移动安全 - CVE官方关于Vnlnerability和Exposure的定义

Hanks.Wang - 专注于系统攻防与移动安全研究 byhankswang@163.com


CVE官方关于Vnlnerability和Exposure的定义


Below are the CVE Initiative’s definitions of the terms " Vulnerability " and " Exposure ":

Vulnerability

An information security "vulnerability" is a mistake in software that can be directly used by a hacker to gain access to a system or network.

CVE considers a mistake a vulnerability if it allows an attacker to use it to violate a reasonable security policy for that system (this excludes entirely "open" security policies in which all users are trusted, or where there is no consideration of risk to the system).

For CVE, a vulnerability is a state in a computing system (or set of systems) that either:

  • allows an attacker to execute commands as another user
  • allows an attacker to access data that is contrary to the specified access restrictions for that data
  • allows an attacker to pose as another entity
  • allows an attacker to conduct a denial of service

Examples of vulnerabilities include:

  • phf (remote command execution as user "nobody")
  • rpc.ttdbserverd (remote command execution as root)
  • world-writeable password file (modification of system-critical data)
  • default password (remote command execution or other access)
  • denial of service problems that allow an attacker to cause a Blue Screen of Death
  • smurf (denial of service by flooding a network)

Review vulnerabilities on the Common Vulnerabilities and Exposures (CVE) List.

Exposure

An information security "exposure" is a system configuration issue or a mistake in software that allows access to information or capabilities that can be used by a hacker as a stepping-stone into a system or network.

CVE considers a configuration issue or a mistake an exposure if it does not directly allow compromise but could be an important component of a successful attack, and is a violation of a reasonable security policy.

An "exposure" describes a state in a computing system (or set of systems) that is not a vulnerability, but either:

  • allows an attacker to conduct information gathering activities
  • allows an attacker to hide activities
  • includes a capability that behaves as expected, but can be easily compromised
  • is a primary point of entry that an attacker may attempt to use to gain access to the system or data
  • is considered a problem according to some reasonable security policy

Examples of exposures include:

  • running services such as finger (useful for information gathering, though it works as advertised)
  • inappropriate settings for Windows NT auditing policies (where "inappropriate" is enterprise-specific)
  • running services that are common attack points (e.g., HTTP, FTP, or SMTP)
  • use of applications or services that can be successfully attacked by brute force methods (e.g., use of trivially broken encryption, or a small key space)

Review exposures on the Common Configuration Enumeration (CCE) List.





  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值