[
Date Prev][
Date Next][
Thread Prev][
Thread Next][
Date Index][
Thread Index]
Re: Should be a CVE?
- To: "Skinner, Chad" <chad.skinner@intel.com>, "Coffin, Chris" <ccoffin@mitre.org>, "Waltermire, David A. (Fed)" <david.waltermire@nist.gov>, "Millar, Thomas" <Thomas.Millar@hq.dhs.gov>, Kurt Seifried <kurt@seifried.org>, Kent Landfield <bitwatcher@gmail.com>
- Subject: Re: Should be a CVE?
- From: Art Manion <amanion@cert.org>
- Date: Mon, 25 Sep 2017 21:54:53 -0400
- Authentication-results: spf=none (sender IP is 129.83.29.2) smtp.mailfrom=LISTS.MITRE.ORG; mitre.mail.onmicrosoft.com; dkim=none (message not signed) header.d=none;mitre.mail.onmicrosoft.com; dmarc=none action=none header.from=cert.org;
- Cc: cve-editorial-board-list <cve-editorial-board-list@lists.mitre.org>, "Latif, Magid" <magid.latif@intel.com>, "Landfield, Kent B" <kent.b.landfield@intel.com>, "Kidby, Brian" <brian.kidby@intel.com>
- Delivery-date: Tue Sep 26 07:51:24 2017
- Dkim-filter: OpenDKIM Filter v2.11.0 taper.sei.cmu.edu v8Q1sw0j029603
- In-reply-to: <4F315272E51FAA4B80E7B91CED1D7CEB93A715F7@ORSMSX112.amr.corp.intel.com>
- List-help: <mailto:LISTSERV@LISTS.MITRE.ORG?body=INFO%20CVE-EDITORIAL-BOARD-LIST>
- List-owner: <mailto:CVE-EDITORIAL-BOARD-LIST-request@LISTS.MITRE.ORG>
- List-subscribe: <mailto:CVE-EDITORIAL-BOARD-LIST-subscribe-request@LISTS.MITRE.ORG>
- List-unsubscribe: <mailto:CVE-EDITORIAL-BOARD-LIST-unsubscribe-request@LISTS.MITRE.ORG>
- References: <CY4PR09MB14953DFC3F3EB1910B66DEDCF0690@CY4PR09MB1495.namprd09.prod.outlook.com> <88597820-8f62-2437-521c-8bcc87041cac@cert.org> <CABqVa39fj0BY8CMnv0GnZvGOuu=Ad+f_KmD159SQK8=Y5uV7YQ@mail.gmail.com> <7748E4BAEC3B964387F3535351DCBA1F01153DCF9C@D2ASEPREA010> <dk3ixt85odid5m994b4viu7b.1505255500279@email.android.com> <DM5PR09MB14522ED29419B2CE35520865A16E0@DM5PR09MB1452.namprd09.prod.outlook.com> <bb7d7469-c745-5d67-b4d5-40b845be9bc9@cert.org> <4F315272E51FAA4B80E7B91CED1D7CEB93A715F7@ORSMSX112.amr.corp.intel.com>
- Sender: <owner-cve-editorial-board-list@lists.mitre.org>
- Spamdiagnosticmetadata: 5952c28dcc454f0789fb433d26f936ef
- Spamdiagnosticoutput: 1:2
- User-agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:52.0) Gecko/20100101 Thunderbird/52.3.0
On 2017-09-25 18:02, Skinner, Chad wrote:
> Art,
> Should I assume silence as consent and re-submit with the
> changed wording?
That would be my recommendation.
- Art
> -----Original Message-----
> From: Art Manion [mailto:amanion@cert.org]
> Sent: Monday, September 18, 2017 3:07 PM
> To: Coffin, Chris <ccoffin@mitre.org>; Waltermire, David A. (Fed)
> <david.waltermire@nist.gov>; Millar, Thomas
> <Thomas.Millar@hq.dhs.gov>; Kurt Seifried <kurt@seifried.org>; Kent
> Landfield <bitwatcher@gmail.com>
> Cc: cve-editorial-board-list
> <cve-editorial-board-list@lists.mitre.org>; Skinner, Chad
> <chad.skinner@intel.com>; Latif, Magid <magid.latif@intel.com>;
> Landfield, Kent B <kent.b.landfield@intel.com>; Kidby, Brian
> <brian.kidby@intel.com>
> Subject: Re: Should be a CVE?
>
> I had an offline conversation with Intel, posting the following on
> their behalf.
>
>
> There seem to have been some conversations regarding this CVE that
> look to be tied to my lack of mentioning "anti-rollback" bypass.
> I've updated the description to better add this, thoughts?
>
> [CVEID]: CVE-2017-5698
> [PRODUCT]:Intel® Active Management Technology, Intel® Standard
> Manageability, and Intel® Small Business Technology [VERSION]:version
> 11.0.25.3001 and 11.0.26.3000 [PROBLEMTYPE]:Escalation of Privilege
> [REFERENCES]:https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00082&languageid=en-fr
> [DESCRIPTION]: Intel® Active Management Technology, Intel® Standard
> Manageability, and Intel® Small Business Technology firmware versions
> 11.0.25.3001 and 11.0.26.3000 anti-rollback will not prevent
> upgrading to firmware version 11.6.x.1xxx which is vulnerable to
> CVE-2017-5689 and can be performed by a local user with
> administrative privileges.
>
> BTW - I used "escalation of privilege" due to the second CVE, can't
> figure out what to call it otherwise.
>
>
> My (Art's) take is that the anti-rollback feature has the
> vulnerability -- it fails at it's stated security purpose.
