[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: CVE Information Sources & Scope



Comments inline. Feel free to contact me if you have any questions or comments about my assignments.

Thanks and regards,
Ken Williams, Director
CA Technologies Product Vulnerability Response Team
CA Technologies Business Unit Operations
wilja22@ca.com - 816-914-4225

-----Original Message-----
From: owner-cve-editorial-board-list@lists.mitre.org [mailto:owner-cve-editorial-board-list@lists.mitre.org] On Behalf Of Mann, Dave
Sent: Tuesday, October 04, 2011 9:40 AM
To: cve-editorial-board-list
Subject: CVE Information Sources & Scope

Folks,

I've been away at a conference and just back so thought I would nudge the conversation regarding CVE forward.

We really need to push further on questions of scope before we can talk about staffing, speed and quality issues.

Below (under my sig file) is a list of possible information sources that CVE could use.  This list is not meant to be complete, or even framed in the most helpful way.   But, I want to get some form of specifics out to foster more discussion.

I've organized this into 4 groups: Government Information Sources, CNA Published Information, Non-CNA Vendor Advisories, Mailing Lists & VDBs.

Please review each sub-list and categorize each information source as:
+ must have
+ nice to have
+ should be ignored

The yard-stick by which to consider these is, does CVE need to capture vulnerabilities from this source in order to full-fill its charter?

Also, if you see any "must have" or "nice to have"  information source, please add them to the list and 


-Dave
==================================================================
David Mann | Principal Infosec Scientist | The MITRE Corporation
------------------------------------------------------------------
e-mail:damann@mitre.org | cell:781.424.6003 ==================================================================


Government Information Sources
+ must have  US-CERT Advisories (aka CERT-CC Advisories)
+ must have  US-CERT Vulnerability Notes (CERT-CC)
+ must have  US-CERT Bulletins (aka Cyber-Notes)
+ must have  DoD IAVAs
+ nice to have  NISCC
+ nice to have  AUS-CERT
+ nice to have  CIAC


CNA Published Information
+ must have  CMU/CERT-CC
+ must have  Microsoft
+ must have  RedHat
+ nice to have  Debian
+ must have  Apache
+ must have  Apple OSX
+ must have  Oracle

  
Non-CNA Vendor Advisories
+ must have  Solaris 
+ must have  Suse 
+ must have  Mandriva
+ must have  HP-UX
+ should be ignored  SCO
+ must have  AIX
+ must have  Cisco IOS
+ must have  Free BSD
+ must have  Open BSD
+ must have  Net BSD
+ must have  Gentoo (Linux)
+ must have  Ubuntu (Linux)



Mailing Lists & VDBs
+ must have  Bugtraq
+ should be ignored  Vuln-Watch 
+ should be ignored  VulnDev
+ must have  Full Disclosure
+ must have  Security Focus
+ must have  Security Tracker
+ must have  OSVDB
+ nice to have  ISS X-Force
+ nice to have  FRSIRT
+ must have  Secunia
+ must have  Packet Storm
+ nice to have  SecuriTeam
+ should be ignored  SANS Mailing List (Qualys)
+ should be ignored  Neohapsis (Security Threat Watch)




 
Page Last Updated: November 06, 2012