|
Message-Id: <201202281918.q1SJIEH0004968@linus.mitre.org> Date: Tue, 28 Feb 2012 14:18:14 -0500 (EST) From: cve-assign@...re.org To: kseifried@...hat.com Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: Re: CVE Status Clarification / Request -- kadu: Stored XSS by parsing contact's status and sms messages in history -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 >Argh sorry cut and paste the wrong CVE # into novell's bugzilla. Can >we just remove it from there please? Removing Comment 4 from https://bugzilla.novell.com/show_bug.cgi?id=749036 is definitely a good idea, but MITRE will also do a REJECT of the CVE-2006-7248 identifier to address the issue more completely. We often see vendors of CVE compatible products and services picking up new CVE mappings from oss-security postings, and from references cited in oss-security postings, and this often happens on the day of the posting. Some vendors primarily just want the mapping, and aren't really investigating the issues or possible discrepancies. So, here, it's plausible that: 1. Vendor already discovered the web page for "Bug 749036 - VUL-0: kadu: allows to inject js code." 2. Vendor quickly skimmed the text of 749036 and saw "use CVE-2006-7248 for this issue." Vendor did not bother to go to the openssl-dev link, or even consider that openssl-dev is not a common forum for discussing Kadu. 3. Vendor immediately jumped to the conclusion that CVE-2006-7248 is assigned to the Kadu issue, and updated a data set that ultimately gets pushed out to their customers. 4. Sometime in the future, their customer decides to look up CVE-2006-7248 on the MITRE CVE web site. 4a. If CVE-2006-7248 is a regular CVE entry about an OpenSSL vulnerability, the customer might reach any of a variety of incorrect conclusions, especially because Kadu apparently uses OpenSSL through the QCA OSSL plugin for libqca2. The customer might, for example, infer that CVE-2006-7248 is an unpatched vulnerability affecting the Kadu EncryptionNgPlugin component. 4b. If CVE-2006-7248 is a rejected CVE entry that points to the correct CVE identifiers for the Kadu issue and the OpenSSL issue, then there's probably more hope that the customer will find the correct information. - -- CVE assignment team, MITRE CVE Numbering Authority M/S S145 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/obtain_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (SunOS) iQEcBAEBAgAGBQJPTSZKAAoJEGvefgSNfHMdpkkH/3PWGuCMgWU4ct823t69sPp6 cIg9uryKHy/gWkJ6o66BLhSBrQxELjmY6zih/kA/OZP8zvrwaE1Y0bNFtoDS34cl aacPKfjpreHM6swa53BAhEiRIiKJB+IpD7X68LRkjGEeTAG3aZ1yoW41G0Ega9Ia uIyCKF0Z1cLyXcHvMMH3pau74MYIlzJtzdkOkVu24/2iifWlf91xMpH7xA6nmXlx uUNGSm2BgiKBp0KsYBi8CxweuohqbRcuD5/TC7F/pqZpMhkRL9mmdNhApgGCP+y5 ydKgxbqvWfPxu83ru/PHttQs0F9ugYAB8fBoM6sWy6/Ki/I1i+sduJqcGIVRHis= =Ule+ -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.