About Us Our Work Employment News & Events
MITRE Remote Access for MITRE Staff and Partners Site Map
The MITRE Digest

Follow Us:

Visit MITRE on Facebook
Visit MITRE on Twitter
Visit MITRE on Linkedin
Visit MITRE on YouTube
View MITRE's RSS Feeds
View MITRE's Mobile Apps
Home > News & Events > MITRE Publications > The MITRE Digest >

Enabling Enterprise Security with CVE

November 2001

In the world of hackers versus computer programmers, there are no small mistakes. Last year, a computer hacker took advantage of a coding mistake and broke into a hospital's computer system and downloaded thousands of medical records. The hacker's activities went unnoticed until the hacker went public, and even then, the hospital initially denied his claims. The next day, the hospital confirmed the intrusion.*

line
line

Vulnerability

A mistake in software code that can be directly used to gain access to a system or network.

Exposure

A mistake in software code that allows access to information or capabilities that can be used as a stepping-stone into a system or network.

Mistakes in software code—anything from a typo, a math error, incomplete logic, poor configuration, or incorrect use of a function or command, to an oversight in the requirements guiding the design and coding—can result in security complications. When they do, the mistakes are referred to as vulnerabilities or exposures. An entire industry of information security products and services now exists to help you protect your networks and systems from being exploited by the hackers and crackers who would use them to gain unauthorized access.

MITRE's Information Security Group has played a significant role in this field through the creation of "CVE," or Common Vulnerabilities and Exposures, a list or dictionary that provides a single, common name for a single security vulnerability or exposure. CVE's common names give the security tools and services you use to protect your systems a way to communicate with each other that did not exist prior to the creation of CVE. It also provides a way to compare which tools provide what coverage.

* Sullivan, Bob, "Hospital confirms Hack Incident," MSNBC, Dec. 9, 2000.


Protecting Your Network and Systems

A vulnerability or exposure might exist in any single piece of software or hardware, or be created when one or more of these items are used together. A variety of tools exists to help you locate and fix such occurrences, including vulnerability databases, vulnerability scanners, intrusion detection systems (IDSs), and similar Internet-based services.

To keep their products up-to-date, tool and service providers have to continuously gather new vulnerability information. This data is researched by the organization itself, or is obtained from external sources—such as security newsletters, notification services, and public information Web sites that are made available to the public by commercial organizations, the government, and other sources (see Table 1).

Table 1: Vulnerability Information Sources

Site/Service Name Type Organization

arachNIDS

free IDS database

Max Vision Network Security/Whitehats

Bugtraq

email list

Bugtraq

Bugtraq mailing list Database

mailing list database

SecurityFocus.com

Casandra

alerts

CERIAS/Purdue University

CERIAS Vulnerability Database

database

CERIAS/Purdue University

CERT Advisories

advisory

CERT Coordination Center

CyberNotes

monthly newsletter

NIPC

Fyodor’s Playhouse

hacker Web site

Insecure.Org

IBM ERS

advisory

IBM

ICAT Metabase

free Web site

NIST

Microsoft Product Security Notification Service

advisory

Microsoft Corporation

Online Vulnerability Database

database

Ernst & Young’s eSecurityOnline.com

PacketStorm

hacker Web site

Securify, Inc.

Razor

advisory

Bindview Corporation

S.A.F.E.R.

monthly newsletter

The Relay Group

SANS NewsBites

email list

SANS Institute

Security Alert Consensus

email list

Network Computing and SANS

SecurityFocus Newsletter

newsletter summary
of Bugtraq emails

SecurityFocus.com

SGI Security Advisory

advisory

Silicon Graphics, Inc.

Sun-alert

alert

Sun Microsystems, Inc.

SWAT Alerts

alerts

Symantec

SWAT Database

database

Symantec

Vigil@nce AQL

database

Alliance Qualité Logiciel

X-Force Alert

advisory

Internet Security Systems

X-Force Database

free Web site

Internet Security Systems

 

The Problem

While many sources exist for finding out about vulnerabilities, historically, each source or company has used its own approach for quantifying, naming, describing, and sharing the information about the vulnerabilities it finds. This directly affects your networks and systems when tools and products from different companies are used together and each product refers to the same vulnerability by a different name (see Table 2), resulting in confusion at the least and incomplete coverage at the worst. Also, any vulnerabilities or exposures found within the systems then need to be fixed. Unless your software vendors use the same vulnerability descriptions and names as the sources in Table 1, it may be difficult to find the appropriate patch or fix.

