[
Date Prev
][
Date Next
][
Thread Prev
][
Thread Next
][
Date Index
][
Thread Index
]
Re: assignments for malware
-
To
: Kurt Seifried <
kurt@seifried.org
>
-
Subject
: Re: assignments for malware
-
From
: jericho <
jericho@attrition.org
>
-
Date
: Mon, 13 Aug 2018 14:31:33 -0500
-
Authentication-results
: spf=none (sender IP is 192.52.194.235) smtp.mailfrom=attrition.org; imc.mitre.org; dkim=none (message not signed) header.d=none;imc.mitre.org; dmarc=none action=none header.from=attrition.org;
-
Cc
: CVE Editorial Board <
cve-editorial-board-list@mitre.org
>
-
Delivery-date
: Mon Aug 13 15:54:23 2018
-
In-reply-to
: <CABqVa38yfbG7dSZ3Fz=VVCaSFoCSUGma7vUF7ramQHqw6N3UiQ@mail.gmail.com>
-
References
: <
alpine.LNX.2.20.1808131148090.14361@forced.attrition.org
> <CABqVa38yfbG7dSZ3Fz=VVCaSFoCSUGma7vUF7ramQHqw6N3UiQ@mail.gmail.com>
-
Spamdiagnosticmetadata
: NSPM
-
Spamdiagnosticoutput
: 1:99
-
User-agent
: Alpine 2.20 (LNX 67 2015-01-07)
On Mon, 13 Aug 2018, Kurt Seifried wrote:
: A backdoor is a vulnerability. I think the problem is CVE in past
dealt
: with "oops we make a mistake" and not "oops, a malicious actor did it
on
: purpose".
:
: Doesn't matter to the end user, well actually it does, backdoors are
: worse because someone for sure knows about the vulnerability and most
: likely intended to use it. So do these things need CVEs, tracking and
: remediation for people affected by it? Yes.
:
: I'm trying to imagine a scenario where a software or service user
goes
: "oh, this exploitable flaw is a backdoor, thus no CVE, thus we don't
: need to remediate it" and uhh.. I can't imagine that, not even close.
Granted. But a malicious module that has a similar name as another
isn't a
backdoor.