[
Date Prev][
Date Next][
Thread Prev][
Thread Next][
Date Index][
Thread Index]
assignments for malware
- To: CVE Editorial Board <cve-editorial-board-list@mitre.org>
- Subject: assignments for malware
- From: jericho <jericho@attrition.org>
- Date: Mon, 13 Aug 2018 11:55:15 -0500 (CDT)
- Authentication-results: spf=none (sender IP is 192.52.194.235) smtp.mailfrom=attrition.org; imc.mitre.org; dkim=test (signature was verified) header.d=mitre.org;imc.mitre.org; dmarc=none action=none header.from=attrition.org;
- Delivery-date: Mon Aug 13 12:58:56 2018
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mitre.org; h=date:from:to:subject:message-id:mime-version:content-type; s=selector1; bh=jFE3WlW+dqcygeWDY7+c8oiBkehTNAToTvB5L6hbr2w=; b=cxJp3AXfYnUIIDdoI9Sx94bY4Ole74jsI0Lk3e/5qik6kOh5+HHl2vIUMIAMm7MJ0gyZvCKd6WeqX2TX3zsjLkf/p4TMJIQQbGCXGZEf9dkvoyTrdzrJe6OmcRI/PWb7h36IHnfauSQMtPRhFRB0feZn1MWCwEEL7bcsmXpsEBg=
- Spamdiagnosticmetadata: NSPM
- Spamdiagnosticoutput: 1:99
- User-agent: Alpine 2.20 (LNX 67 2015-01-07)
Board,
This year there have been an increasing number of CVE assignments for
malware; specifically 'malicious ruby gems' or 'malicious NPM modules'.
They potentially come in two varieties, and may be handled differently
depending. The first, and recent is CVE-2018-3779:
active-support ruby gem 5.2.0 could allow a remote attacker to
execute arbitrary code on the system, caused by containing a
malicious backdoor. An attacker could exploit this vulnerability
to execute arbitrary code on the system.
It isn't crystal clear from the H1 report if this was the legitimate code
being backdoored, similarly named gem via a forked project, or a gem being
distributed with a similar name (which I suspect). "The gem duplicates
official activesupport (no hyphen) code, but adds a compiled extension."
The second type is just a malicious module that has nothing to do with the
legitimate module, other than a similar name as the means for getting
people to download it. An example of that is CVE-2017-16044:
`d3.js` was a malicious module published with the intent to
hijack
environment variables. It has been unpublished by npm.
This is essentially malware, just served up via an official repository.
Since that does not represent a vulnerability in a piece of software, it
is my understanding that this would not meet the criteria for inclusion in
CVE.
Could MITRE clarify the policy on this?
Thank you,
Brian