[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: CVE Information Sources & Scope

I already sent my ratings along with a lot of other feedback to Dave, but should share my scoring (see inline) with the board as well (Dave: Hindsight made me change a couple of the ratings + I added scores for the other suggested sources).

Generally, I believe that VDBs (at least the 2-3 major ones like Secunia, OSVDB, and SecurityFocus) are important resources to monitor as information there will be referenced a lot by other sources. Preferably all vulnerability reports covered by these VDBs should have CVEs assigned.


> Government Information Sources
>   US-CERT Advisories (aka CERT-CC Advisories)
+ M

>   US-CERT Vulnerability Notes (CERT-CC)
+ M

>   US-CERT Bulletins (aka Cyber-Notes)
+ N

>   DoD IAVAs
+ I

+ I

+ I

>   CIAC
+ I

> CNA Published Information
+ M (goes for all CNAs)

> Non-CNA Vendor Advisories
+ M (all major software vendors)
>   Suse
+ M

>   Mandriva
+ I (not that popular anymore)

>   HP-UX
+ M (HP in general)

>   SCO
+ I (not very active anymore)

>   AIX
+ M (IBM in general)

>   Cisco IOS
+ M (Cisco in general)

>   Free BSD
+ M

>   Open BSD
+ M

>   Net BSD
+ N

>   Gentoo (Linux)
+ I (not very active anymore)

>   Ubuntu (Linux)
+ N

> Mailing Lists & VDBs
>   Bugtraq
+ M

>   Vuln-Watch
+ I

>   VulnDev
+ I

>   Full Disclosure
+ N (from a CVE perspective the noise ratio is too high to consider it "must have" - most relevant info is also sent to bugtraq and if not then it will still be caught by the VDBs and can be spotted there).

>   Security Focus
+ M (I'm a bit between "must have" and "nice to have" since the publicly available info doesn't really provide anything not already available from Secunia and OSVDB; leaning towards "must have" as some still seem to find it useful).

>   Security Tracker
+ I

+ M (focuses a lot on covering "everything" including unstable software (not covered by Secunia) and old, historic issues that do not affect later version (partially covered by Secunia) - it's, therefore, a nice complement to Secunia).

>   ISS X-Force
+ N (primarily due to their coverage of IBM vulnerabilities)

+ I (pretty much dead, random coverage, and provides no info not already available elsewhere (just links to various resources now))

>   Secunia
+ M (obviously! ;-) Our verification process daily results in extra details being added to advisories not available in the original vulnerability reports. Secunia is also a CNA (CVEs are assigned for internally discovered vulnerabilities and vulnerabilities coordinated on behalf of external researchers) and original source of a lot of vulnerability reports[1]).

[1]: http://secunia.com/community/research/

>   Packet Storm
+ N (most of it is available on exploit-db.com, which I personally find to be a better source)

> Exploit-DB.com
+ M

>   SecuriTeam
+ I

>   SANS Mailing List (Qualys)
+ I

>   Neohapsis (Security Threat Watch)
+ I

> Metasploit
+ I (great project but not that useful from a CVE perspective as it's seldom an original source)

> Snort
+ I

> Contagiodump.blogspot.com
+ N

> Oss-security
+ M

> Additions....
> APSA / APSB - Adobe
+ M

+ N (original source for a lot of reports, but information will also be available e.g. on monitored mailing lists)

> MSVR - Microsoft Vulnerability Research Advisories
+ N

> iDefense
+ N

> VMSA (Vmware Security Advisories)
+ M

> CNVD (China National Vulnerability Database)
+ N

+ N


Med venlig hilsen / Kind regards

Carsten H. Eiram
Chief Security Specialist

Follow us on twitter

Mikado House
Rued Langgaards Vej 8
2300 Copenhagen S

Phone   +45 7020 5144
Fax       +45 7020 5145

Page Last Updated or Reviewed: November 06, 2012