Re: [Full-Disclosure] iDEFENSE Security Advisory 09.18.2002: Security Vulnerabilities in OSF1/Tru64 3.

From: Steven M. Christey (coleyat_private)
Date: Thu Sep 19 2002 - 13:44:43 PDT

  • Next message: Steven M. Christey: "Re: [Full-Disclosure] iDEFENSE Security Advisory 09.18.2002: Security Vulnerabilities in OSF1/Tru64 3."

    KF asked:
    
    >How is this different from what we disclosed?
    >http://packetstorm.decepticons.org/advisories/misc/TRU64_advisory.txt
    
    This advisory does not have specific details, besides the overflow
    through the NLSPATH environment variable, and it isn't clear whether
    NLSPATH affects *all* the programs listed, or just some of them.  The
    advisory alludes to "multiple overflows," and it appears to say that
    NLSPATH is "[just] one of the issues," but the advisory does not
    specifically mention long -s arguments (uucp) or -xrm (dxterm), as
    iDEFENSE did.  Or maybe by "multiple overflows," the advisory meant
    "multiple executables have overflows through the same NLSPATH
    variable."
    
    Without the specific details, it's difficult or impossible to know
    whether they're the same problems or not.  This is one of the
    challenges that are encountered when security advisories don't have
    precise details.
    
    For CVE, we have found that the following information is critical for
    distinguishing between closely related vulnerabilities:
    
       - affected software version(s)
       - the specific component, program, or feature that is affected
       - the type of vulnerability
       - cross-references
       - the name of the affected argument(s) or commands
       - when available, the name of the specific function(s) in which the
         vulnerability resides
       - any previously announced attack vectors of the issue (example:
         someone might report an issue in program X, when the real problem
         is in library L; mention that program X is affected, but library
         L is to blame.
    
    This is why vague vendor advisories pose such a challenge in knowing
    which vulnerabilities have been fixed by the vendor.  The careful
    reader has to do a lot of research or guesswork.
    
    Without these sorts of details, it's difficult or impossible to
    distinguish between multiple vulnerabilities in the same product or
    executable.  This is one reason why CVE, which strives for
    correctness, will not link a vague vendor acknowledgement to a more
    specific vulnerability report without sufficient proof or direct
    confirmation by the vendor... and also why we've started explicitly
    labeling CVE candidates when they come from vague advisories, because
    there's insufficient information to know whether they're duplicates of
    other issues or not.  The lack of sufficient details should be a big
    deal to sysadmins and security researchers who may think they're
    patching one vulnerability, when in fact they may be patching
    something completely different.
    
    - Steve
    



    This archive was generated by hypermail 2b30 : Thu Sep 19 2002 - 14:07:51 PDT