[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Should be a CVE?



On 2017-09-25 18:02, Skinner, Chad wrote:
> Art,
>       Should I assume silence as consent and re-submit with the 
> changed wording?

That would be my recommendation.

 - Art


> -----Original Message-----
> From: Art Manion [mailto:amanion@cert.org] 
> Sent: Monday, September 18, 2017 3:07 PM
> To: Coffin, Chris <ccoffin@mitre.org>; Waltermire, David A. (Fed) 
> <david.waltermire@nist.gov>; Millar, Thomas 
> <Thomas.Millar@hq.dhs.gov>; Kurt Seifried <kurt@seifried.org>; Kent 
> Landfield <bitwatcher@gmail.com>
> Cc: cve-editorial-board-list 
> <cve-editorial-board-list@lists.mitre.org>; Skinner, Chad 
> <chad.skinner@intel.com>; Latif, Magid <magid.latif@intel.com>; 
> Landfield, Kent B <kent.b.landfield@intel.com>; Kidby, Brian 
> <brian.kidby@intel.com>
> Subject: Re: Should be a CVE?
> 
> I had an offline conversation with Intel, posting the following on 
> their behalf.
> 
> 
> There seem to have been some conversations regarding this CVE that 
> look to be tied to my lack of mentioning "anti-rollback" bypass.  
> I've updated the description to better add this, thoughts?
> 
> [CVEID]: CVE-2017-5698
> [PRODUCT]:Intel® Active Management Technology, Intel® Standard 
> Manageability, and Intel® Small Business Technology [VERSION]:version 
> 11.0.25.3001 and 11.0.26.3000 [PROBLEMTYPE]:Escalation of Privilege 
> [REFERENCES]:https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00082&languageid=en-fr
> [DESCRIPTION]: Intel® Active Management Technology, Intel® Standard 
> Manageability, and Intel® Small Business Technology firmware versions 
> 11.0.25.3001 and 11.0.26.3000 anti-rollback will not prevent 
> upgrading to firmware version 11.6.x.1xxx which is vulnerable to 
> CVE-2017-5689 and can be performed by a local user with 
> administrative privileges.
> 
> BTW - I used "escalation of privilege" due to the second CVE, can't 
> figure out what to call it otherwise.
> 
> 
> My (Art's) take is that the anti-rollback feature has the 
> vulnerability -- it fails at it's stated security purpose.
> 
> I don't know what the constraints on [PROBLEMTYPE] are at the moment, 
> any valid CWE?
> 
> Maybe CWE-837: Improper Enforcement of a Single, Unique Action?
> 
> http://cwe.mitre.org/data/definitions/837.html
> 
> Or leave blank if no good match?
> 
>   - Art
> 
> 
> 
> 
> 
> 
> 
> On 9/13/17 9:15 AM, Coffin, Chris wrote:
>>   * My ability to install/upgrade/downgrade to any software versions 
>> does not get a CVE ID, even if what I'm moving to has known CVD IDs.
>>
>> Completely agree with Art on this. Based on the current information, 
>> the "install/upgrade/downgrade to any software" issue is not a 
>> vulnerability on its own and should not have a CVE ID assigned.
>>
>>   * Intel/MITRE should reject the new CVE and update the original. 
>> Is this correct?
>>
>> Yes. I believe that this is the most appropriate way to handle the 
>> situation. We will be reaching out to our Intel CNA contact for 
>> additional information, unless Kent chimes in sooner. J
>>
>> Chris C
>>
>> *From:*owner-cve-editorial-board-list@lists.mitre.org 
>> [mailto:owner-cve-editorial-board-list@lists.mitre.org] *On Behalf 
>> Of 
>> *Waltermire, David A. (Fed)
>> *Sent:* Tuesday, September 12, 2017 5:32 PM
>> *To:* Millar, Thomas <Thomas.Millar@hq.dhs.gov>; Kurt Seifried 
>> <kurt@seifried.org>; Art Manion <amanion@cert.org>
>> *Cc:* cve-editorial-board-list 
>> <cve-editorial-board-list@lists.mitre.org>
>> *Subject:* RE: Should be a CVE?
>>
>> This makes sense. So if this is the case, Intel/MITRE should reject 
>> the new CVE and update the original. Is this correct?
>>
>> Dave
>>
>> -------- Original Message --------
>> From: "Millar, Thomas" <Thomas.Millar@hq.dhs.gov 
