Adding Additional Attributes to VuXML
Jon Passki
cykyc at yahoo.com
Tue Feb 22 07:34:37 PST 2005
--- Tom Rhodes <trhodes at FreeBSD.org> wrote:
> On Mon, 21 Feb 2005 08:03:56 -0800 (PST)
> Jon Passki <cykyc at yahoo.com> wrote:
>
> > Hello All,
>
> Hi Jon,
>
> >
> > I would like to discuss risk attributes and see if they should
> be
> > included in VuXML as some new optional elements. What I would
> like
> > to see are possibly two new elements added that describe the
> > likelihood of the vulnerability and what the vulnerability
> > produces. Neither of these elements would try to directly
> > communicate the impact of the risk (which is site-specific),
> rather
> > certain attributes that can objectively described the
> > vulnerability. Also, this is not a taxonomy, although it may
> start
> > to resemble one. It's to provide consistent information across
> > vulnerabilities.
> >
> > When I think of likelihood, I think of some of the following
> > examples:
> >
> > --) Configuration needed for successful exploitation (default
> or
> > non-default)
> > --) Needed Account Access (non-anonymous, anonymous, none)
> > --) Location of Exploitation (can be performed remotely, needs
> to
> > be local)
> >
> > When I think of the production of the vulnerability, I think of
> > some of the following examples:
> >
> > --) Network information (host names, IP addresses, MAC
> addresses,
> > etc.)
> > --) Account information (account name, individual account
> password,
> > credential reuse, privileged account access, etc.)
> > --) System/Service Information (directory names, file names,
> > configuration information, recursive resource usage, etc.)
> >
> > What I'm asking is if it makes sense to add these two
> _optional_
> > elements (or perhaps similar concepts). If it does, then I'd
> like
> > to start a discussion on the exact content (one bikeshed at a
> > time...).
>
> I'm really sorry for how late this email is but I thought you
> should get an honest reply. :)
>
> The issue with both of these elements is not just time but the
> proof of concept code. Think of it:
>
> When some bugs are located in the code, an exploit isn't really
> released to the public. That would probably have a huge effect
> on
> administrators who need to patch a large amount of systems. It
> would mean they need to work harder and faster. Personally, I
> know that I lack the time to invent an exploit for every issue
> that exists in software these days hehe.
Hmm, I don't think I was requesting PoC or exploit code.
Generally, when PoC or an exploit is publicly known it tends to put
a fire in some people (the non-paranoids out there - the paranoids
patch everything ;) So, if it does exist, or if the exploit is
trivial, then that just gets mentioned. One doesn't need to
include such code.
> Another thing, would you really want all of those exploit files
> sitting on your servers? Or the time to test them successfully
> on your specific config?
>
> Right now, we just check the version and likelyhood of effects
> on FreeBSD. Then we publish. There has been a case or two in
> the past where an item wasn't listed due to the inability for
> an exploit to affect FreeBSD. Yet, we're human and can make
> mistakes. Which is why if there is any doubt we'll list the port
> just to be safe.
>
> All in all, I think that it would be just too difficult and
> time consuming both on our side and the side of the
> administrator.
Okay, we're not on the same gamma wave :) Nope, no exploit code
should be included nor was I requesting that. This is more towards
a risk rating structure, but with as much objective and as little
subjective information as possible. I see this by defining at
least two criteria: likelihood and production. Likelihood is
affected by the ability to perform the exploit. If it's trivial or
if there's PoC/working exploit, that in general increases the
likelihood. Same with it being remotely or locally exploitable.
Same with default or non-default configurations. I wish to have
elements that could trap these values. They may be
programmatically used, or skimmed by a human.
E.g. (I dislike the names of the elements below :)
<risk>
<likely>Remote</likely>
<likely>Proof of Concept in Circulation</likely>
<produces>Privileged Account Access</produces>
</risk>
Does this make more sense?
Jon
__________________________________
Do you Yahoo!?
The all-new My Yahoo! - Get yours free!
http://my.yahoo.com
More information about the freebsd-vuxml
mailing list