lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <427229B7.7050209@nospammail.net>
Date: Fri Apr 29 13:34:52 2005
From: spamproof at nospammail.net (Rob)
Subject: Questions about reporting a vulnerability

xyberpix wrote:
> Hey All,
> 
> Couple of questions on reporting vulnerabilities:
> 
> 1) Is there a damn template somewhere that can be used, as I'm pretty sure
> there was at one point, and I can't seem to find it? If so, could someone
> please let me know where this is located?
> 
> 2) Is it worth sending something out like a cookie storing usernames and
> passwords in clear text for a major vendor's piece of software?
> 
> 3) What's the correct procedure to go through reporting a vulnerability?
> 
> If all of these questions can be answered with one simple link, can
> someone please paste it, as I really need to know this info soon.
> 
> TIA
> 
> xyberpix

Good question, I looked a little and couldn't find a simple link. I like the slightly more narrative and editorial style of our own 
class 101 Jr. Researcher (you can search the FD archives for examples from them) but in general, I think we can make two lists (I'll 
label them to ease any further discussion). I'll start, but I'm not any kind of authority in the field:

======================================================
1) Some considerations regarding reporting a vulnerability:

a) Think about whether or not to report the vulnerability - some cases exist where people have been prosecuted and/or become a 
"person of intrst" for reporting vulnerabilities (I am sure will have opinions about this)

b) Decide what level of anonymity to use when reporting (see a above)

c) Decide whether to notify the vendor first and how much effort and how much time to wait before exposing the vulnerability further.
As has been discussed here recently, some people feel it is a moral imperative to give vendors at least a couple weeks before further 
disclosure. Other say screw the vendors, it is solely the spectre of full disclosure that keeps them honest at all.

d) If and/or when you decide to disclose, choose which lists or other venues to use for your disclosure.
Some don't like the freestyle atmosphere here at FD, others post to several lists simultaneously.

e) Check the CVE http://www.cve.mitre.org/ and other lists/databases to see if your "new" vulnerability is already listed or 
reported. See the FD list archives for numerous examples of re-runs. (Probably not applicable in your current case)

f) Decide whether to include POC exploit code and/or methodology to reproduce vulnerability. Some people publish reports without 
these details for various reasons.

g) Decide what, if any restrictions to put on exploit code and/or other parts of the report. Some people do this because they want to 
control what security companies put in their databases and lists. (See FD archives for examples)

==============================================
2) Things to Include in a Vulnerability Report:
(Hopefully others will chime in on these)

a) Overview/Summary - Nice but probably not necessary

b) Your Disclosure ID (If you track them and to prevent confusion for reports on the same product)

c) Date of Disclosure

d) Product Publisher and Product Name (or site) and link

e) List of tested versions, affected/at risk versions and patched/unaffected versions

f) Your estimate of Severity/Risk

g) Local or Remote Exploit (People have non-standard ways of reporting severity and local/remote/escalation risk)

h) General Description of the problem and/or the methods used in the process of working on the vulnerability.

i) Method of exposing vulnerability and/or POC code (Depending on your considerations from part 1)

j) Proposed fixes and/or patches

k) References - For instance, if you are discussing an obscure DNS vulnerability and you based some of your code on the ideas of Dan 
Kaminsky, you might reference http://www.doxpara.com/

l) Timeline - It is important (again using my moral compass) to give proper credit to all parties who helped with topics covered.
Some unscrupulous security "professionals" have, in the past, exaggerated their role in discovering vulnerabilities - which tends to 
piss off everyone who knows better, while the media at large tends to remain oblivious. Also, people like to document the timeline if 
the vendor never responded and several attempts were made to contact them and report the vulnerability/exposure.

m) Credit & Disclaimers - In this section make clear any restrictions you wish to try to impose on the information and/or code.

n) Greets, Props and Shouts - Some people like to acknowledge others in the field.

m) Misc Notes that don't fit other headings

===========================================

That is all I can think of right now. Clear text user/password cookies are probably worth reporting (at least to the vendor) since 
some unaware user may login at a library or other public machine and expose their info (even if the connection uses SSL) - as one 
example of the multitude of ways the info could be exposed. If you can't find a way to report the vulnerability on their website, try 
security@...pany.blah or noc@...pany.blah since RFC 2412 says they are supposed to have those as working addresses.

Good Luck.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