Monday, December 4, 2017

CVE Announce - December 4, 2017 (opt-in newsletter from the CVE website)

Welcome to the latest issue of the CVE-Announce e-newsletter. This email newsletter is designed to bring recent news about CVE, such as new website features, new CNAs, CVE in the news, etc. right to your email box. Common Vulnerabilities and Exposures (CVE) is the standard for cybersecurity vulnerability names. The CVE Board provides oversight and input into CVE's strategic direction, ensuring CVE meets the vulnerability identification needs of the technology community. CVE Numbering Authorities (CNAs) are vendors and projects, vulnerability researchers, national and industry CERTs, and bug bounty programs that assign CVE Identifiers (CVE IDs) to newly discovered issues, and include the CVE IDs in the first public disclosure of the vulnerabilities. Details on subscribing (and unsubscribing) to the email newsletter are at the end. Please feel free to pass this newsletter on to interested colleagues.

 

Comments: cve@mitre.org

 

-------------------------------------------------------

CVE-Announce e-newsletter/December 4, 2017

-------------------------------------------------------

 

Contents:

 

1. New CVE Board Member from IBM

2. Minutes from CVE Board Teleconference Meeting on November 15 Now Available

3. Follow us on LinkedIn and Twitter

4. Details/Credits + Subscribing and Unsubscribing

 

 

FEATURE STORY:

 

New CVE Board Member from IBM

 

Scott Moore of IBM has joined the CVE Board.

 

Read the full announcement and welcome message in the CVE Board email discussion list archive at http://cve.mitre.org/data/board/archives/2017-12/msg00001.html.

 

The CVE Board includes numerous cybersecurity-related organizations including commercial security tool vendors, academia, research institutions, government departments and agencies, and other prominent security experts, as well as end-users of vulnerability information. Through open and collaborative discussions, the Board provides critical input regarding the data sources, product coverage, coverage goals, operating structure, and strategic direction of the CVE program. All Board Meetings and Board Email List Discussions are archived for the community.

 

LINKS:

 

IBM -

https://www.ibm.com/

 

CVE Board -

https://cve.mitre.org/community/board/index.html

 

Board Archives -

https://cve.mitre.org/community/board/archive.html#meeting_summaries

https://cve.mitre.org/community/board/archive.html#board_mail_list_archive

 

CVE News page article -

https://cve.mitre.org/news/archives/2017/news.html#December042017_New_CVE_Board_Member_from_IBM

 

---------------------------------------------------------------

Minutes from CVE Board Teleconference Meeting on November 15 Now Available

 

The CVE Board held a teleconference meeting on November 15, 2017. Read the meeting minutes at https://cve.mitre.org/data/board/archives/2017-11/msg00044.html.

 

LINKS:

 

CVE Board -

https://cve.mitre.org/community/board/index.html

 

Board Archives -

https://cve.mitre.org/community/board/archive.html#meeting_summaries

https://cve.mitre.org/community/board/archive.html#board_mail_list_archive

 

CVE News page article -

https://cve.mitre.org/news/archives/2017/news.html#November282017_Minutes_from_CVE_Board_Teleconference_Meeting_on_November_15_Now_Available

 

---------------------------------------------------------------

Follow us on LinkedIn and Twitter

 

Please follow us on Twitter for the latest from CVE:

 

* Feed of the latest CVE Entries -

https://twitter.com/CVEnew/

 

* Feed of news and announcements about CVE -

https://twitter.com/CVEannounce/

 

Please also visit us on LinkedIn to more easily comment on our news articles and CVE Blog posts:

 

* CVE-CWE-CAPEC on LinkedIn -

https://www.linkedin.com/company/11033649

 

* CVE Blog -

https://cve.mitre.org/blog/

 

---------------------------------------------------------------

Details/Credits + Subscribing and Unsubscribing

 

To unsubscribe from the CVE-Announce e-newsletter, open a new email message and copy the following text to the BODY of the message "SIGNOFF CVE-Announce-List", then send the message to: listserv@lists.mitre.org. To subscribe, send an email message to listserv@lists.mitre.org with the following text in the BODY of the message: "SUBSCRIBE CVE-Announce-List".

 

CVE is sponsored by US-CERT (https://www.us-cert.gov/) in the office of Cybersecurity and Communications (https://www.dhs.gov/office-cybersecurity-and-communications/) at the U.S. Department of Homeland Security (https://www.dhs.gov/).

 

Copyright 2017, The MITRE Corporation. CVE and the CVE logo are registered trademarks of The MITRE Corporation. MITRE (https://www.mitre.org) maintains CVE and provides impartial technical guidance to the CVE Board and CVE Numbering Authorities on all matters related to ongoing development of CVE.

 

For more information about CVE, visit the CVE website at https://cve.mitre.org or send an email to cve@mitre.org.

 

Tuesday, November 14, 2017

CVE Announce - November 14, 2017 (opt-in newsletter from the CVE website)

Welcome to the latest issue of the CVE-Announce e-newsletter. This email newsletter is designed to bring recent news about CVE, such as new website features, new CNAs, CVE in the news, etc. right to your email box. Common Vulnerabilities and Exposures (CVE) is the standard for cybersecurity vulnerability names. The CVE Board provides oversight and input into CVE's strategic direction, ensuring CVE meets the vulnerability identification needs of the technology community. CVE Numbering Authorities (CNAs) are vendors and projects, vulnerability researchers, national and industry CERTs, and bug bounty programs that assign CVE Identifiers (CVE IDs) to newly discovered issues, and include the CVE IDs in the first public disclosure of the vulnerabilities. Details on subscribing (and unsubscribing) to the email newsletter are at the end. Please feel free to pass this newsletter on to interested colleagues.

