oss-sec mailing list archives

Re: Re: Discussion: information leakage from server and client software - CVE/hardening/other?


From: Rich Felker <dalias () libc org>
Date: Wed, 8 Oct 2014 11:11:29 -0400

On Tue, Oct 07, 2014 at 05:57:25PM -0600, Kurt Seifried wrote:


On 07/10/14 03:56 PM, cve-assign () mitre org wrote:
So for example the
http://boingboing.net/2014/10/07/adobe-ebook-drm-secretly-build.html
article would indicate to me that this is CVE worthy under #4

Currently not; Adobe has a statement quoted at:

  http://arstechnica.com/security/2014/10/adobes-e-book-reader-sends-your-reading-logs-back-to-adobe-in-plain-text/

indicating that the information disclosure is intentional, and is
(from their point of view) useful to them. This is just an example of
a behavior that might also occur in an open-source product. The Adobe
issue itself is off-topic for this list.

Then by that measure we could for example have challenged CVE-2011-4083
for example saying that it is useful to us. The same would go for any
"unsanitized" log file submissions. I fear this is a slippery slope
where vendors can effectively game their CVE numbers with "oh we meant
to do that" which makes CVE much less useful =(

I agree with Kurt. I think there should be something along the lines
of "reasonable expectation of privacy" here. I admit that this is
subjective, but cases like the Adobe one are pretty clear. Even if
it's not 100% clear whether the vendor has a legitimate need for the
data (I would say they don't, but this is not the point right now),
random third parties with the ability to intercept unencrypted network
traffic certainly do not have a legitimate need for it. So at the very
least, I think any transmission of data where the user might have a
reasonable expectation that the data is "private", if it takes place
over a non-encrypted channel, is CVE-worthy.

Rich


Current thread: