Bug 1218521 (CVE-2023-49558)

Summary: VUL-0: CVE-2023-49558: yasm: denial of service via the expand_mmac_params function in the modules/preprocs/nasm/nasm-pp.c component.
Product: [Novell Products] SUSE Security Incidents Reporter: SMASH SMASH <smash_bz>
Component: IncidentsAssignee: Adam Majer <amajer>
Status: RESOLVED WONTFIX QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P3 - Medium CC: andrea.mattiazzo
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/389899/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-49558:5.0:(AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description SMASH SMASH 2024-01-03 16:27:34 UTC
An issue in YASM 1.3.0.86.g9def allows a remote attacker to cause a denial of service via the expand_mmac_params function in the modules/preprocs/nasm/nasm-pp.c component.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-49558
https://github.com/yasm/yasm/issues/252
Comment 3 Andrea Mattiazzo 2024-01-04 10:17:03 UTC
As agreed, closed as wontfix
Comment 4 Andrea Mattiazzo 2024-01-04 11:05:17 UTC
Just to add more info, closed as wontfix due to the context of yasm tool: an attacker could directly insert malicious code in the input file, there is no additional value gathered from exploiting the vulnerability creating an ad-hoc input file.