 

Comments: cve@mitre.org

 

-------------------------------------------------------

CVE-Announce e-newsletter/November 14, 2017

-------------------------------------------------------

 

Contents:

 

1. CVE Adds 2 New CVE Numbering Authorities: Booz Allen Hamilton and SAP

2. Minutes from CVE Board Teleconference Meeting on November 1 Now Available

3. Follow us on LinkedIn and Twitter

4. Details/Credits + Subscribing and Unsubscribing

 

 

FEATURE STORY:

 

CVE Adds 2 New CVE Numbering Authorities: Booz Allen Hamilton and SAP

 

The following two organizations are now CVE Numbering Authorities (CNAs): SAP SE for all SAP products, and Booz Allen Hamilton, Inc. for all Booz Allen Hamilton products as well as vulnerabilities in third-party software discovered by Booz Allen Hamilton that are not covered by another CNA.

 

CNAs are organizations from around the world that are authorized to assign CVE IDs to vulnerabilities affecting products within their distinct, agreed-upon scope, for inclusion in first-time public announcements of new vulnerabilities.

 

CNAs are the main method for requesting a CVE ID. The following 81 organizations currently participate as CNAs: Adobe; Airbus; Alibaba; Apache; Apple; ASUSTOR; Atlassian; Autodesk; BlackBerry; Booz Allen Hamilton; Brocade; CA; Canonical; CERT/CC; Check Point; Cisco; Dahua; Debian GNU/Linux; Dell EMC; Distributed Weakness Filing Project; Drupal.org; Duo; Eclipse Foundation; Elastic; F5; Flexera Software; Forcepoint; Fortinet; FreeBSD; Google; HackerOne; HP; Hewlett Packard Enterprise; Huawei; IBM; ICS-CERT; Intel; IOActive; ISC; JPCERT/CC; Juniper; Kaspersky; KrCERT/CC; Larry Cashdollar; Lenovo; MarkLogic; McAfee; Micro Focus; Microsoft; MITRE (primary CNA); Mozilla; NetApp; Netflix; Netgear; Node.js; Nvidia; Objective Development; OpenSSL; Oracle; Puppet; Qihoo 360; QNAP; Qualcomm; Rapid 7; Red Hat; Riverbed; SAP; Schneider Electric; Siemens; Silicon Graphics; Symantec; Synology; Talos; Tenable; TIBCO; Trend Micro; VMware; Yandex; Zephyr Project; Zero Day Initiative; and ZTE.

 

For more information about requesting CVE ID numbers from CNAs, visit Request a CVE ID on the CVE website at https://cve.mitre.org/cve/request_id.html.

 

LINKS:

 

SAP -

https://www.sap.com/

 

Booz Allen Hamilton -

https://www.boozallen.com/

 

CNAs -

https://cve.mitre.org/cve/cna.html

 

Request a CVE ID from a CNA -

https://cve.mitre.org/cve/request_id.html

 

Become a CNA -

https://cve.mitre.org/cve/cna.html#become_a_cna

 

CVE News page articles -

https://cve.mitre.org/news/archives/2017/news.html#November092017_SAP_Added_as_CVE_Numbering_Authority_CNA

https://cve.mitre.org/news/archives/2017/news.html#November072017_Booz_Allen_Hamilton_Added_as_CVE_Numbering_Authority_CNA

 

---------------------------------------------------------------

Minutes from CVE Board Teleconference Meeting on November 1 Now Available

 

The CVE Board held a teleconference meeting on November 1, 2017. Read the meeting minutes at https://cve.mitre.org/data/board/archives/2017-11/msg00025.html.

 

The CVE Board includes numerous cybersecurity-related organizations including commercial security tool vendors, academia, research institutions, government departments and agencies, and other prominent security experts, as well as end-users of vulnerability information. Through open and collaborative discussions, the Board provides critical input regarding the data sources, product coverage, coverage goals, operating structure, and strategic direction of the CVE program. All Board Meetings and Board Email List Discussions are archived for the community.

 

LINKS:

 

CVE Board -

https://cve.mitre.org/community/board/index.html

 

Board Archives -

https://cve.mitre.org/community/board/archive.html#meeting_summaries

https://cve.mitre.org/community/board/archive.html#board_mail_list_archive

 

CVE News page article -

https://cve.mitre.org/news/archives/2017/news.html#November132017_Minutes_from_CVE_Board_Teleconference_Meeting_on_November_1_Now_Available

 

---------------------------------------------------------------

Follow us on LinkedIn and Twitter

 

Please follow us on Twitter for the latest from CVE:

 

* Feed of the latest CVE Entries -

https://twitter.com/CVEnew/

 

* Feed of news and announcements about CVE -

https://twitter.com/CVEannounce/

 

Please also visit us on LinkedIn to more easily comment on our news articles and CVE Blog posts:

 

* CVE-CWE-CAPEC on LinkedIn -

https://www.linkedin.com/company/11033649

 

* CVE Blog -

https://cve.mitre.org/blog/

 

---------------------------------------------------------------

Details/Credits + Subscribing and Unsubscribing

 

To unsubscribe from the CVE-Announce e-newsletter, open a new email message and copy the following text to the BODY of the message "SIGNOFF CVE-Announce-List", then send the message to: listserv@lists.mitre.org. To subscribe, send an email message to listserv@lists.mitre.org with the following text in the BODY of the message: "SUBSCRIBE CVE-Announce-List".

 

CVE is sponsored by US-CERT (https://www.us-cert.gov/) in the office of Cybersecurity and Communications (https://www.dhs.gov/office-cybersecurity-and-communications/) at the U.S. Department of Homeland Security (https://www.dhs.gov/).

 

Copyright 2017, The MITRE Corporation. CVE and the CVE logo are registered trademarks of The MITRE Corporation. MITRE (https://www.mitre.org) maintains CVE and provides impartial technical guidance to the CVE Board and CVE Numbering Authorities on all matters related to ongoing development of CVE.

 

For more information about CVE, visit the CVE website at https://cve.mitre.org or send an email to cve@mitre.org.

