|
Message-Id: <20160301211655.454B672E02E@smtpvbsrv1.mitre.org> Date: Tue, 1 Mar 2016 16:16:55 -0500 (EST) From: cve-assign@...re.org To: kseifried@...hat.com Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: CVE's for SSLv2 support -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 > by drawing a line in the sand of "SSLv2 is worth a CVE" we'd be much > more easily able to track which products are using SSLv2 by default (and > thus putting us at risk). From your web page "CVE is a dictionary of > publicly known information security vulnerabilities and exposures." If a vendor is announcing a security update that removes SSLv2 support, they can map to any CVE IDs associated with the SSLv2 protocol to indicate their motivation for that security update. For example, they can list CVE-2016-0800 in their advisory. If anyone is discussing the security properties of a product (even before such an update is announced), they can mention that -- for example -- CVE-2016-0800 is applicable to that product. If a vendor really wants to emphasize that they are removing SSLv2 support for multiple unspecified reasons, then the CVE team at MITRE could assign a separate CVE ID; however, it doesn't seem especially helpful to have that widespread risk of overlapping IDs as a default position. CVE-2016-0800 will be in the mentioned dictionary on the CVE web site very soon, indicating that it is a vulnerability in the SSLv2 protocol (the https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0800 text will be used initially). Anyone building a vulnerability database on top of CVE can feel free to populate that database's CVE-2016-0800 entry with an arbitrarily comprehensive product list, to help with the "track which products are using SSLv2" goal that you mentioned. CVE is not a vulnerability database, and generally has not offered comprehensive product mappings for protocol-level vulnerabilities. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJW1gXTAAoJEL54rhJi8gl5lWUP/RCc1976FrlaMFf/G8WG8b6Q kI5NX2b0IzQhnfq8+ldTjsPWgy93zUG6WlHjcirtYif1yPoJqF8zKkkN8BR4P7vZ 1o1MJdK3DIXDD/eQ0wlzVkbaNIiy+S1FjTHLgzu33jACaBUwTNsOdjOO/td/NKdK DaEu6ETe7K/+RytAT2mhCk9ma9mKm6v2tN4G+aqnlzLBEyELUYQuMJF58UR90RAX UAKWeLfAisxOfZStpCPOfVauSFmtc8d2R74CjIsHCdwfUnUrIxYCNcxjZa4bnWdB beW9CTTErBC/QofWrOx+/X7glC2V3PjcY0GKCriPiTs9ea8p2NErbNY0ECQnPyyF NjHSXYlT5wOCNRF0hyd85hromRghGVSUK9jMOeBIFLFFZs0m2aApEBT2tJbIVnC+ WEF0mPMRKeFshrQ2mJTIkxIEdPAd0P7yW2Np8NirMuguUCEHGg3k1Mja+hPW1izV 8vt2Peo8vlHc8oeetLZ0+myK20wC1uX1zVMim3H+4Wy3ayFPQQ17ZOc2/IU0Eh4I xS2XTdk8x9oQ9H6Gyjq7eYZrUfhDUA7GkOTcC1J10ZC54WLAX8bWbsLagh+yrrTK pQjPr9wEgQFskuoUF+Ol8lL/kiFphVE0l3gJM5VpR3dvAld2714FPdNgzdn3Wc38 WObLmO4imwD5rZZmKyxI =wfuM -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.