
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-49557 affects YASM version 1.3.0.86.g9def, discovered and disclosed in January 2024. This vulnerability allows a remote attacker to cause a denial of service condition through the yasm_section_bcs_first function in the libyasm/section.c component (NVD, GitHub Issue).
The vulnerability exists in the yasm_section_bcs_first function located in libyasm/section.c at line 619. The issue manifests as a segmentation violation (SEGV) when reading from an invalid memory address, specifically when attempting to access address 0x000000000040, which points to the zero page. The vulnerability has been assigned a CVSS v3.1 base score of 5.5 (MEDIUM) with the vector string CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H (NVD).
When successfully exploited, this vulnerability results in a denial of service condition through a segmentation fault, causing the application to crash. The impact is limited to availability, with no direct impact on confidentiality or integrity of the system (NVD).
The vulnerability affects YASM version 1.3.0.86.g9def, and as of the latest reports, no official patch has been released. Users are advised to monitor for updates and consider implementing access restrictions to prevent potential exploitation (Debian Tracker).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."