[
Date Prev][
Date Next][
Thread Prev][
Thread Next][
Date Index][
Thread Index]
Re: So some blindspots that came up as a result of CVE for service discussion
- To: Pascal Meunier <pmeunier@cerias.purdue.edu>
- Subject: Re: So some blindspots that came up as a result of CVE for service discussion
- From: Kurt Seifried <kurt@seifried.org>
- Date: Wed, 31 Oct 2018 12:48:57 -0600
- Authentication-results: spf=softfail (sender IP is 192.52.194.235) smtp.mailfrom=seifried.org; imc.mitre.org; dkim=pass (signature was verified) header.d=seifried-org.20150623.gappssmtp.com;imc.mitre.org; dmarc=none action=none header.from=seifried.org;
- Cc: Lisa Olson <elolson@microsoft.com>, CVE Editorial Board Discussion <cve-editorial-board-list@mitre.org>
- Delivery-date: Thu Nov 1 07:55:49 2018
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=seifried-org.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=Vd5+TTdIpye9MCNSQ2MyXXf16MKQq6TF+eG52XgmEDs=; b=q3JhU8sVI7sM0TGQbwmYUG/fri93+aiNs/LuTFRoHVCkYHlbALN6Zg7u3L3+RARgNh Y+I06yj4wFtm9XMT54qa8cOcLWTafzV3momBcQrS744Uk0EJjJ9IS8UHEnDgwfNiIzed VroiY84AwPTkEzBx1+0Fzb+t/v98VkHfRIfJakImbNof8Fn/htv3+0meV2zPZBacH58i GITvhOkWzxKsHty5xsWna7neakvQSi5zD04iRge0yxfAIXsNgA+MXHAc1ZBfZKA34UQo ke3TKYNNodbm1NfOQuSfeyVwABB7CqLvOU/eUS57dmBeTcMxP0oM8alUD7KnydUyPBzL jo3A==
- In-reply-to: <1541010033.5759.1.camel@cerias.purdue.edu>
- References: <CABqVa3_GT0qr2Y2Svn3J8_s0rJGELSrXTOnDL0PaO1GoRdd5=Q@mail.gmail.com> <MWHPR21MB086477D7DF851DAF614C0B93B9CD0@MWHPR21MB0864.namprd21.prod.outlook.com> <1541010033.5759.1.camel@cerias.purdue.edu>
- Spamdiagnosticmetadata: NSPM
- Spamdiagnosticoutput: 1:99
Or part of the attack is that the attacker could delete or alter the log files (e.g. a flaw in CloudTrail on AWS for example puts us into that catch-22).
Lisa,
I like that document, except for the requirement that "there is something the
customer can do, post-fix, to detect earlier exploitation." That assumes you have perfect
knowledge of what a customer would or could do, but the customer can have a different
perspective. For example, a customer may decide that the best action is to change
providers! That option will likely not be considered as something a customer can do, by
the provider, one reason being the conflict of interest.
Pascal
On Wed, 2018-10-31 at 17:20 +0000, Lisa Olson wrote:
> I’ve been brainstorming with colleagues here are Microsoft. The attached document
> distills our thoughts and provides some examples.
>
> From: Kurt Seifried <kurt@seifried.org>
> Sent: Thursday, October 25, 2018 10:32 AM
> To: cve-editorial-board-list <cve-editorial-board-list@mitre.org>
> Subject: So some blindspots that came up as a result of CVE for service discussion
>
> So we had a good CVE for services discussion today and some blindspots were identified,
> the biggest one (and something the board will have to deal with) being:
>
> CVE Database - practical vs. theoretical?
>
> So in past the CVE database has largely been for exploitable vulnerabilities, although
> we don't require proof of exploitation typically most are pretty self explanatory, We do
> have cases like the Linux Kernel where we, out of caution, assign a lot of CVE's (http:/
> /cve.mitre.org/cgi-
> bin/cvekey.cgi?keyword=linux+kernel<https://na01.safelinks.protection.outlook.com/?url="">
> ttp%3A%2F%2Fcve.mitre.org%2Fcgi-
> bin%2Fcvekey.cgi%3Fkeyword%3Dlinux%2Bkernel&data="" href="http://40microsoft.com" rel="noreferrer" target="_blank">40microsoft.com%7C559
> 77085ef7c4896844808d63a9ffe5d%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C6367608561853
> 43092&sdata=aBr1GPrl0N6oM6yXYOxgNFAPZQQ7JxWuK%2BjBNKVEjog%3D&reserved=0>;) because
> typically these flaws are found to be exploitable with enough work.
>
> However one aspect of this is that with software we can't know if it has been exploited
> or not, we don't even know in some cases who is running this stuff.
>
> This leads us to the cloud, most cloud providers do quite a bit of logging, and can in
> some cases definitely say "yes there is a vulnerability in service X, but we checked all
> our logs and it was never exploited/triggered", so in this case we definitely have a
> vulnerability, but we also have (as far as we know) definitive proof it was never
> exploited.
>
> So in this case, if we have proof it wasn't exploited, should it get a CVE or not? I can
> see arguments going both ways, but I'd like to get the Boards take on this.
>
> --
> Kurt Seifried
> kurt@seifried.org<mailto:kurt@seifried.org>
--