|
|
eEye Digital Security
http://www.eeye.com/
Retina® Network Security Scanner
http://www.eeye.com/retina
Provide a short description of how and where your capability is made available to your customers and the public (required):
Information stored in Retina® is available to users of the product during scanning, reporting and remediation; and for lookup directly from the auditing screen.
Describe how and where your capability indicates the most recent CVE version used to create or update its mappings (required):
Each audit file carries the database version number. The version number is also displayed in the product about box.
Indicate how often you plan on updating the mappings to reflect new CVE versions and describe your approach to keeping reasonably current with CVE versions when mapping them to your repository (recommended):
eEye has a dedicated research team that maintains the audits database. Within a few hours of vulnerability announcement Retina® audits will be updated; CVE versions are updated with each of our updates.
Describe how and where you explain to your customers the timeframe they should expect an update of your capability's mappings to reflect a newly released CVE version (recommended):
eEye Digital Security releases updates on a daily basis as vulnerabilities are discovered, we update our audits. Changes to the CVE database are updated in the same manner.
Provide a copy, or directions to its location, of where your documentation describes CVE and CVE compatibility for your customers (required):
CVE information is located in the product help-file under the headings Features->CVE Support, Retina Audit Wizard->Tracking Info, and Retina Audits Search.
Provide a copy, or directions to its location, of where your documentation describes the specific details of how your customers can use CVE names to find the individual security elements within your capability's repository (required):
Specific instructions are in the Modifying Audit Groups section of the user manual, though, related CVE names are always shown when viewing audits.
Provide a copy, or directions to its location, of where your documentation describes the process a user would follow to find the CVE names associated with individual security elements within your capability's repository (required):
Related CVE names, with links to the CVE, are always displayed with individual security elements within our database.
If your documentation includes an index, provide a copy of the items and resources that you have listed under "CVE" in your index. Alternately, provide directions to where these "CVE" items are posted on your web site (recommended):
CVE information is located in the product help-file under the headings Features->CVE Support, Retina Audit Wizard->Tracking Info, and Retina Audits Search.
If CVE candidates are supported or used, explain how you indicate that candidates are not accepted CVE entries (required):
The CAN- prefix is used for all candidates to differentiate them from CVE entries that have the CVE- prefix.
If CVE candidates are supported or used, explain where and how the difference between candidates and entries is explained to your customers (recommended):
The CVE name links directly back to the CVE online database and the Candidate information is displayed at the top of the page.
If CVE candidates are supported or used, explain your policy for changing candidates into entries within your capability and describe where and how this is communicated to your customers (recommended):
We are subscribed to the CVE mailing list and update CAN/CVE listings regularly. Customers aren't specifically told as they will automatically see the new reference and be linked to the correct definition.
If CVE candidates are supported or used, explain where and how a customer can find the explanation of your search function's ability to look for candidates and entries by using just the YYYY-NNNN portion of the CVE names (recommended):
Within the product there is a section called "Audits" from that window, the customer just enters the number portion of the name in the "Look For" box and we'll find either one.
If CVE candidates are supported or used, explain where and how a customer can find the explanation of your search function's support for retrieving the CVE entry for a candidate that is no longer a candidate (recommended):
CVE candidates are supported as described in number 14.
If CVE candidates are supported or used, explain where and how you tell your users how up-to-date your candidate information is (recommended):
The CVE database number is in the "About" box for the software and the candidate information links directly back to the CVE list at Mitre.
Give detailed examples and explanations of how a user can locate tasks in the tool by looking for their associated CVE name (required):
Within the product the customer selects the Audit tab and then the Audits sub-tab (or Menu->Tools->Audit Groups). At that point the customer will be presented with this screen:
The customer then types in the YYYY-NNNN portion of the name and will see the above results. From there the customer sees the category (ours), the Description of the vulnerability, our estimated risk, instructions on fixing it, links to the patch or vendor and links to both the CVE and BugTraq entries.
Give detailed examples and explanations of how, for reports that identify individual security elements, the tool allows the user to determine the associated CVE names for the individual security elements in the report (required):
The CVE (if available) name is listed in the report for any vulnerability found on a machine. An excerpt from a remediation report is below.
Internet Explorer 6 SP1 Cumulative Patch 818529
Category:
Miscellaneous
Description:
Two critical vulnerabilities were discovered in Internet Explorer 6 SP1 and earlier that could allow an attacker to execute arbitrary code upon a victim's machine through malicious HTML. The first is a buffer overflow resulting from a specially-crafted
Risk Level:
High
How To Fix:
Install the appropriate Microsoft hotfix.
