[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Qualcom (and other) Android CVE IDs



Case in point from today. These two CVE do not give any indication 
which 
ID applies to which issue reported, despite the report numbering them 
(1), 
(2), and (3). This has been a growing problem for a couple months now, 
even with open source assignments.

Name: CVE-2017-9622
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9622
Assigned: 20170614
CONFIRM:https://github.com/Telaxus/EPESI/commit/48fb5e81cd7a47d98bade092a5a72d8177621dbd
Reference: CONFIRM:https://github.com/Telaxus/EPESI/issues/186

Multiple cross-site scripting (XSS) vulnerabilities in Telaxus/EPESI
1.8.2 and earlier allow remote attackers to inject arbitrary web script
or HTML via crafted common data.


======================================================
Name: CVE-2017-9623
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9623
Assigned: 20170614
CONFIRM:https://github.com/Telaxus/EPESI/commit/48fb5e81cd7a47d98bade092a5a72d8177621dbd
Reference: CONFIRM:https://github.com/Telaxus/EPESI/issues/186

Multiple cross-site scripting (XSS) vulnerabilities in Telaxus/EPESI
1.8.2 and earlier allow remote attackers to inject arbitrary web script
or HTML via crafted country data.

Brian


On Wed, 14 Jun 2017, Pascal Meunier wrote:

: Those entries are certainly vague and I wish they had more details, 
but
: they absolutely are worth having.  I would suggest not making "Impact"
: required.  The CVE's fundamental mission is to uniquely identify
: vulnerabilities.  I don't like, but am willing to accept, entries that
: are so poor in information that only some people can uniquely 
identify a
: vulnerability based on it, on an optimistic basis that these people 
are
: trustworthy in this regard.  Obviously this is far from the ideal 
case,
: and for CVEs to be academically useful much more information is 
needed,
: but it's better than nothing.  
: 
: What concerns me the most is that nobody could differentiate between 2
: CVE entries.  This has happened for example when an entry contains
: something like this in the description: "but different from CVE-...".
: If you need to specify that, it's a strong indication that your 
entries
: are much too vague right from the start.  I think there should be a
: commitment from sources to provide enough information, or a refusal 
from
: CNAs, so that this turn of phrase is never needed.
: 
: Pascal
: 
: On Tue, 2017-06-06 at 18:34 -0600, Kurt Seifried wrote:
: > One comment: are we going to make IMPACT a required field at some 
point?
: > I'm wondering if CVEs such as:
: > 
: > 
http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=unspecified+impact+via+
: > unknown+vectors+apple
: > 
: > are worth having? There's no mention of the CVE in the github repo 
for the
: > software:
: > 
: > 
https://github.com/nghttp2/nghttp2/search?utf8=%E2%9C%93&q=CVE-2017-2428&type=
: > 
: > There's nothing much in the Apple release notes:
: > 
: > https://support.apple.com/en-ca/HT207615
: > 
: > Impact: A malicious HTTP/2 server may be able to cause undefined 
behavior
: > 
: > Description: Multiple issues existed in nghttp2 before 1.17.0. 
These were
: > addressed by updating nghttp2 to version 1.17.0.
: > 
: > 
: > 
: > On Tue, Jun 6, 2017 at 12:53 PM, Beverly Finch 
<beverlyfinch@lenovo.com>
: > wrote:
: > 
: > > I suppose one of the charts in the deck we reviewed in the past 
few weeks
: > > addresses this problem where number of CVEs is reserved but not 
'published.'
: > > If Qualcomm (and others) are publishing the CVEs without 
submitting the
: > > descriptions back to Mitre, shouldn't someone be reaching out to 
them to
: > > 'remind' them of the process?
: > > Or would this be a full time job for someone?
: > >
: > >
: > >
: > > Regards,
: > >
: > >
: > > Beverly M Finch, PMP
: > > PSIRT Program Manager
: > > Product Security Office
: > >
: > > 7001 Development Drive
: > > Office 3N-C1
: > > Morrisville, NC  27560
: > >
: > > +1 919 294 5873
: > > beverlyfinch@lenovo.com
: > >
: > >
: > >
: > > Lenovo.com
: > > Twitter | Facebook | Instagram | Blogs | Forums
: > >
: > >
: > >
: > >
: > >
: > >
: > >
: > > -----Original Message-----
: > > From: owner-cve-editorial-board-list@lists.mitre.org [mailto:
: > > owner-cve-editorial-board-list@lists.mitre.org] On Behalf Of
: > > kseifried@redhat.com
: > > Sent: Tuesday, June 6, 2017 11:13 AM
: > > To: Art Manion; cve-editorial-board-list@lists.mitre.org
: > > Subject: Re: Qualcom (and other) Android CVE IDs
: > >
: > > On 06/06/2017 08:25 AM, Art Manion wrote:
: > > > Good to see CVE used to identify vulnerabilities:
: > > >
: > > >
: > > > 
https://source.android.com/security/bulletin/2017-06-01#qualcomm-close
: > > > d-source-components
: > > >
: > > > but there's little or no information about any of these
: > > vulnerabilities.  Lots of RESERVED.
: > > >
: > > > This touches on the use of CVE for "internal" finds.  There's 
value in
: > > having a public label, but the lack of even summary information 
(minimal
: > > CVE entry) is problematic.
: > > >
: > > >  - Art
: > >
: > > Also the thread on oss-sec:
: > >
: > > http://seclists.org/oss-sec/2017/q2/378
: > >
: > > With some interesting notes like:
: > >
: > > http://seclists.org/oss-sec/2017/q2/380
: > >
: > > =======
: > > I don't know about apple itself but in the clusterfuzz reports I 
see 4
: > > public bugs about sqlite. However they have a very small (2 days) 
range of
: > > regression, i.e. a commit made in those two days causes the 
problem.
: > > I didn't check, but I suspect they didn't go in any release.
: > >
: > > FTR, the time you are seeing in the regression range is UTC:
: > > https://github.com/google/oss-fuzz/issues/563
: > >
: > > At this point I don't know if apple referer to those issues or the
: > > mentioned issues are not public.
: > >
: > > --
: > > Agostino Sarubbo
: > > =======
: > >
: > > Basically these issues have CVE's but I (nor anyone else really) 
has any
: > > clue what is actually affected and if we need to deal with it or 
not.
: > > Kind of defeats the point :P.
: > >
: > >
: > >
: > > --
: > >
: > > Kurt Seifried -- Red Hat -- Product Security -- Cloud PGP A90B 
F995 7350
: > > 148F 66BF 7554 160D 4553 5E26 7993 Red Hat Product Security 
contact:
: > > secalert@redhat.com
: > >
: > 
: > 
: > 
: 


Page Last Updated or Reviewed: June 15, 2017