 

Wednesday, November 1, 2017

CVE Announce - November 1, 2017 (opt-in newsletter from the CVE website)

Welcome to the latest issue of the CVE-Announce e-newsletter. This email newsletter is designed to bring recent news about CVE, such as new website features, new CNAs, CVE in the news, etc. right to your email box. Common Vulnerabilities and Exposures (CVE) is the standard for cybersecurity vulnerability names. The CVE Board provides oversight and input into CVE's strategic direction, ensuring CVE meets the vulnerability identification needs of the technology community. CVE Numbering Authorities (CNAs) are vendors, security researchers, and research organizations that assign CVE Identifiers (CVE IDs) to newly discovered issues, and include the CVE IDs in the first public disclosure of the vulnerabilities. Details on subscribing (and unsubscribing) to the email newsletter are at the end. Please feel free to pass this newsletter on to interested colleagues.

 

Comments: cve@mitre.org

 

-------------------------------------------------------

CVE-Announce e-newsletter/November 1, 2017

-------------------------------------------------------

 

Contents:

 

1. Node.js Added as CVE Numbering Authority (CNA)

2. Minutes from CVE Board Teleconference Meeting on October 18 Now Available

3. Follow us on LinkedIn and Twitter

4. Details/Credits + Subscribing and Unsubscribing

 

 

FEATURE STORY:

 

Node.js Added as CVE Numbering Authority (CNA)

 

Node.js is now a CVE Numbering Authority (CNA) for all actively developed versions of software developed under the Node.js project on https://github.com/nodejs.

 

CNAs are organizations from around the world that are authorized to assign CVE IDs to vulnerabilities affecting products within their distinct, agreed-upon scope, for inclusion in first-time public announcements of new vulnerabilities.

 

CNAs are the main method for requesting a CVE ID. The following 79 organizations currently participate as CNAs: Adobe; Airbus; Alibaba; Apache; Apple; ASUSTOR; Atlassian; Autodesk; BlackBerry; Brocade; CA; Canonical; CERT/CC; Check Point; Cisco; Dahua; Debian GNU/Linux; Dell EMC; Distributed Weakness Filing Project; Drupal.org; Duo; Eclipse Foundation; Elastic; F5; Flexera Software; Forcepoint; Fortinet; FreeBSD; Google; HackerOne; HP; Hewlett Packard Enterprise; Huawei; IBM; ICS-CERT; Intel; IOActive; ISC; JPCERT/CC; Juniper; Kaspersky; KrCERT/CC; Larry Cashdollar; Lenovo; MarkLogic; McAfee; Micro Focus; Microsoft; MITRE (primary CNA); Mozilla; NetApp; Netflix; Netgear; Node.js; Nvidia; Objective Development; OpenSSL; Oracle; Puppet; Qihoo 360; QNAP; Qualcomm; Rapid 7; Red Hat; Riverbed; Schneider Electric; Siemens; Silicon Graphics; Symantec; Synology; Talos; Tenable; TIBCO; Trend Micro; VMware; Yandex; Zephyr Project; Zero Day Initiative; and ZTE.

 

For more information about requesting CVE ID numbers from CNAs, visit Request a CVE ID on the CVE website at https://cve.mitre.org/cve/request_id.html.

 

LINKS:

 

Node.js -

https://nodejs.org/en/security/

 

CNAs -

https://cve.mitre.org/cve/cna.html

 

Request a CVE ID from a CNA -

https://cve.mitre.org/cve/request_id.html

 

Become a CNA -

https://cve.mitre.org/cve/cna.html#become_a_cna

 

CVE News page article -

https://cve.mitre.org/news/archives/2017/news.html#October252017_Node.js_Added_as_CVE_Numbering_Authority_CNA

 

---------------------------------------------------------------

Minutes from CVE Board Teleconference Meeting on October 18 Now Available

 

The CVE Board held a teleconference meeting on October 18, 2017. Read the meeting minutes at https://cve.mitre.org/data/board/archives/2017-10/msg00062.html.

 

The CVE Board includes numerous cybersecurity-related organizations including commercial security tool vendors, academia, research institutions, government departments and agencies, and other prominent security experts, as well as end-users of vulnerability information. Through open and collaborative discussions, the Board provides critical input regarding the data sources, product coverage, coverage goals, operating structure, and strategic direction of the CVE program. All Board Meetings and Board Email List Discussions are archived for the community.

 

LINKS:

 

CVE Board -

https://cve.mitre.org/community/board/index.html

 

Board Archives -

https://cve.mitre.org/community/board/archive.html#meeting_summaries

https://cve.mitre.org/community/board/archive.html#board_mail_list_archive

 

CVE News page article -

https://cve.mitre.org/news/archives/2017/news.html#October262017_Minutes_from_CVE_Board_Teleconference_Meeting_on_October_18_Now_Available

 

---------------------------------------------------------------

Follow us on LinkedIn and Twitter

 

Please follow us on Twitter for the latest from CVE:

 

* Feed of the latest CVE Entries -

https://twitter.com/CVEnew/

 

* Feed of news and announcements about CVE -

https://twitter.com/CVEannounce/

 

Please also visit us on LinkedIn to more easily comment on our news articles and CVE Blog posts:

 

* CVE-CWE-CAPEC on LinkedIn -

https://www.linkedin.com/company/11033649

 

* CVE Blog -

https://cve.mitre.org/blog/

 

---------------------------------------------------------------

Details/Credits + Subscribing and Unsubscribing

 

To unsubscribe from the CVE-Announce e-newsletter, open a new email message and copy the following text to the BODY of the message "SIGNOFF CVE-Announce-List", then send the message to: listserv@lists.mitre.org. To subscribe, send an email message to listserv@lists.mitre.org with the following text in the BODY of the message: "SUBSCRIBE CVE-Announce-List".

 

CVE is sponsored by US-CERT (https://www.us-cert.gov/) in the office of Cybersecurity and Communications (https://www.dhs.gov/office-cybersecurity-and-communications/) at the U.S. Department of Homeland Security (https://www.dhs.gov/).

