Common Vulnerabilities and Exposures

Common Vulnerabilities and Exposures

The Common Vulnerabilities and Exposures or CVE system provides a reference-method for publicly-known information-security vulnerabilities and exposures. MITRE Corporation maintains the system, with funding from the National Cyber Security Division of the United States Department of Homeland Security.[1] CVE is used by the Security Content Automation Protocol.

CVE Identifiers

MITRE Corporation's documentation defines CVE Identifiers (also called "CVE names", "CVE numbers", "CVE-IDs", and "CVEs") as unique, common identifiers for publicly-known information security vulnerabilities. CVE identifiers have a status of either "entry" or "candidate". Entry status indicates acceptance of a CVE Identifier into the CVE List, while a status of "candidate" (for "candidates," "candidate numbers," or "CANs") indicates an identifier under review for inclusion in the list.[2]

The same source describes the process of creating a CVE Identifier which:

  • begins with the discovery of a potential security vulnerability or exposure
  • adds to this information a (unique) CVE candidate number assigned by a CVE Candidate Numbering Authority (CNA), posted on the CVE Web site, and proposed to the Board by the CVE Editor

The MITRE Corporation functions as Editor and Primary CNA. The CVE Editorial Board (set up by MITRE) discusses the candidate and votes on whether or not it should become a CVE entry. If the Board rejects a candidate, the reason for rejection is noted in the Editorial Board Archives posted on the CVE Web site. If the Board accepts a candidate, its status is updated to "entry" on the CVE List. However, the assignment of a candidate number is not a guarantee that it will become an official CVE entry.

When investigating a vulnerability or potential vulnerability it helps to acquire a CAN number early on. An entry is live once a number is assigned. However until the go-public date is reached, the CAN number's entry will not provide any information. It will instead show a placeholder to indicate that the number is taken. The benefit of early CVE candidacy is that all future correspondence can refer to the CAN/CVE number.[3]

References

  1. ^ "CVE - Common Vulnerabilities and Exposures". MITRE Corporation. 3 July 2007. http://cve.mitre.org/. Retrieved 2009-06-18. "CVE is sponsored by the National Cyber Security Division of the U.S. Department of Homeland Security." 
  2. ^ "About CVE Identifiers". MITRE. 2007-07-17. http://cve.mitre.org/cve/identifiers/index.html. Retrieved 2009-06-18. "CVE Identifiers (also called 'CVE names,' 'CVE numbers,' 'CVE-IDs,' and 'CVEs') are unique, common identifiers for publicly known information security vulnerabilities. CVE identifiers have 'entry' or 'candidate' status. Entry status indicates that the CVE Identifier has been accepted to the CVE List while candidate status (also called 'candidates,' 'candidate numbers,' or 'CANs') indicates that the identifier is under review for inclusion in the list." 
  3. ^ Fogel, Karl (2006). Producing Open Source Software. Sebastopol, CA: O'Reilly. pp. 158, 159. ISBN 0-596-00759-0. http://producingoss.com/en/publicity.html#security-cve. 

External links


Wikimedia Foundation. 2010.

Игры ⚽ Нужно сделать НИР?

Look at other dictionaries:

  • Common Vulnerabilities And Exposures — Pour les articles homonymes, voir CVE. Common Vulnerabilities and Exposures ou CVE est un dictionnaire des informations publiques relatives aux vulnérabilités de sécurité. Le dictionnaire est maintenu par l organisme MITRE, soutenu par le… …   Wikipédia en Français

  • Common vulnerabilities and exposures — Pour les articles homonymes, voir CVE. Common Vulnerabilities and Exposures ou CVE est un dictionnaire des informations publiques relatives aux vulnérabilités de sécurité. Le dictionnaire est maintenu par l organisme MITRE, soutenu par le… …   Wikipédia en Français

  • Common Vulnerabilities and Exposures — (CVE) ist ein Industriestandard, dessen Ziel die Einführung einer einheitlichen Namenskonvention für Sicherheitslücken und andere Schwachstellen in Computersystemen ist. Mehrfachbenennung gleicher Gefahren durch verschiedene Unternehmen und… …   Deutsch Wikipedia

  • Common Vulnerabilities and Exposures — Pour les articles homonymes, voir CVE. Common Vulnerabilities and Exposures ou CVE est un dictionnaire des informations publiques relatives aux vulnérabilités de sécurité. Le dictionnaire est maintenu par l organisme MITRE, soutenu par le… …   Wikipédia en Français

  • Common Vulnerability Scoring System — (CVSS) est un système d évaluation standardisé de la criticité des vulnérabilités selon des critères objectifs et mesurables. Cette évaluation est constituée de 3 mesures appelées métriques : la métrique de base, la métrique temporelle et la …   Wikipédia en Français

  • Cybercrime and Countermeasures — Cyber crime, or computer crime, refers to any crime that involves a computer and a network.[1] The computer may have been used in the commission of a crime, or it may be the target. Netcrime refers, more precisely, to criminal exploitation of the …   Wikipedia

  • Open Vulnerability and Assessment Language — (OVAL) is an international, information security, community standard to promote open and publicly available security content, and to standardize the transfer of this information across the entire spectrum of security tools and services. OVAL… …   Wikipedia

  • CVE — Common Vulnerabilities and Exposures (Computing » General) Common Vulnerabilities and Exposures (Computing » Security) *** Cape Verde Escudo (Regional » Currencies) * Collaborative Virtual Environment (Computing » Software) * Contemporary Vocal… …   Abbreviations dictionary

  • CVSS — Common Vulnerability Scoring System Common Vulnerability Scoring System (CVSS) est un système d évaluation standardisé de la criticité des vulnérabilités selon des critères objectifs et mesurables. Cette évaluation est constituée de 3 mesures… …   Wikipédia en Français

  • Vulnerability (computing) — In computer security, the term vulnerability is applied to a weakness in a system which allows an attacker to violate the integrity of that system. Vulnerabilities may result from weak passwords, software bugs, a computer virus or other malware,… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”