[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Update Disclosure Sources List - Please Vote!



On 2011-10-11 15:58 , Mann, Dave wrote:
>> From: Kent_Landfield@McAfee.com [mailto:Kent_Landfield@McAfee.com]
>> Non-OS venders should be included
>> Specifically Desktop products that are commonly seen in both corporate and
>> consumer systems
> 
> Can you name names?  That's a potentially very large list.
> 
> Would it be worth combining this with a numeric qualifier?  Say, desktop products that produce more than 10 disclosures a year? (pulling that number out of the air)

Not speaking for Kent:  Adobe, popular browser vendors, things that
parse video/images/audio, Microsoft (already covered), office suites,
maybe popular chat software...  I'm probably missing something.

>> 2.  Nice to have
>>    *   ZDI
>>    *   Exploit-DB
>>    *   MSVR - Microsoft Vulnerability Research Advisories
>>    *   iDefense
>>    *   cisco-sa-xxxxxxxx-xxx (Cisco Security Advisories)
>>    *   Htxxxx (Apple)
>>    *   VMSA (Vmware Security Advisories)
>>    *   CNVD (China National Vulnerability Database)
>>    *   Metasploit Module Ids
> 
> Some of these are behind pay-walls, no?
> 
> CVE charter is to provide ids for "publicly available" vulnerabilities.  
> 
> I don't consider things behind pay-walls as publicly available.  My mind could be changed on that but it would need to be a good argument.

I think it's reasonable to stick with publicly available.  The stuff
behind the pay walls usually/eventually comes out, then it can get a CVE
ID.  The discloser might even be a CNA, or at least request CVE IDs as
the vuls come out publicly.  I wouldn't suggest trying to track hints
about upcoming releases or non-public vuls -- costly and inaccurate.


 - Art


 
Page Last Updated: November 06, 2012