 

Copyright 2017, The MITRE Corporation. CVE and the CVE logo are registered trademarks of The MITRE Corporation. MITRE (https://www.mitre.org) maintains CVE and provides impartial technical guidance to the CVE Board and CVE Numbering Authorities on all matters related to ongoing development of CVE.

 

For more information about CVE, visit the CVE website at https://cve.mitre.org or send an email to cve@mitre.org.

 

Monday, October 16, 2017

CVE Announce - October 16, 2017 (opt-in newsletter from the CVE website)

Welcome to the latest issue of the CVE-Announce e-newsletter. This email newsletter is designed to bring recent news about CVE, such as new website features, new CNAs, CVE in the news, etc. right to your email box. Common Vulnerabilities and Exposures (CVE) is the standard for cybersecurity vulnerability names. The CVE Board provides oversight and input into CVE's strategic direction, ensuring CVE meets the vulnerability identification needs of the technology community. CVE Numbering Authorities (CNAs) are vendors, security researchers, and research organizations that assign CVE Identifiers (CVE IDs) to newly discovered issues, and include the CVE IDs in the first public disclosure of the vulnerabilities. Details on subscribing (and unsubscribing) to the email newsletter are at the end. Please feel free to pass this newsletter on to interested colleagues.

 

Comments: cve@mitre.org

 

-------------------------------------------------------

CVE-Announce e-newsletter/October 16, 2017

-------------------------------------------------------

 

Contents:

 

1. NetApp Added as CVE Numbering Authority (CNA)

2. CVE Blog: "CNA Rules, Version 2.0 to Take Effect on January 1st"

3. Minutes from CVE Board Teleconference Meeting on October 4 Now Available

4. Follow us on LinkedIn and Twitter

5. Details/Credits + Subscribing and Unsubscribing

 

 

FEATURE STORY:

 

NetApp Added as CVE Numbering Authority (CNA)

 

NetApp, Inc. is now a CVE Numbering Authority (CNA) for all NetApp products, as well as projects hosted on https://github.com/netapp.

 

CNAs are organizations from around the world that are authorized to assign CVE IDs to vulnerabilities affecting products within their distinct, agreed-upon scope, for inclusion in first-time public announcements of new vulnerabilities.

 

CNAs are the main method for requesting a CVE ID. The following 78 organizations currently participate as CNAs: Adobe; Airbus; Alibaba; Apache; Apple; Atlassian; Autodesk; BlackBerry; Brocade; CA; Canonical; CERT/CC; Check Point; Cisco; Dahua; Debian GNU/Linux; Dell EMC; Distributed Weakness Filing Project; Drupal.org; Duo; Eclipse Foundation; Elastic; F5; Flexera Software; Fortinet; FreeBSD; Google; HackerOne; HP; Hewlett Packard Enterprise; Huawei; IBM; ICS-CERT; Intel; IOActive; ISC; JPCERT/CC; Juniper; Kaspersky; KrCERT/CC; Larry Cashdollar; Lenovo; MarkLogic; McAfee; Micro Focus; Microsoft; MITRE (primary CNA); Mozilla; NetApp; Netflix; Netgear; Nvidia; Objective Development; OpenSSL; Oracle; Puppet; Qihoo 360; QNAP; Qualcomm; Rapid 7; Red Hat; Riverbed; Schneider Electric; Siemens; Silicon Graphics; Symantec; Synology; Talos; Tenable; TIBCO; Trend Micro; VMware; Yandex; Zephyr Project; Zero Day Initiative; and ZTE.

 

For more information about requesting CVE ID numbers from CNAs, visit Request a CVE ID on the CVE website at https://cve.mitre.org/cve/request_id.html.

 

LINKS:

 

NetApp -

https://www.netapp.com/

 

CNAs -

https://cve.mitre.org/cve/cna.html

 

Request a CVE ID from a CNA -

https://cve.mitre.org/cve/request_id.html

 

Become a CNA -

https://cve.mitre.org/cve/cna.html#become_a_cna

 

CVE News page article -

https://cve.mitre.org/news/archives/2017/news.html#October132017_NetApp_Added_as_CVE_Numbering_Authority_CNA

 

---------------------------------------------------------------

CVE Blog: "CNA Rules, Version 2.0 to Take Effect on January 1st"

 

The policies and processes managing the CVE Numbering Authorities (CNAs) Program, known as the "CNA Rules," have been revised with significant input from the CNA community. These revised rules, "CVE Numbering Authorities (CNA) Rules, Version 2.0," will go into effect on January 1, 2018.

 

CNA Rules, Version 2.0, which is updated from Version 1.1, includes the following clarifications and improvements:

 

* Fixed a number of typos and reworded some phrasing for clarity.

* Clarified existing rules regarding communicating with other vendors or CNAs and the difference between CVE entries that are marked as disputed versus rejected.

* Defined additional terms, such as what it means for a vulnerability to be "public" and the definition of "hardware" within CVE and what hardware can receive CVE IDs.

* Set the CVE JSON format to be the preferred format for submitting CVE requests.

* Removed the CVE assignment requirement for Root CNAs, making it optional.

* A new rule indicating that CNAs must publish their CNA scope on their website as well as some other disclosure process information.

 

For detailed information about the changes, please see the issue tracker at https://github.com/CVEProject/docs/issues and change logs at https://github.com/CVEProject/docs/tree/cna-documents/cna/CNA%20Rules/CNA%20Rules%20Development.

 

If you have any questions or comments about the revised CNA Rules document, please contact us via our CVE Request web form at https://cveform.mitre.org/ by selecting Other from the dropdown menu, or email us directly at cve@mitre.org.

 

We look forward to hearing from you!