>
> I don't know what the constraints on [PROBLEMTYPE] are at the moment,
> any valid CWE?
>
> Maybe CWE-837: Improper Enforcement of a Single, Unique Action?
>
> http://cwe.mitre.org/data/definitions/837.html
>
> Or leave blank if no good match?
>
> - Art
>
>
>
>
>
>
>
> On 9/13/17 9:15 AM, Coffin, Chris wrote:
>> * My ability to install/upgrade/downgrade to any software versions
>> does not get a CVE ID, even if what I'm moving to has known CVD IDs.
>>
>> Completely agree with Art on this. Based on the current information,
>> the "install/upgrade/downgrade to any software" issue is not a
>> vulnerability on its own and should not have a CVE ID assigned.
>>
>> * Intel/MITRE should reject the new CVE and update the original.
>> Is this correct?
>>
>> Yes. I believe that this is the most appropriate way to handle the
>> situation. We will be reaching out to our Intel CNA contact for
>> additional information, unless Kent chimes in sooner. J
>>
>> Chris C
>>
>> *From:*owner-cve-editorial-board-list@lists.mitre.org
>> [mailto:owner-cve-editorial-board-list@lists.mitre.org] *On Behalf
>> Of
>> *Waltermire, David A. (Fed)
>> *Sent:* Tuesday, September 12, 2017 5:32 PM
>> *To:* Millar, Thomas <Thomas.Millar@hq.dhs.gov>; Kurt Seifried
>> <kurt@seifried.org>; Art Manion <amanion@cert.org>
>> *Cc:* cve-editorial-board-list
>> <cve-editorial-board-list@lists.mitre.org>
>> *Subject:* RE: Should be a CVE?
>>
>> This makes sense. So if this is the case, Intel/MITRE should reject
>> the new CVE and update the original. Is this correct?
>>
>> Dave
>>
>> -------- Original Message --------
>> From: "Millar, Thomas" <Thomas.Millar@hq.dhs.gov
>> <mailto:Thomas.Millar@hq.dhs.gov>>
>> Date: Tue, September 12, 2017 5:49 PM -0400
>> To: Kurt Seifried <kurt@seifried.org <mailto:kurt@seifried.org>>,
>> Art
>> Manion <amanion@cert.org <mailto:amanion@cert.org>>
>> CC: "Waltermire, David A. (Fed)" <david.waltermire@nist.gov
>> <mailto:david.waltermire@nist.gov>>,
>> cve-editorial-board-list@lists.mitre.org
>> <mailto:cve-editorial-board-list@lists.mitre.org>
>> Subject: RE: Should be a CVE?
>>
>> It should probably be an update to the previous SA & CVE by Intel.
>> The two particular 3XXX firmware versions are not safe, despite what
>> the original advisory stated.
>>
>>
>>
>> Tom Millar, US-CERT
>>
>> Sent from +1-202-631-1915
>> https://www.us-cert.gov **
>>
>> **
>>
>> ----------------------------------------------------------------------
>> ----------------------------------------------------------------------
>> ----------------------------------------------------------------------
>> ----------------------------------------------------------------------
>> ----------------------------------------------------------------------
>> ----------------------------------------------------------------------
>> ----------------------------------------------------------------------
>> ----------------------------------------------------------------------
>> ----------------------------------------------------------------------
>> ----------------------------------------------------------------------
>> ----------------------------------------------------------------------
>> ----------------------------------------------------------------------
>> ----------------------------------------------------------------------
>> ----------------------------------------------------------------------
>> ----------
>>
>> *From:*owner-cve-editorial-board-list@lists.mitre.org
>> <mailto:owner-cve-editorial-board-list@lists.mitre.org> on behalf of
>> Kurt Seifried
>> *Sent:* Tuesday, September 12, 2017 10:44:52 PM
>> *To:* Art Manion
>> *Cc:* Waltermire, David A. (Fed);
>> cve-editorial-board-list@lists.mitre.org
>> <mailto:cve-editorial-board-list@lists.mitre.org>
>> *Subject:* Re: Should be a CVE?
>>
>> I'm not clear, the CVE ID, was it assigned because people are NOT
>> supposed to be able to upgrade or something?
>>
>> By this logic every vendor would need a CVE ID for every software
>> package that can be updated to a version that has a flaw introduced
>> in a later version (so like uhh.. all of them basically).
>>
>> On Tue, Sep 12, 2017 at 2:01 PM, Art Manion <amanion@cert.org
>> <mailto:amanion@cert.org>> wrote:
>>
>> On 2017-09-12 15:19, Waltermire, David A. (Fed) wrote:
>> > Looking at the following, it appears that a CVE was issued
>> for the potential that someone might upgrade software to a
>> vulnerable version, which has another CVE. I don't think this should
>> qualify as a CVE, given the actual vulnerability already has one.
>> >
>> > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5698
>> >
>> > Should this CVE be rejected?
>>
>> I think it should be rejected.
>>
>> Version A1 has vulnerability V1, version B1 has vulnerability
>> V2, V1 and V2 are documented (have CVE IDs), the ability to change
>> from V1 to V2 does not warrant a CVE ID.
>>
>> My ability to install/upgrade/downgrade to any software versions
>> does not get a CVE ID, even if what I'm moving to has known CVD IDs.
>>
>> Intel is welcome to release an advisory, upgrading and being
>> newly/differently vulnerable is unexpected, which goes to the core
>> of many vulnerability/security issues. But no CVE ID.
>>
>> - Art
>>
>>
>>
>> --
>>
>> Kurt Seifried
>> kurt@seifried.org <mailto:kurt@seifried.org>
>>
>