[ Date Prev ][ Date Next ][ Thread Prev ][ Thread Next ][ Date Index ][ Thread Index ]

Re: CNA Rules Announcement



On Fri, 7 Oct 2016, Chandan Nandakumaraiah wrote:

: > Moving forward sure, but retroactively trying to enforce that for
an issue
: > that is already abstracted to some degree does not work.
:
: Agreed. We need a statement or rule on the interaction between new
: assignments and assignments based on previous rules.

Also need to be careful if we unilaterally change the abstraction rules
for CVE if it breaks from a 16 year history.

: > Not sure every scanner does that. There is a lot of value in having
a
: > per-vendor finding in that case, else that single finding will come
with a
: > list of 250+ advisories that are not easily distinguished from each
other,
: > that carry the solution.
:
: We can not solve that problem by assigning 250+ different CVEs for a
: common vulnerability. That would be like going back to pre-CVE era,
: isn't it?

No. Pre-CVE there was BID (for 6 months) and X-Force (for 2 years),
neither of which really faces these kind of protocol vulns. There are
merits of each abstraction method and we should weigh the pros and cons
looking forward, not back.

: What if the product-vendor being scanned had never produced an
advisory
: or fix for the 'POODLE for TLS' issue? Which of the many CVEs should
the
: scanner use to reference that unique issue?

If they do it right, they don't reference a CVE in that case. That is
perhaps the most critically dangerous notion the board, or anyone in
security, could have; that you *must* have a CVE for it to be a valid
security issue or that an issue without a CVE is some kind of weird
thing,
when it absolutely is not. In fact, that is the norm [1] for many
companies.

Brian

[1]
http://www.csoonline.com/article/3122460/techology-business/over-6000-vulnerabilities-went-unassigned-by-mitres-cve-project-in-2015.html


Page Last Updated or Reviewed: October 11, 2016