>> <mailto:Thomas.Millar@hq.dhs.gov>>
>> Date: Tue, September 12, 2017 5:49 PM -0400
>> To: Kurt Seifried <kurt@seifried.org <mailto:kurt@seifried.org>>, 
>> Art 
>> Manion <amanion@cert.org <mailto:amanion@cert.org>>
>> CC: "Waltermire, David A. (Fed)" <david.waltermire@nist.gov 
>> <mailto:david.waltermire@nist.gov>>, 
>> cve-editorial-board-list@lists.mitre.org 
>> <mailto:cve-editorial-board-list@lists.mitre.org>
>> Subject: RE: Should be a CVE?
>>
>> It should probably be an update to the previous SA & CVE by Intel. 
>> The two particular 3XXX firmware versions are not safe, despite what 
>> the original advisory stated.
>>
>>
>>
>> Tom Millar, US-CERT
>>
>> Sent from +1-202-631-1915
>> https://www.us-cert.gov **
>>
>> **
>>
>> ----------------------------------------------------------------------
>> ----------------------------------------------------------------------
>> ----------------------------------------------------------------------
>> ----------------------------------------------------------------------
>> ----------------------------------------------------------------------
>> ----------------------------------------------------------------------
>> ----------------------------------------------------------------------
>> ----------------------------------------------------------------------
>> ----------------------------------------------------------------------
>> ----------------------------------------------------------------------
>> ----------------------------------------------------------------------
>> ----------------------------------------------------------------------
>> ----------------------------------------------------------------------
>> ----------------------------------------------------------------------
>> ----------
>>
>> *From:*owner-cve-editorial-board-list@lists.mitre.org 
>> <mailto:owner-cve-editorial-board-list@lists.mitre.org> on behalf of 
>> Kurt Seifried
>> *Sent:* Tuesday, September 12, 2017 10:44:52 PM
>> *To:* Art Manion
>> *Cc:* Waltermire, David A. (Fed); 
>> cve-editorial-board-list@lists.mitre.org 
>> <mailto:cve-editorial-board-list@lists.mitre.org>
>> *Subject:* Re: Should be a CVE?
>>
>> I'm not clear, the CVE ID, was it assigned because people are NOT 
>> supposed to be able to upgrade or something?
>>
>> By this logic every vendor would need a CVE ID for every software 
>> package that can be updated to a version that has a flaw introduced 
>> in a later version (so like uhh.. all of them basically).
>>
>> On Tue, Sep 12, 2017 at 2:01 PM, Art Manion <amanion@cert.org 
>> <mailto:amanion@cert.org>> wrote:
>>
>>     On 2017-09-12 15:19, Waltermire, David A. (Fed) wrote:
>>      > Looking at the following, it appears that a CVE was issued 
>> for the potential that someone might upgrade software to a 
>> vulnerable version, which has another CVE. I don't think this should 
>> qualify as a CVE, given the actual vulnerability already has one.
>>      >
>>      > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5698
>>      >
>>      > Should this CVE be rejected?
>>
>>     I think it should be rejected.
>>
>>     Version A1 has vulnerability V1, version B1 has vulnerability 
>> V2, V1 and V2 are documented (have CVE IDs), the ability to change 
>> from V1 to V2 does not warrant a CVE ID.
>>
>>     My ability to install/upgrade/downgrade to any software versions 
>> does not get a CVE ID, even if what I'm moving to has known CVD IDs.
>>
>>     Intel is welcome to release an advisory, upgrading and being 
>> newly/differently vulnerable is unexpected, which goes to the core 
>> of many vulnerability/security issues.  But no CVE ID.
>>
>>       - Art
>>
>>
>>
>> --
>>
>> Kurt Seifried
>> kurt@seifried.org <mailto:kurt@seifried.org>
>>
> 


Page Last Updated or Reviewed: September 26, 2017