[VIM] Re: A few more apps vulnerable to PHP XML-RPC exploits (fwd)

security curmudgeon jericho at attrition.org
Fri Jul 8 19:10:39 EDT 2005

: > We're still debating on whether this gets one entry in OSVDB, or gets
: > broken out (like CVE appears to be doing).
: CVE is doing this by accident because certain applications aren't 
: directly saying that they're vulnerable to this particular problem, and 
: we've only just become aware of how much this is being used.
: The normal approach in CVE is to assign one identifier per codebase, 
: regardless of how many applications use it.  This obviously has its own 
: difficulties, especially for people who use CVE to track vulnerabilities 
: in specific deployed applications in their enterprise.  On the other 
: hand, if someone asks "hey, I've been hearing about this XML-RPC bug, 
: does product X have it?"  they have a better chance of answering that 
: question. This is one example why CVE is an 80% solution for everybody 
: but not a 100% solution for anybody.

Right. I certainly see value in breaking it out by product, especially 
when implementations may vary a bit or there are other mitigating 
circumstances that are product/vendor specific.

: zlib is another good example of a library that's heavily used across 
: many products.

Yah, these two vulns (zlib/xmlrpc) are fairly nasty due to that alone.

More information about the VIM mailing list