[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: CVE for hosted services

On Mon, 27 Feb 2017, Art Manion wrote:

: On 2017-02-24 17:30, jericho wrote:
: > Do NOT, uner any cicumstance, use 'CVE' as part of the ID scheme. 
There is 
: > absolutely no logical or beneficial reason to do so.
: I had assumed not changing the scheme, but hadn't given it a lot of 
: thought.  Not sure I see a logical or beneficial reason to create a 
: separate "service" scheme, but I'm not necessarily against it either.

Honestly, not sure how you could say that today. To wit...

: > - CVE supported two prefix schemes for a decade (CVE and CAN).
: There was a reason for two schemes, the world changed, and CVE 
: I recall it being cumbersome at best (although it was probably 
: worthwhile in the early years of CVE).

*WAS* a reason... "the world changed"... "CVE evolved"

How can you say all of that, and not see the benefit of using a 
designation. This is a text-book list of reasons to change the prefix.

: What does CAN/CVE mean in this discussion?
: > - Many orgs will not want to track online services, and mixing them 
: >   make that very painful for 'coverage [metrics|percentage]' etc.
: > - Some orgs may be more interested in cloud/service offering 
: >   (e.g. companies that exist for cloudy services themselves)
: Seems reasonable.  Is there another way to flag "service" vulns?

Uh... yeah. Virtually no one does it now. And if you find someone that 
does it, and is actively updating it, they do NOT do it in the context 
CVE, VulnDB, XF, BID, CERT, or any other traditional vulnerability 

I say this as someone who helped try to start a 501c3 version to track 
site-specific vulns (originally in the context of outages, then in 
Either we were ahead of the curve, or no one really cares.

In 2017? I know a few care, I understand why we're having this 
conversation. We figured tracking that many years ago was a thing, 
it actually was. So... as someone way ahead of the curve? Track it, all 
day long. Just don't try to do it in the same context of CVE.

: > - For the countless vuln tourists (both individual and companies) 
that do 
: >   yearly stats entirely based on CVE and not understanding CVE at 
: >   this will forever make ALL stats they generate entirely 
worthless. I 
: >   mean, they are already worthless, but this will make it more so.
: Counting is broken, for many reasons, which you know better than most.

I do. It might be the single thing that I would EVER accept someone 
calling me an 'expert' on.

: That's as much a function of the nature of vulnerabilities as it is 
: effort anybody puts in to counting.
: Identification, identification, identification.

True, and also 'cute'. Not many of us out there that track vulns to a 
specific degree. A large part of my disconnect from the board over the 
years is that most "do CVE" for their own purposes. I have called that 
too in the past.

To quote your line, which *absolutely* speaks to the point:

: Identification, identification, identification.

But.. that isn't predicated upon combining two radically different 
concepts, into a unified ID scheme. And no one, at all, on this board 
argue they are not radically different concepts (in our world).

17 years of CVE, no site-specific other than when ignorant resaerchers 
requested an ID, got an assignment, and later disclosed a site-specific 
issue. Oh, yeah, sorry... not counting IBM, a CNA, who did it once or 
twice =) (love you Scott!)

17 years of *firm* rules... well, mostly firm until the CVE board 
who didn't really read the rules in some cases, suggested such 
site-specific assignments should be a thing... and I had to call out 
on that policy, who specifically said "no site-specific"... and then a 
months later said "well... maybe site-specific"...

My point is, let's just be clear what was hardcoded rules for 
two decades... and what was introduced in the last 12 months (not for 
first time)... and now there is a growing discussion of changing the 
of CVE radically... (and hey, if this is evolution, fine!), but no one 
immediately speaking up to support the stupidly logical evolution of 
it a new C*E project".


CVE, CWE, CME, CPE, and several other C*E that didn't make it. That is 
MITRE way. While many joke about it, including me, it is actually the 
logical, efficient, and practical way to expand CVE scope.

Anyone who suggests that site-specific vulns should be wrapped into CVE 
rather than being split into a new C*E project? 

This is where I draw the line. Feel free to step over it.

: > - Did I mention there is no logical reason to mix them under a 
unified CVE 
: >   identifier? =)
: You did, but I throw the tautology flag :)

Yeah, the tautology (great word!), was by design, to help ensure that 
one made a quick emotional vote, withouth consider the impact.


Page Last Updated or Reviewed: February 27, 2017