that mitigation may require manual code updates or workarounds. The lack of a specified vendor or product name beyond YASM limits the ability to pinpoint affected distributions or software bundles that include this assembler. Given the nature of YASM as a development tool, the attack surface is primarily development environments or build systems that incorporate YASM for assembling code.
Potential Impact
For European organizations, the primary impact of this vulnerability lies in disruption of software development and build processes that rely on YASM. Organizations involved in software development, embedded systems, or reverse engineering that use YASM could experience denial of service conditions, leading to delays in build pipelines or analysis tasks. While this does not directly compromise data confidentiality or integrity, the availability impact can affect operational efficiency and project timelines. In critical infrastructure or industries with stringent development cycles (e.g., automotive, aerospace, telecommunications), such disruptions could cascade into broader operational delays. However, since exploitation requires local access and user interaction, the risk of widespread remote attacks is limited. Organizations with strict access controls and user policies may face lower risk. The absence of known exploits reduces immediate threat levels but does not eliminate the need for vigilance, especially in environments where YASM is integrated into automated build or continuous integration systems.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first identify all instances of YASM 1.3.0.86.g9def in their environments, particularly within development and build systems. Since no official patches are currently available, organizations should consider the following specific actions: 1) Restrict local access to systems running YASM to trusted users only, minimizing the risk of unauthorized local exploitation. 2) Implement strict user interaction policies and monitor for unusual activity involving YASM processes. 3) Where feasible, replace or upgrade YASM to a later version if available, or apply community patches if any exist. 4) Integrate YASM execution within sandboxed or containerized environments to limit the impact of potential crashes. 5) Enhance logging and monitoring around build systems to quickly detect and respond to denial of service symptoms. 6) Coordinate with software supply chain teams to assess dependencies on YASM and prepare contingency plans for build disruptions. 7) Engage with the open-source community or maintainers of YASM for updates or patches addressing this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2023-11-27T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f0dc1182aa0cae27ff31d
Added to database: 6/3/2025, 2:59:13 PM
Last enriched: 7/4/2025, 5:39:55 AM
Last updated: 11/30/2025, 10:29:10 PM
Views: 31
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-35028: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in 0x4m4 HexStrike AI
CriticalCVE-2025-13793: Cross Site Scripting in winston-dsouza Ecommerce-Website
MediumCVE-2025-13792: Code Injection in Qualitor
MediumCVE-2025-13791: Path Traversal in Scada-LTS
MediumCVE-2025-13790: Cross-Site Request Forgery in Scada-LTS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.