|
|
Message-ID: <Pine.GSO.4.64.1103041200201.3265@faron.mitre.org>
Date: Fri, 4 Mar 2011 12:05:02 -0500 (EST)
From: "Steven M. Christey" <coley@...-smtp.mitre.org>
To: Solar Designer <solar@...nwall.com>
cc: Florian Zumbiehl <florz@...rz.de>, oss-security@...ts.openwall.com,
"Steven M. Christey" <coley@...-smtp.mitre.org>,
Stefan Fritsch <sf@...itsch.de>, Jan Kaluza <jkaluza@...hat.com>,
Paul Martin <pm@...ian.org>, Petr Uzel <petr.uzel@...e.cz>,
Thomas Biege <thomas@...e.de>, Jan Lieskovsky <jlieskov@...hat.com>
Subject: Re: CVE Request -- logrotate -- nine issues
If there's a common usage scenario that doesn't stem from blatant
administrator negligence, then a CVE is probably still appropriate.
("blatant admin negligence" might be, say, if an admin arbitrarily makes a
script setuid, or modifies the perms for an executable or config file to
be world-writable.)
We will sometimes write the CVE description more as an "adminisrator
practice" than as "fault of the software."
For example, default passwords are fair game; arguably, if the admin
didn't read page 24 of the documentation that said "change the default
password," this is more the admin's fault than the software's fault... BUT
the issue has to be dealt with, either way, so a CVE becomes a "signal"
for that action to take place, whether it came from the software or from
the user.
Not everything is that clean and straightforward of course, but that's the
general thinking.
- Steve
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.