 

- The CVE Team

  October 13, 2017

  cve@mitre.org

 

LINKS:

 

CVE Numbering Authorities -

https://cve.mitre.org/cve/cna.html

 

Become a CNA -

https://cve.mitre.org/cve/cna.html#become_a_cna

 

CVE Blog post -

https://cve.mitre.org/blog/index.html#October132017_CNA_Rules_Version_2.0_to_Take_Effect_on_January_1st

 

---------------------------------------------------------------

Minutes from CVE Board Teleconference Meeting on October 4 Now Available

 

The CVE Board held a teleconference meeting on October 4, 2017. Read the meeting minutes at https://cve.mitre.org/data/board/archives/2017-10/msg00032.html.

 

The CVE Board includes numerous cybersecurity-related organizations including commercial security tool vendors, academia, research institutions, government departments and agencies, and other prominent security experts, as well as end-users of vulnerability information. Through open and collaborative discussions, the Board provides critical input regarding the data sources, product coverage, coverage goals, operating structure, and strategic direction of the CVE program. All Board Meetings and Board Email List Discussions are archived for the community.

 

LINKS:

 

CVE Board -

https://cve.mitre.org/community/board/index.html

 

Board Archives -

https://cve.mitre.org/community/board/archive.html#meeting_summaries

https://cve.mitre.org/community/board/archive.html#board_mail_list_archive

 

CVE News page article -

https://cve.mitre.org/news/archives/2017/news.html#October132017_Minutes_from_CVE_Board_Teleconference_Meeting_on_October_4_Now_Available

 

---------------------------------------------------------------

Follow us on LinkedIn and Twitter

 

Please follow us on Twitter for the latest from CVE:

 

* Feed of the latest CVE IDs -

https://twitter.com/CVEnew/

 

* Feed of news and announcements about CVE -

https://twitter.com/CVEannounce/

 

Please also visit us on LinkedIn to more easily comment on our news articles and CVE Blog posts:

 

* CVE-CWE-CAPEC on LinkedIn -

https://www.linkedin.com/company/11033649

 

* CVE Blog -

https://cve.mitre.org/blog/

 

---------------------------------------------------------------

Details/Credits + Subscribing and Unsubscribing

 

Managing Editor: Dan Adinolfi, Cyber Security Technical Center. Writer: Bob Roberge. The MITRE Corporation (www.mitre.org) maintains CVE and provides impartial technical guidance to the CVE Board and CVE Numbering Authorities on all matters related to ongoing development of CVE.

 

To unsubscribe from the CVE-Announce e-newsletter, open a new email message and copy the following text to the BODY of the message "SIGNOFF CVE-Announce-List", then send the message to: listserv@lists.mitre.org. To subscribe, send an email message to listserv@lists.mitre.org with the following text in the BODY of the message: "SUBSCRIBE CVE-Announce-List".

 

Copyright 2017, The MITRE Corporation. CVE and the CVE logo are registered trademarks of The MITRE Corporation. CVE is sponsored by US-CERT (www.us-cert.gov) in the office of Cybersecurity and Communications (www.dhs.gov/office-cybersecurity-and-communications) at the U.S. Department of Homeland Security (www.dhs.gov).

 

For more information about CVE, visit the CVE website at https://cve.mitre.org or send an email to cve@mitre.org.

 

Friday, October 6, 2017

CVE Announce - October 6, 2017 (opt-in newsletter from the CVE website)

Welcome to the latest issue of the CVE-Announce e-newsletter. This email newsletter is designed to bring recent news about CVE, such as new website features, new CNAs, CVE in the news, etc. right to your email box. Common Vulnerabilities and Exposures (CVE) is the standard for cybersecurity vulnerability names. The CVE Board provides oversight and input into CVE's strategic direction, ensuring CVE meets the vulnerability identification needs of the technology community. CVE Numbering Authorities (CNAs) are vendors, security researchers, and research organizations that assign CVE Identifiers (CVE IDs) to newly discovered issues, and include the CVE IDs in the first public disclosure of the vulnerabilities. Details on subscribing (and unsubscribing) to the email newsletter are at the end. Please feel free to pass this newsletter on to interested colleagues.

 

Comments: cve@mitre.org

 

-------------------------------------------------------

CVE-Announce e-newsletter/October 6, 2017

-------------------------------------------------------

 

Contents:

 

1. CVE Adds 4 New CVE Numbering Authorities: ASUSTOR, Forcepoint, Riverbed, and Zephyr

2. CVE Replaces "CVE Compatibility Program" with CVE Compatibility Guidance Document

3. Minutes from CVE Board Teleconference Meetings on August 9 and August 23 Now Available

4. Follow us on LinkedIn and Twitter

5. Details/Credits + Subscribing and Unsubscribing

 

 

FEATURE STORY:

 

CVE Adds 4 New CVE Numbering Authorities: ASUSTOR, Forcepoint, Riverbed, and Zephyr

 

The following four organizations are now CVE Numbering Authorities (CNAs): ASUSTOR Inc. for its ASUSTOR network attached storage (NAS) products, as well as its ADM systems, NAS apps, mobile apps, and utilities; Forcepoint for its own products; Riverbed Technology, Inc. for its own products; and Zephyr Project for Zephyr project components and vulnerabilities that are not already covered by another CNA.

 

CNAs are organizations from around the world that are authorized to assign CVE IDs to vulnerabilities affecting products within their distinct, agreed-upon scope, for inclusion in first-time public announcements of new vulnerabilities.

 

CNAs are the main method for requesting a CVE ID. The following 75 organizations currently participate as CNAs: Adobe; Airbus; Alibaba; Apache; Apple; Atlassian; Autodesk; BlackBerry; Brocade; CA; Canonical; CERT/CC; Check Point; Cisco; Dahua; Debian GNU/Linux; Dell EMC; Distributed Weakness Filing Project; Drupal.org; Duo; Eclipse Foundation; Elastic; F5; Flexera Software; Fortinet; FreeBSD; Google; HackerOne; HP; Hewlett Packard Enterprise; Huawei; IBM; ICS-CERT; Intel; IOActive; ISC; JPCERT/CC; Juniper; Kaspersky; KrCERT/CC; Larry Cashdollar; Lenovo; MarkLogic; McAfee; Micro Focus; Microsoft; MITRE (primary CNA); Mozilla; Netflix; Netgear; Nvidia; Objective Development; OpenSSL; Oracle; Puppet; Qihoo 360; QNAP; Qualcomm; Rapid 7; Red Hat; Riverbed; Schneider Electric; Siemens; Silicon Graphics; Symantec; Synology; Talos; Tenable; TIBCO; Trend Micro; VMware; Yandex; Zephyr Project; Zero Day Initiative; and ZTE.

