[Secure-testing-commits] r5280 - doc

SALVETTI Djoumé djoume-guest at alioth.debian.org
Tue Jan 16 23:27:40 CET 2007


Author: djoume-guest
Date: 2007-01-16 23:27:40 +0100 (Tue, 16 Jan 2007)
New Revision: 5280

Modified:
   doc/narrative_introduction
Log:
Removed the reference to NVD scoring and add some details about how to set the
severity (from what have been said on the mailing list).



Modified: doc/narrative_introduction
===================================================================
--- doc/narrative_introduction	2007-01-16 22:24:21 UTC (rev 5279)
+++ doc/narrative_introduction	2007-01-16 22:27:40 UTC (rev 5280)
@@ -203,22 +203,47 @@
 ---------------
 These levels are mostly used to prioritize the order in which security
 problems are resolved. Anyway, we have a rough overview on how you should
-assess these levels. These are generally based on the 'score' from NVD
-(http://nvd.nist.gov/nvd.cfm?cvename=CVE-nnnn-nnnn)
+assess these levels. 
 
 unimportant: This problem does not affect the Debian binary package, e.g.
-             a vulnerable source file, which is not built or a vulnerable file
-             in doc/foo/examples/
+             a vulnerable source file, which is not built, a vulnerable file
+	     in doc/foo/examples/, PHP Safe mode bugs, path disclosure (doesn't
+	     matter on Debian).
+	     All "non-issues in practice" fall also into this category, like
+	     issues only "exploitable" if the code in question is setuid root,
+	     exploits which only work if someone already has administrative
+	     privileges or similar.
+
 low        : A security problem, which has only mild security implications
              and one would even be comfortable with if it continues to
-             be present
-medium     : A typical, exploitable security problem.
+             be present (local DoS, /tmp file races and so on).
+
+medium     : For anything which permits code execution after user interaction.
+	     Local privilege escalation vulnerabilities are in this category as
+	     well, or remote privilege escalation if it's constrained to the
+	     application (i.e. no shell access to the underlying system, such
+	     as simple cross-site scripting). Most remote DoS vulnerabilities
+	     fall into this category, too.
+
 high       : A typical, exploitable security problem, which you'll really
              like to fix or at least implement a workaround. This could
              be because the vulnerable code is very broadly used, because
              an exploit is in the wild or because the attack vector is
-             very wide.
+             very wide. 
+	     Should be put into that category anything that permits an attacker
+	     to execute arbitrary code on the vulnerable system (with or
+	     without root privileges) and high-impact denial-of-service bugs
+	     (for instance, an IPv4 forwarding path vulnerability which
+	     requires only very few packets to exploit).
+	     Significant defects in security software can be rated "high" as
+	     well (for instance, a vulnerability in a piece of cryptographic
+	     software which flags forged digital signatures as genuine).
 
+
+Certain packages may get higher or lower rating than usual, based on
+their importance.
+
+
 NOTE and TODO entries
 ---------------------
 There are many instances where more work has to be done to determine




More information about the Secure-testing-commits mailing list