Common Vulnerabilities and Exposures
MITRE Corporation's documentation defines CVE Identifiers (als o called "CVE names", "CVE numbers", "CVE-IDs", an d "CVEs") as unique, common identifiers for publicly known information-security vulnerabilities in publicly released software packages. Historically, CVE identifiers had a status of "candidate" ("CAN-") and could then be promoted to entries ("CVE-"), however this practice was ended some time ago and all identifiers are now assigned as CVEs (the collective noun for which is an "infestation" of CVEs. The assignment of a CVE number is not a guarantee that it will become an official CVE entry (e.g. a CVE may be improperly assigned to an issue which is not a security vulnerability, or which duplicates an existing entry). CVEs are assigned by a CVE Numbering Authority (CNA); there are three primary types of CVE number assignments:
- The MITRE Corporation functions as Editor and Primary CNA
- Various CNAs
assign CVE entries for their own products (e.g. Microsoft, Oracle, HP, Red Hat, etc.) - Red Hat also provides CVE numbers for open source projects that are not a CNA
When investigating a vulnerability or potential vulnerability it helps to acquire a CVE number early on. CVE numbers may not appear in the MITRE or NVD CVE databases for some time (days, weeks, months or potentially years) due to issues that are embargoed (the CVE number has been assigned but the issue has not been made public), or in cases where the entry is not researched and written up by MITRE due to resource issues. The benefit of early CVE candidacy is that all future correspondence can refer to the CVE number. Information on getting CVE identifiers for issues with open source projects is available from Red Hat.
No comments:
Post a Comment