 

For more information about requesting CVE ID numbers from CNAs, visit Request a CVE ID on the CVE website at https://cve.mitre.org/cve/request_id.html.

 

LINKS:

 

ASUSTOR -

https://www.asustor.com/

 

Forcepoint -

https://www.forcepoint.com/

 

Riverbed -

https://www.riverbed.com/

 

Zephyr -

https://www.zephyrproject.org/

 

CNAs -

https://cve.mitre.org/cve/cna.html

 

Request a CVE ID from a CNA -

https://cve.mitre.org/cve/request_id.html

 

Become a CNA -

https://cve.mitre.org/cve/cna.html#become_a_cna

 

CVE News page articles -

https://cve.mitre.org/news/archives/2017/news.html#October052017_ASUSTOR_Added_as_CVE_Numbering_Authority_CNA

https://cve.mitre.org/news/archives/2017/news.html#September212017_Forcepoint_Added_as_CVE_Numbering_Authority_CNA

https://cve.mitre.org/news/archives/2017/news.html#September82017_Riverbed_and_Zephyr_Added_as_CVE_Numbering_Authority_CNA

 

---------------------------------------------------------------

CVE Replaces "CVE Compatibility Program" with CVE Compatibility Guidance Document

 

The previous formal CVE Compatibility Program of declarations and questionnaires has been discontinued, and all product listings from the program have been moved to "archive" status. The CVE Team will no longer accept declarations or questionnaires.

 

Instead, a CVE Compatibility Guidelines document is now available at https://cve.mitre.org/compatible/guidelines.html to assist you in making your product or service "CVE Compatible." This new guidance includes detailed information on the following topics: definitions, high-level guidelines, accuracy, documentation, CVE date usage, CVE syntax support, type-specific guidelines, and media guidelines.

 

If you have any comments or concerns about the discontinued program or the new guidance document, please use our CVE Request web form at https://cveform.mitre.org/ and select the Other request type to contact us.

 

LINKS:

 

"CVE Compatibility Guidelines" document -

https://cve.mitre.org/compatible/guidelines.html

 

CVE Compatibility Program (Archived) -

https://cve.mitre.org/compatible/index.html

 

CVE Request web form for questions -

https://cveform.mitre.org/

 

---------------------------------------------------------------

Minutes from CVE Board Teleconference Meetings on September 6 and September 20 Now Available

 

The CVE Board held teleconference meetings on September 6, 2017 and September 20, 2017. Read the September 6 meeting minutes at https://cve.mitre.org/data/board/archives/2017-09/msg00028.html, or the September 20 meeting minutes at https://cve.mitre.org/data/board/archives/2017-09/msg00056.html.

 

The CVE Board includes numerous cybersecurity-related organizations including commercial security tool vendors, academia, research institutions, government departments and agencies, and other prominent security experts, as well as end-users of vulnerability information. Through open and collaborative discussions, the Board provides critical input regarding the data sources, product coverage, coverage goals, operating structure, and strategic direction of the CVE program. All Board Meetings and Board Email List Discussions are archived for the community.

 

LINKS:

 

CVE Board -

https://cve.mitre.org/community/board/index.html

 

Board Archives -

https://cve.mitre.org/community/board/archive.html#meeting_summaries

https://cve.mitre.org/community/board/archive.html#board_mail_list_archive

 

CVE News page articles -

https://cve.mitre.org/news/archives/2017/news.html#September142017_Minutes_from_CVE_Board_Teleconference_Meeting_on_September_6_Now_Available

https://cve.mitre.org/news/archives/2017/news.html#September292017_Minutes_from_CVE_Board_Teleconference_Meeting_on_September_20_Now_Available

 

---------------------------------------------------------------

Follow us on LinkedIn and Twitter

 

Please follow us on Twitter for the latest from CVE:

 

* Feed of the latest CVE IDs -

https://twitter.com/CVEnew/

 

* Feed of news and announcements about CVE -

https://twitter.com/CVEannounce/

 

Please also visit us on LinkedIn to more easily comment on our news articles and CVE Blog posts:

 

* CVE-CWE-CAPEC on LinkedIn -

https://www.linkedin.com/company/11033649

 

* CVE Blog -

https://cve.mitre.org/blog/

 

---------------------------------------------------------------

Details/Credits + Subscribing and Unsubscribing

 

Managing Editor: Dan Adinolfi, Cyber Security Technical Center. Writer: Bob Roberge. The MITRE Corporation (www.mitre.org) maintains CVE and provides impartial technical guidance to the CVE Board and CVE Numbering Authorities on all matters related to ongoing development of CVE.

 

To unsubscribe from the CVE-Announce e-newsletter, open a new email message and copy the following text to the BODY of the message "SIGNOFF CVE-Announce-List", then send the message to: listserv@lists.mitre.org. To subscribe, send an email message to listserv@lists.mitre.org with the following text in the BODY of the message: "SUBSCRIBE CVE-Announce-List".

 

Copyright 2017, The MITRE Corporation. CVE and the CVE logo are registered trademarks of The MITRE Corporation. CVE is sponsored by US-CERT (www.us-cert.gov) in the office of Cybersecurity and Communications (www.dhs.gov/office-cybersecurity-and-communications) at the U.S. Department of Homeland Security (www.dhs.gov).

