|
|
Secunia
http://secunia.com
Secunia Website
http://secunia.com/products/corporate/VIM
Provide a short description of how and where your capability is made available to your customers and the public (required):
The CVE capability is available on our public website, our on-line customer solutions, our server editions, and the local authenticated vulnerability scanning applications.
Describe how and where your capability indicates the most recent CVE version used to create or update its mappings (required):
The Secunia database is updated continuously (daily) with CVE information. This is reflected in the documentation for the various products.
Indicate how often you plan on updating the mappings to reflect new CVE versions and describe your approach to keeping reasonably current with CVE versions when mapping them to your repository (required):
CVE is monitored continuously and as an integrated part of our vulnerability intelligence gathering. Verification of mapping accuracy is a daily and continuous process.
Describe how and where you explain to your customers the timeframe they should expect an update of your capability’s mappings to reflect newly available CVE content (required):
This is stated in the product documentation, but given the continuous and integrated CVE matching process customers will rarely see a delay exceeding 1 business day.
Describe the criteria used for determining the relevance of a given CVE Identifier to your Capability (required):
The description and the references listed in every CVE entry are compared with our own references and description. If there isn’t a sufficient match we will compare the information of third party sources and use that or contact CVE for further discussion.
Describe the mechanism used for reviewing CVE for content changes (required):
The CVE database is downloaded daily and all changes from the previous version are manually reviewed.
Describe the source of your CVE content (required):
We always take the content directly from cve.mitre.org.
Provide a copy, or directions to its location, of where your documentation describes CVE and CVE compatibility for your customers (required):
Provide a copy, or directions to its location, of where your documentation describes the specific details of how your customers can use CVE names to find the individual security elements within your capability’s repository (required):
The documentation directs customers to the search function at: http://secunia.com/advisories/search/ where the general search includes searching by CVE (as documented on the page). In the advanced search at http://secunia.com/advisories/search/?search=&adv_search=1, the user can specifically choose to search only by CVE.
Provide a copy, or directions to its location, of where your documentation describes the process a user would follow to find the CVE names associated with individual security elements within your capability’s repository (required):
This information is contained in the same documentation as described in question 9), and is together with all the CVE information and instructions.
Give detailed examples and explanations of how a user can locate tasks in the tool by looking for their associated CVE name (required):
Via the regular or advanced search at, respectively: http://secunia.com/advisories/search/ and http://secunia.com/advisories/search/?search=&adv_search=1, the user can search for advisories by their associated CVE ids. As above, this functions using all of the possible strings: CVE-XXXX-YYYY, XXXX-YYYY, or CAN-XXXX-YYYY.
Give detailed examples and explanations of how, for reports that identify individual security elements, the tool allows the user to determine the associated CVE names for the individual security elements in the report (required):
Any advisory report on the website is supported by a Secunia Advisory. Every Secunia Advisory contains all relevant CVE references where applicable. You can view an example Secunia Advisory at http://secunia.com/advisories/42151/ and scroll down to find the list of pertinent CVEs. All advisory reports have this general format.
Give detailed examples and explanations of how a user can obtain a listing of all of the CVE names that are associated with the tool’s tasks (recommended):
Any security advisory that is found/shown as the result of any of the tool’s tasks will contain a list of relevant CVE references associated with the advisory.
Describe the steps and format that a user would use to select a set of tasks by providing a file with a list of CVE names (recommended):
Given a set of CVE Identifiers, a user can use the search function to find relevant Secunia Advisories associated with the given CVE names.
Describe the steps that a user would follow to browse, select, and deselect a set of tasks for the tool by using individual CVE names (recommended):
Users can search for CVE names and find relevant Secunia Advisories using the search functions as explained above. This in turn can lead to selecting and deselecting tasks.
Provide a description of how the tool notifies the user that task associated to a selected CVE name cannot be performed (recommended):
If no matching CVE reference is found for a given search, the search simply returns no results, indicating that the CVE name was not matched to anything in the database.
Give detailed examples and explanations of the different ways that a user can use CVE names to find out which security elements are tested or detected by the service (i.e. by asking, by providing a list, by examining a coverage map, or by some other mechanism) (required):
A user can search for a CVE name and find all related security elements (advisories) for that name in the database.
Give detailed examples and explanations of how, for reports that identify individual security elements, the user can determine the associated CVE names for the individual security elements in the report (required):
Every advisory report has a clear text list of all related CVE references. Further, each CVE listed is also a clickable link directing the user to the specific page for that CVE at Secunia’s own CVE archive. You can view a sample advisory report at: http://secunia.com/advisories/42151/
Give detailed examples and explanations of how a "find" or "search" function is available to the user to locate tasks in the online capability by looking for their associated CVE name or through an online mapping that links each element of the capability with its associated CVE name(s) (required):
A search function, as discussed above, is available that allows a user to search the database for any advisory listing a given CVE as relevant.