Table 2: The Vulnerability Tower of Babel

Organization Name used to refer to the same vulnerability

AXENT

phf CGI allows remote command execution

BindView

#107 – cgi-phf

Bugtraq

PHF Attacks – Fun and games for the whole family

CERIAS

http_escshellcmd

CERT

CA-96.06.cgi_example_code

Cisco Systems

HTTP - cgi-phf

CyberSafe

Network: HTTP ‘phf’ Attack

DARPA

0x00000025 = HTTP PHF attack

IBM ERS

ERS-SVA-E01-1996:002.1

ISS

http - cgi-phf

Symantec

#180 HTTP Server CGI example code compromises http server

Security Focus

#629 - phf Remote Command Execution Vulnerability

 

The Solution

In 1999, MITRE created CVE to act as a bridge between the different tools and services. Today, CVE is an international, community effort that has grown from the original 321 official CVE entries (also called "names") to more than 1,600 entries. In addition, CVE includes 1,800 CVE candidates, or CANs, which are those vulnerabilities or exposures under consideration for acceptance into CVE.

This means that there are currently 3,400 unique issues with publicly known names available on MITRE’s CVE
Web site. And the list is always growing. Approximately 100 new candidates are added each month based upon newly discovered issues.

line
line

Definition of a CVE Entry

The CVE entry (or “name”) is an encoding of the year the name was assigned and a unique number N for the Nth name assigned that year.
For example: CVE-199-0067

How CVE Works

CVE is publicly available and free to use. Through open and collaborative discussions, members of the CVE Editorial Board decide which vulnerabilities or exposures will be included in CVE, and then determine the common name, description, and references for each entry. Editorial Board members come from numerous information security-related organizations around the world, such as software and tool vendors, research institutions, government agencies, and academia.

Products and services that incorporate CVE names are referred to as "CVE-compatible," meaning that they can cross-link with other products and services that use CVE names. To be CVE-compatible, products or services must beCVE searchableso that a user can search using a CVE name to find related information, and any output must be presented in a manner that includes the related CVE name(s) or CAN(s). CVE compatibility facilitates the exchange of vulnerability information and makes it easier to share data in a vendor-independent manner.

MITRE maintains the CVE List and Web site, manages the compatibility process, moderates editorial board discussions, and provides guidance to ensure that CVE remains objective and continues to serve the public interest.

Enterprise Security Enabled by CVE

In a CVE-enabled process, CVE-compatible products and services act as a bridge. For example, in figure 2, an organization is able to detect an ongoing attack with its CVE-compatible IDS system (A). In a CVE-compatible IDS, specific vulnerabilities that are susceptible to the detected attack are provided as part of the attack report. This information can then be compared against the latest vulnerability scan by your CVE-compatible scanner (B) to determine whether your enterprise has one of the vulnerabilities or exposures that can be exploited by the attack. If it does, you can then access a CVE-compatible fix database from your product vendor, or you can use the services of a vulnerability Web site, which lets you identify (C) the location of the fix for a CVE entry (D), if one exists.

CVE graphic

Figure 1: A CVE-Enabled Process

Using CVE-compatible products also allows you to improve how your organization responds to security advisories. If the advisory is CVE-compatible, you can see if your scanners check for this threat and then determine whether your IDS has the appropriate attack signatures. If you build or maintain systems for customers, the CVE compatibility of advisories will help you to directly identify any fixes from the vendors of the commercial software products in those systems (if the vendor fix site is CVE-compatible). The result is a much more structured and predictable process for handling advisories than most organizations currently possess.

Conclusion

As with the CVE Editorial Board, the list of organizations working on or delivering CVE-compatible products is international in scope. Currently there are 35+ organizations working toward compatibility for 60+ products and services, including software vendors who have added CVE names to their alerts and to their software patch and update sites.

The changes in tools and services brought about by the adoption and support of CVE allow more systematic and predictable handling of security incidents. As more vendors respond to user requests for CVE compatibility, the complete cycle of finding, analyzing, and fixing vulnerabilities will be addressed—moving this part of securing the enterprise from art to science.

Refer to the CVE Web site for the most up-to-date information. For a more in depth discussion of this topic, read "The Vulnerabilities of Developing on the Net" by Robert A. Martin, CVE Team member and principal engineer in MITRE's Information Technologies division.

 

Page last updated: May 20, 2001   |   Top of page

Homeland Security Center Center for Enterprise Modernization Command, Control, Communications and Intelligence Center Center for Advanced Aviation System Development

 
 
 

Solutions That Make a Difference.®
Copyright © 1997-2013, The MITRE Corporation. All rights reserved.
MITRE is a registered trademark of The MITRE Corporation.
Material on this site may be copied and distributed with permission only.

IDG's Computerworld Names MITRE a "Best Place to Work in IT" for Eighth Straight Year The Boston Globe Ranks MITRE Number 6 Top Place to Work Fast Company Names MITRE One of the "World's 50 Most Innovative Companies"
 

Privacy Policy | Contact Us