|
Message-ID: <Pine.GSO.4.64.1005251706220.27983@faron.mitre.org> Date: Tue, 25 May 2010 17:12:07 -0400 (EDT) From: "Steven M. Christey" <coley@...us.mitre.org> To: Josh Bressers <bressers@...hat.com> cc: oss-security@...ts.openwall.com, security-2010@...irrelmail.org, security@...de.org Subject: Re: CVE Request for Horde and Squirrelmail While these port-scanning types of issues are rarely reported, there is precedents for them, especially in the web application security world (see Jeremiah Grossman's work on port-scanning through web browsers, for a start). Even though the consequences may be minimal, they still allow an attacker from *outside* a network to determine the state of machines that live *inside* that network, even when the attacker does not have direct access to the internal netork. So there is an information leak. As such, the CVE assignment is appropriate. (To the Horde devs, if you wish to publish a dispute within the CVE description itself, contact me offline; the description can at least be written to emphasize that it only happens when sysadmins don't follow documentation.) - Steve
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.