 

For more information about CVE, visit the CVE website at https://cve.mitre.org or send an email to cve@mitre.org.

 

Monday, September 11, 2017

CVE Announce - September 11, 2017 (opt-in newsletter from the CVE website)

Welcome to the latest issue of the CVE-Announce e-newsletter. This email newsletter is designed to bring recent news about CVE, such as new website features, new CNAs, CVE in the news, etc. right to your email box. Common Vulnerabilities and Exposures (CVE) is the standard for cybersecurity vulnerability names. The CVE Board provides oversight and input into CVE's strategic direction, ensuring CVE meets the vulnerability identification needs of the technology community. CVE Numbering Authorities (CNAs) are vendors, security researchers, and research organizations that assign CVE Identifiers (CVE IDs) to newly discovered issues, and include the CVE IDs in the first public disclosure of the vulnerabilities. Details on subscribing (and unsubscribing) to the email newsletter are at the end. Please feel free to pass this newsletter on to interested colleagues.

 

Comments: cve@mitre.org

 

-------------------------------------------------------

CVE-Announce e-newsletter/September 11, 2017

-------------------------------------------------------

 

Contents:

 

1. QNAP Added as CVE Numbering Authority (CNA)

2. Minutes from CVE Board Teleconference Meetings on August 9 and August 23 Now Available

3. Follow us on LinkedIn and Twitter

4. Details/Credits + Subscribing and Unsubscribing

 

 

FEATURE STORY:

 

QNAP Added as CVE Numbering Authority (CNA)

 

QNAP Systems, Inc. is now a CVE Numbering Authority (CNA) for its QTS, QES, and QVR products as well as its mobile apps and utilities.

 

CNAs are OS and product vendors, developers, security researchers, and research organizations that assign CVE IDs to newly discovered issues without directly involving MITRE in the details of the specific vulnerabilities, and include the CVE IDs in the first public disclosure of the vulnerabilities.

 

CNAs are the main method for requesting a CVE ID. The following 73 organizations currently participate as CNAs: Adobe; Airbus; Alibaba; Apache; Apple; Atlassian; Autodesk; BlackBerry; Brocade; CA; Canonical; CERT/CC; Check Point; Cisco; Dahua; Debian GNU/Linux; Dell EMC; Distributed Weakness Filing Project; Drupal.org; Duo; Eclipse Foundation; Elastic; F5; Flexera Software; Fortinet; FreeBSD; Google; HackerOne; HP; Hewlett Packard Enterprise; Huawei; IBM; ICS-CERT; Intel; IOActive; ISC; JPCERT/CC; Juniper; Kaspersky; KrCERT/CC; Larry Cashdollar; Lenovo; MarkLogic; McAfee; Micro Focus; Microsoft; MITRE (primary CNA); Mozilla; Netflix; Netgear; Nvidia; Objective Development; OpenSSL; Oracle; Puppet; Qihoo 360; QNAP; Qualcomm; Rapid 7; Red Hat; Schneider Electric; Siemens; Silicon Graphics; Symantec; Synology; Talos; Tenable; TIBCO; Trend Micro; VMware; Yandex; Zero Day Initiative; and ZTE.

 

For more information about requesting CVE ID numbers from CNAs, visit Request a CVE ID on the CVE website at https://cve.mitre.org/cve/request_id.html.

 

LINKS:

 

QNAP -

https://www.qnap.com/en-us/

 

CNAs -

https://cve.mitre.org/cve/cna.html

 

Request a CVE ID from a CNA -

https://cve.mitre.org/cve/request_id.html

 

Become a CNA -

https://cve.mitre.org/cve/cna.html#become_a_cna

 

CVE News page article -

https://cve.mitre.org/news/archives/2017/news.html#August222017_QNAP_Added_as_CVE_Numbering_Authority_CNA

 

---------------------------------------------------------------

Minutes from CVE Board Teleconference Meetings on August 9 and August 23 Now Available

 

The CVE Board held teleconference meetings on August 9, 2017 and August 23, 2017. Read the August 9 meeting minutes at https://cve.mitre.org/data/board/archives/2017-08/msg00016.html, or the August 23 meeting minutes at https://cve.mitre.org/data/board/archives/2017-09/msg00001.html.

 

The CVE Board includes numerous cybersecurity-related organizations including commercial security tool vendors, academia, research institutions, government departments and agencies, and other prominent security experts, as well as end-users of vulnerability information. Through open and collaborative discussions, the Board provides critical input regarding the data sources, product coverage, coverage goals, operating structure, and strategic direction of the CVE program. All Board Meetings and Board Email List Discussions are archived for the community.

 

LINKS:

 

CVE Board -

https://cve.mitre.org/community/board/index.html

 

Board Archives -

https://cve.mitre.org/community/board/archive.html#meeting_summaries

https://cve.mitre.org/community/board/archive.html#board_mail_list_archive

 

CVE News page articles -

https://cve.mitre.org/news/archives/2017/news.html#August162017_Minutes_from_CVE_Board_Teleconference_Meeting_on_August_9_Now_Available

https://cve.mitre.org/news/archives/2017/news.html#September52017_Minutes_from_CVE_Board_Teleconference_Meeting_on_August_23_Now_Available

 

---------------------------------------------------------------

Follow us on LinkedIn and Twitter

 

Please follow us on Twitter for the latest from CVE:

 

* Feed of the latest CVE IDs -

https://twitter.com/CVEnew/

 

* Feed of news and announcements about CVE -

https://twitter.com/CVEannounce/

 

Please also visit us on LinkedIn to more easily comment on our news articles and CVE Blog posts:

 

* CVE-CWE-CAPEC on LinkedIn -

https://www.linkedin.com/company/11033649

 

* CVE Blog -

https://cve.mitre.org/blog/

 

---------------------------------------------------------------

Details/Credits + Subscribing and Unsubscribing

 

Managing Editor: Dan Adinolfi, Cyber Security Technical Center. Writer: Bob Roberge. The MITRE Corporation (www.mitre.org) maintains CVE and provides impartial technical guidance to the CVE Board and CVE Numbering Authorities on all matters related to ongoing development of CVE.