Related Links:
eEye Digital Security Advisory on Object Tag Type Bug
- http://www.eeye.com/html/research/advisories/
Microsoft Knowledge Base Article Q818529
- http://support.microsoft.com/default.aspx?scid=kb;en-us;Q818529
Microsoft Security Bulletin MS03-020
- http://www.microsoft.com/technet/security/bulletin/MS03-020.aspCVE:
CAN-2003-0344
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0344, CAN-2003-0309
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0309Affected Machines:
IP Address
Machine Name
OS
192.168.002.025
WKS003
Windows XP, Service Pack 1
Give detailed examples and explanations of how a user can obtain a listing of all of the CVE names that are associated with the tool's tasks (recommended):
Within the product the customer selects the Audit tab and then the Audits sub-tab (or Menu->Tools->Audit Groups). And then select the CVE sub-tab. The customer will see this screen with all available CVE names and their descriptions:
Alternatively, the customer could follow the steps in 17 and enter the problem, such as DCOM and would be presented with a list of audits, each one containing the CVE name and link in addition to the other required information. As below:
Describe the steps and format that a user would use to select a set of tasks by providing a file with a list of CVE names (recommended):
As in 19 above, the customer can select the desired tasks from the list of CVE names or search for each required CVE name and select the associated task from there (17).
Describe the steps that a user would follow to browse, select, and deselect a set of tasks for the tool by using individual CVE names (recommended):
Follow the steps in 19 and select/deselect the desired CVE tasks.
Provide a description of how the tool notifies the user that task associated to a selected CVE name cannot be performed (recommended):
As a scanner, the task is an audit, which is always performed. If access to perform an audit is not available, the user is notified in the product scan log. Otherwise the scan is performed and the user is notified of any problems.
Provide details about the different electronic document formats that you provide and describe how they can be searched for specific CVE-related text (required):
There is not a separate document for CVE-related text. The CVE names and links are available in all tasks and reports. In addition, there is a complete list (see figure in 19) of the CVE names and descriptions in the product. The audit file used by the product is either an Access database (4.x) or an XML file (5.x) that can also be searched with a text editor.
If one of the capability's standard electronic documents only lists security elements by their short names or titles provide example documents that demonstrate how the associated CVE names are listed for each individual security element (required):
CVE names are listed for each element in the interface and reports as shown in 17, 18, and 19. An individual audit (see 19) is shown here:
Provide example documents that demonstrate the mapping from the capability's individual elements to the respective CVE name(s) (recommended):
The CVE names and links are available in all tasks and reports. See 19 and 32.
Give detailed examples and explanations of how the GUI provides a "find" or "search" function for the user to identify your capability's elements by looking for their associated CVE name(s) (required):
Within the product the customer selects the Audit tab and then the Audits sub-tab (or Menu->Tools->Audit Groups). At that point the customer will be presented with this screen:
The customer then types in the YYYY-NNNN portion of the name and will see the above results. From there the customer sees the category (ours), the Description of the vulnerability, our estimated risk, instructions on fixing it, links to the patch or vendor and links to both the CVE and BugTraq entries.
Briefly describe how the associated CVE names are listed for the individual security elements or discuss how the user can use the mapping between CVE entries and the capability's elements, also describe the format of the mapping (required):
In all reports and audits the customer will see the Description of the vulnerability, our estimated risk, instructions on fixing it, links to the patch or vendor and links to both the CVE and BugTraq entries.
Provide details about the different electronic document formats that you provide for exporting or accessing CVE-related data and describe how they can be searched for specific CVE-related text (recommended):
There is not a separate document for exporting CVE-related data. This information is linked within each security element. However, the audit database is either an Access database or an XML file, both of which have many available tools for searching.
Have an authorized individual sign and date the following Compatibility Statement (required):
"As an authorized representative of my organization I agree that we will abide by all of the mandatory CVE Compatibility Requirements as well as all of the additional mandatory CVE Compatibility Requirements that are appropriate for our specific type of capability."
Name: Robert S. Stull
Title: Retina Product Manager
Have an authorized individual sign and date the following accuracy Statement (recommended):
"As an authorized representative of my organization and to the best of my knowledge, there are no errors in the mapping between our capability's Repository and the CVE entries our capability identifies."
Name: Robert S. Stull
Title: Retina Product Manager
FOR TOOLS ONLY - Have an authorized individual sign and date the following statement about your tools efficiency in identification of security elements (required):
"As an authorized representative of my organization and to the best of my knowledge, normally when our capability reports a specific security element, it is generally correct and normally when an event occurs that is related to a specific security element our capability generally reports it."
Name: Robert S. Stull
Title: Retina Product Manager