[VIM] CVE published vs unpublished

security curmudgeon jericho at attrition.org
Sat Dec 27 06:28:53 UTC 2008


From: Noam Rathaus <noamr at beyondsecurity.com>
Date: Mon, 14 Jan 2008 21:50:27 +0200

Notice the date here, i'm replying a considerable time later.

Noam said:

: > Can someone from CVE administrator give me an estimate how many given CVEs
: > have not materialized into "anything" (never been disclosed - remained under
: > review)?

This is a good question. Over the years, i was curious from an OSVDB 
standpoint and "how many CVE do we map to" from a numeric aspect. If you 
look at CVE-2007-0001 to CVE-2007-3000, are we really missing 500 
(arbitrary number)? Or is it a case where we're missing 300 because 200 
were never published?

When I got back into the grind of full time pen-testing, I was in a 
position to handle vulnerability disclosure. It was a shop with 20 full 
time consultants when I joined, every single one working 40 hour weeks or 
more, with *zero down time*. Imagine the vulnerabilities we found over 
time =) While many of us did a lot of custom application tests, that do 
not warrant CVE numbers, we did test COTS frequently. When I joined, no 
one was handling disclosure either. It was done rarely, by a consultant's 
own initiative, typically only for reoccuring clients. 

Within a year, I think I ended up requesting a dozen or so CVEs from Steve 
(I say that to distinguish they came from CVE, not another pool). Over a 
year after requesting them, most are still reserved. Since I am no longer 
with the company, I don't know if they will ever be released. If they 
aren't in 5 years, I may mail Steve out of the blue and say "these CVE 
requests will never get published I don't think", just to throw him a 
curve ball and make him think.

Some of the vulnerabilities I found, have since been published. The 
company I was with finally opted not to publish advisories, after spending 
countless hours writing our policy, template, going back/forth with 
lawyers, etc. The ones I released were done quietly, with 100% responsible 
disclosure (waiting a long time for the vendor if needed), and have since 
been added quietly to CVE, OSVDB and Nessus in at least one case. The 
vulnerabilities I did not discover, but were handling disclosure for at 
the time, are the ones that will likely never see the light of day unless 
a third party finds it. That is very possible, because none of the 
software was really obscure. I hate being bound by NDA and sitting on 
vulnerabilities that were reported, but may be unpatched because no one 
harassed the vendor.

On Wed, 23 Jan 2008, Steven M. Christey wrote:

: Also, I don't ping the people who reserved CVEs in order to check on 
: their status.  Some might have turned out to be false and the requester 
: never notified us; in other cases, maybe a decision was made not to 
: publish; some might still be in the middle of the resolution process.

This would be a neat one time event. Ping the people who requested, ask 
the status. I suggest it because I have done this with a reserved OSVDB 
that sat there for a year. After I pinged the researcher, he basically 
said "oops, totally spaced it, thanks for reminding me" and he ended up 
publishing details and the OSVDB was made public.

: Also, we are inconsistent about handling vague vulnerability reports 
: from auction / non-disclosure firms like WabiSabiLabi and Immunity, but 
: generally don't include them.  This includes the hash publications we're 
: starting to see more of.

Since this mail, more have been posted. If I had more time, i'd love to 
document all of them in one place, and ping the researchers every X months 
asking if it has since been disclosed. What bothers me most about this 
practice is that pre-posting hashes is essentially saying "i'm first, 
here's proof if i need it" and it isn't necessarily linked to the actual 
disclosure days/months/years later.

: 2001  min=18  ; max=20
: 2002  min=33  ; max=40
: 2003  min=36  ; max=56
: 2004  min=48  ; max=74
: 2005  min=110  ; max=146
: 2006  min=134  ; max=170
: 2007  min=178  ; max=231
: 2008  min=68  ; max=100

This is a fascinating number too: 873. How many people have considered 
that there may be 873 known vulnerabilities (likely more when you consider 
CVE grouping/abstraction) out there, sitting in the hands of presumably 
'good' security companies, but undisclosed. That begins to give an 
interesting basis for considering how many vulnerabilities are out there, 
undisclosed, without CVE candidates. Safe to assume 5x more? 10x more? 
100x more?


More information about the VIM mailing list