Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 9 Sep 2011 23:05:24 +0100
From: Tim Brown <timb@...nvas.org>
To: openvas-devel@...d.intevation.org
Cc: "Jan-Oliver Wagner" <Jan-Oliver.Wagner@...enbone.net>,
        Stjepan Gros <stjepan.gros@...il.com>,
        Bugs NotHugs <bugsnothugs@...il.com>,
        Josh Bressers <bressers@...hat.com>,
        "Steven M. Christey" <coley@...us.mitre.org>,
        Jan Lieskovsky <jlieskov@...hat.com>, oss-security@...ts.openwall.com
Subject: Re: [Openvas-devel] CVE Request -- openvas-scanner -- Insecure temporary file use by generation of an OVAL system characteristics document, when ovaldi support enabled

On Friday 09 Sep 2011 22:07:34 Jan-Oliver Wagner wrote:

> What frightens me is that a security advisory about OpenVAS 2 (a already
> deprecated version) made it even into official advisories of CERTs.
> The review process seems to not work as it should, no one ever checked
> back wether this version is deprecated. So it should be easy to get faked
> security alerts about some tools you don't like into official CERT
> advisories. Or am I getting something wrong here?

Jan,

Whilst it's not a default compile time configuration option and whilst the 
conditions to exploit it are uncommon, the fact remains that there are two 
time of check, time of use (TOCTOU) vulnerabilities present in the code.  
Calling it fake is disingenous and does OpenVAS no credit.  Whilst a CVE might 
be bad, a security project disputing the assignment looks even worse; 
especially since one (and the more serious) case was picked up internally.  
FWIW, the code concerned was present in trunk so it's not even true to say it 
only affects deprecated versions (never mind the fact that just because we no 
longer support something doesn't stop someone using it).

Tim
-- 
Tim Brown
<mailto:timb@...nvas.org>
<http://www.openvas.org/>

Download attachment "signature.asc " of type "application/pgp-signature" (837 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.