[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: CVE for hosted services

I promised on the call to describe a use case for services. Here is one 
with some branching:

A popular service/site has a vulnerability for some period of time. 
This vulnerability created an exposure for users/consumers of the 
service/site. The users/consumers would like to go back and determine 
if they have been impacted because of this exposure. In order to do 
this they will need a date range and a description of the problem (i.e. 
what part of the service was vulnerable), potential impacts on them 
(the users), and potential (or actual) exploits. While it would be 
beneficial if the service provider had all of this information, they 
may not, and now there is a need to have a long-lived identifier to 
coordinate the discussion among several different stakeholders (I would 
also argue that just communicating between the service provider and the 
customer is enough reason for the identifier). I agree collecting this 
information may not be easy at the moment, but I don't think that 
doesn't mean it isn't desirable to have it. Minimally, I think this use 
case demonstrates the need for an identifier. Perhaps once it is 
demonstrated that this information is important then it will be more 
routine for it to be tracked and available.

Hopefully, I am not too far afield with this.

-----Original Message-----
From: owner-cve-editorial-board-list@lists.mitre.org 
[mailto:owner-cve-editorial-board-list@lists.mitre.org] On Behalf Of 
Art Manion
Sent: Wednesday, February 22, 2017 4:39 PM
To: jericho <jericho@attrition.org>; Pascal Meunier 
Cc: cve-editorial-board-list <cve-editorial-board-list@LISTS.MITRE.ORG>
Subject: Re: CVE for hosted services

On 2017-02-22 16:19, jericho wrote:
> On Wed, 22 Feb 2017, Pascal Meunier wrote:
> : I'm afraid that the description of the entries, for issues on 
> services
> : like facebook.com, would be typically very vague and unverifiable.  
> I'm
> : rather annoyed by existing entries that read like "a problem in X, 
> but
> : different from CVE-1234-5678 and CVE-1234-7890".  What is the 
> issue? 
> : What lessons could be learned from this?  What should we teach not 
> to
> : do, or teach to do better?  No idea.
> Good point.
> Also consider that such descriptions would almost never carry version 
> information and be based more on *approximate* dates. We often hear 
> Facebook "fixed a vuln" but days or weeks after it really happened. 
> Since versions are a huge tool for determining potential duplicate 
> issues, without that would be painful.

Agreed, there's likely pain for cataloging purposes (de-duplication) 
and low value for engineering purposes.  But the overriding factor for 
me is
*identification* (and yes, for ID to work, it has to be possible to 
distinguish different vulnerabilities).

CVE throws light on vulnerabilities.  Probably weekly, without looking, 
I come across issues that don't have CVE IDs assigned and therefore 
aren't noticed by people who might benefit from knowing.  I make a note 
to send in a minimum viable entry, but haven't yet.

Oh, services have CVEs?  Airplanes?  Dentist office software?  Oh, 
large services freely admit they have vulnerabilities, and fix them?
Users/customers actually like such transparency?

Vulnerabilities are common and everywhere and aren't terribly special 
individually.  Name them and go about your choice of defensive 
activities, probably including vulnerability management.

 - Art

Page Last Updated or Reviewed: February 24, 2017