Provide a detailed description of how someone can use your "URL template" to interface to your capability’s search function (recommended):
Using the website advanced search, one can enter the URL template: http://secunia.com/advisories/search/?adv_search=1&s=1&search=YYYY-NNNN&vuln_cve=1 This will find all advisories which reference that particular CVE.
Further, one can look up the details for any specific CVE in Secunia’s own CVE archive by using the URL template: http://secunia.com/advisories/cve_reference/CVE-YYYY-NNNN/
If the URL template is for a CGI program, does it support the HTTP "GET" method? (recommended):
YES
Give detailed examples and explanations of how, for reports that identify individual security elements, the online capability allows the user to determine the associated CVE names for the individual security elements in the report. (required):
Each security element (advisory report) includes a list of associated CVE references, if they exist. Thus, a clear mapping is provided between each security element and its related CVEs. Any Secunia Advisory Report (such as http://secunia.com/advisories/42151/) serves as an example of this.
Give detailed examples and explanations of how a user can associated elements in the capability by looking for their associated CVE name (required):
The search functionality in each product, as discussed above, allows a user to search for any CVE identifier and get back search results consisting of all associated security elements (advisory reports) related to the CVE.
Give detailed examples and explanations of how, for reports that identify individual security elements, the capability allows the user to determine the associated CVE names for the individual security elements in the report (required):
CVE names are included directly in the Secunia Advisories.
Give detailed examples and explanations of how a user can obtain a listing of all of the CVE names that are associated with the capability’s tasks (recommended):
CVE names are included directly in the Secunia Advisories.
Describe the steps and format that a user would use to select a set of tasks by providing a file with a list of CVE names (recommended):
A user with a list of CVE names can manually search the advisory database for each CVE name. For each, they will get a list of advisories with the given CVE listed as a reference.
Describe the steps that a user would follow to browse, select, and deselect a set of tasks for the capability by using individual CVE names (recommended):
The user can search for CVE names and find relevant Secunia Advisories. This can in turn lead to selecting and deselecting tasks.
Provide details about the different electronic document formats that you provide and describe how they can be searched for specific CVE-related text (required):
All document formats are commonly available and searchable — they include HTML and PDF.
If one of the capability’s standard electronic documents only lists security elements by their short names or titles provide example documents that demonstrate how the associated CVE names are listed for each individual security element (required):
Relevant CVE names are included in all Secunia Advisories where they exist.
For example: http://secunia.com/advisories/42151/
Provide example documents that demonstrate the mapping from the capability’s individual elements to the respective CVE name(s) (recommended):
Relevant CVE names are included in all Secunia Advisories where they exist.
For example: http://secunia.com/advisories/42151/
Give detailed examples and explanations of how the GUI provides a "find" or "search" function for the user to identify your capability’s elements by looking for their associated CVE name(s) (required):
This is the same search function previously discussed for both products. Searching for CVE names is supported via a graphical text-area and "search" button.
Briefly describe how the associated CVE names are listed for the individual security elements or discuss how the user can use the mapping between CVE entries and the capability’s elements, also describe the format of the mapping (required):
Relevant CVE names are included in all Secunia Advisories where they exist.
For example: http://secunia.com/advisories/42151/
Provide details about the different electronic document formats that you provide for exporting or accessing CVE-related data and describe how they can be searched for specific CVE-related text (recommended):
Advisories can be viewed as either HTML or PDF, both of which are searchable with standard viewers. CVE related data is included in these advisories. Further, the CVE names in the HTML format can be clicked to be directed to Secunia’s own CVE archive, which also includes a link to the the original page at cve.mitre.org.
Have an authorized individual sign and date the following Compatibility Statement (required):
"As an authorized representative of my organization I agree that we will abide by all of the mandatory CVE Compatibility Requirements as well as all of the additional mandatory CVE Compatibility Requirements that are appropriate for our specific type of capability."
Name: Thomas Kristensen
Title: Chief Security Officer, Secunia
Have an authorized individual sign and date the following accuracy Statement (recommended):
"As an authorized representative of my organization and to the best of my knowledge, there are no errors in the mapping between our capability’s Repository and the CVE entries our capability identifies."
Name: Thomas Kristensen
Title: Chief Security Officer, Secunia