Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <0295d4de82454ac79e4bc834c30d39b3@imshyb01.MITRE.ORG>
Date: Tue, 29 Aug 2017 15:23:50 -0400
From: <cve-request@...re.org>
To: <ago@...too.org>
CC: <cve-request@...re.org>, <oss-security@...ts.openwall.com>
Subject: Re: [scr379303] A bunch of duplicate CVEs requested for?? bho..

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> https://nvd.nist.gov/vuln/detail/CVE-2017-13753 duplicate of:
> https://nvd.nist.gov/vuln/detail/CVE-2016-9396

Yes, these are duplicates; we will reject CVE-2017-13753 and update
CVE-2016-9396.

This occurred because the MITRE CVE team inadvertently populated
CVE-2016-9396 with incorrect version information, and because the code
changed between the two tested versions.

Specifically, CVE-2016-9396 had said "in JasPer before 1.900.12" but
actually there was no reference stating that 1.900.12 was a fixed
version. Also, the CVE-2017-13753 reference said "Assertion `qmfbid ==
JPC_COX_RFT' failed" but the CVE-2016-9396 reference said "Assertion
`qmfbid == 0x01' failed." These happen to be the same (there's a
"#define JPC_COX_RFT 0x01" elsewhere), but it initially looked like
the new report was about a different assertion that was problematic in
1.900.12 and later versions.

> months later we have:
> https://nvd.nist.gov/vuln/detail/CVE-2017-11720
> "There is a division-by-zero vulnerability in LAME 3.99.5, caused by a
> malformed input file."

When we worked on your CVE ID request for the
https://blogs.gentoo.org/ago/2017/06/17/lame-divide-by-zero-in-parse_wave_header-get_audio-c/
report, we had the information about the affected source-code pathname
frontend/get_audio.c, and we had found the
https://bugs.debian.org/777159 information about "this is all in the
frontend code in frontend/get_audio.c:parse_wave_header() and not in
the library." By contrast, the CVE-2017-11720 request had less
technical detail about the source-code location, and the requester had
checked the "Has vendor confirmed or acknowledged the vulnerability?"
Yes box on our https://cveform.mitre.org web site. In general, if a
problem is only a divide-by-zero in a command-line program, but the
upstream vendor decided to categorize it as a vulnerability, then it
gets a CVE. Admittedly, there was no direct proof of "decided to
categorize it as a vulnerability" here. Also, if a CVE is already
populated, and is about this type of valid crash report, then we do
not retroactively reject it, even if we learn more about exploitation
relevance. We will update CVE-2017-11720 with your reference, to help
to show that you were the original discoverer.

- -- 
CVE Assignment Team
M/S M300, 202 Burlington Road, Bedford, MA 01730 USA
[ A PGP key is available for encrypted communications at
  http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=aEt4
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.