 

To unsubscribe from the CVE-Announce e-newsletter, open a new email message and copy the following text to the BODY of the message "SIGNOFF CVE-Announce-List", then send the message to: listserv@lists.mitre.org. To subscribe, send an email message to listserv@lists.mitre.org with the following text in the BODY of the message: "SUBSCRIBE CVE-Announce-List".

 

Copyright 2017, The MITRE Corporation. CVE and the CVE logo are registered trademarks of The MITRE Corporation. CVE is sponsored by US-CERT (www.us-cert.gov) in the office of Cybersecurity and Communications (www.dhs.gov/office-cybersecurity-and-communications) at the U.S. Department of Homeland Security (www.dhs.gov).

 

For more information about CVE, visit the CVE website at https://cve.mitre.org or send an email to cve@mitre.org.

 

Friday, August 11, 2017

CVE Announce - August 11, 2017 (opt-in newsletter from the CVE website)

Welcome to the latest issue of the CVE-Announce e-newsletter. This email newsletter is designed to bring recent news about CVE, such as new website features, new CNAs, CVE in the news, etc. right to your email box. Common Vulnerabilities and Exposures (CVE) is the standard for cybersecurity vulnerability names. The CVE Board provides oversight and input into CVE's strategic direction, ensuring CVE meets the vulnerability identification needs of the technology community. CVE Numbering Authorities (CNAs) are major OS vendors, security researchers, and research organizations that assign CVE Identifiers (CVE IDs) to newly discovered issues without directly involving MITRE in the details of the specific vulnerabilities, and include the CVE IDs in the first public disclosure of the vulnerabilities. Details on subscribing (and unsubscribing) to the email newsletter are at the end. Please feel free to pass this newsletter on to interested colleagues.

 

Comments: cve@mitre.org

 

-------------------------------------------------------

CVE-Announce e-newsletter/August 11, 2017

-------------------------------------------------------

 

Contents:

 

1. Airbus and Kaspersky Labs Added as CVE Numbering Authorities (CNAs)

2. Autodesk Added as CVE Numbering Authority (CNA)

3. Follow us on LinkedIn and Twitter

4. Details/Credits + Subscribing and Unsubscribing

 

 

FEATURE STORY:

 

Airbus and Kaspersky Labs Added as CVE Numbering Authorities (CNAs)

 

Airbus and Kaspersky Labs are now CVE Numbering Authorities (CNAs). The scope for Airbus is all Airbus products as well as vulnerabilities in third-party software discovered by Airbus that are not covered by another CNA and for Kaspersky Labs it is their B2C products (Kaspersky Free, Kaspersky Privacy Cleaner, Kaspersky Secure Connection, Kaspersky Password Manager, Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Password Manager, Kaspersky Safe Kids, Kaspersky Virus Scanner, Kaspersky Virus Scanner Pro, Kaspersky Security Scan, Kaspersky Software Updater, Kaspersky System Checker, Kaspersky AdCleaner, Kaspersky QR Scanner, Kaspersky Safe Browser, Kaspersky Threat Scan, Kaspersky Virus Removal Tool, and Kaspersky Rescue Disk) and B2B products (Kaspersky Small Office Security, Kaspersky Endpoint Security Cloud, Kaspersky Endpoint Security for Business Select, Kaspersky Endpoint Security for Business Advanced, Kaspersky Endpoint Security for Business Total, Kaspersky Security for Mail Server, Kaspersky Security for File Server, Kaspersky Security for Mobile, Kaspersky Security for Internet Gateway, Kaspersky Security for Virtualization, Kaspersky Security for Collaboration, Kaspersky Systems Management, Kaspersky Security for Storage, Kaspersky DDoS Protection, Kaspersky Embedded Systems Security, Kaspersky Anti-Targeted Attack Platform, Kaspersky Security Intelligence Services, Kaspersky Fraud Prevention, and Kaspersky Industrial CyberSecurity) as well as vulnerabilities discovered in third-party software not covered by another CNA.

 

CNAs are OS and product vendors, developers, security researchers, and research organizations that assign CVE IDs to newly discovered issues without directly involving MITRE in the details of the specific vulnerabilities, and include the CVE IDs in the first public disclosure of the vulnerabilities.

 

CNAs are the main method for requesting a CVE ID. The following 72 organizations currently participate as CNAs: Adobe; Airbus, Alibaba; Apache; Apple; Atlassian; Autodesk; BlackBerry; Brocade; CA; Canonical; CERT/CC; Check Point; Cisco; Dahua; Debian GNU/Linux; Dell EMC; Distributed Weakness Filing Project; Drupal.org; Duo; Eclipse Foundation; Elastic; F5; Flexera Software; Fortinet; FreeBSD; Google; HackerOne; HP; Hewlett Packard Enterprise; Huawei; IBM; ICS-CERT; Intel; IOActive; ISC; JPCERT/CC; Juniper; Kaspersky Labs; KrCERT/CC; Larry Cashdollar; Lenovo; MarkLogic; McAfee; Micro Focus; Microsoft; MITRE (primary CNA); Mozilla; Netflix; Netgear; Nvidia; Objective Development; OpenSSL; Oracle; Puppet; Qihoo 360; Qualcomm; Rapid 7; Red Hat; Schneider Electric; Siemens; Silicon Graphics; Symantec; Synology; Talos; Tenable; TIBCO; Trend Micro; VMware; Yandex; Zero Day Initiative, and ZTE.

 

For more information about requesting CVE ID numbers from CNAs, visit Request a CVE ID on the CVE website at https://cve.mitre.org/cve/request_id.html.

 

LINKS:

 

Airbus -

http://www.airbus.com/

 

Kaspersky Labs -

http://www.kaspersky.com/

 

CNAs -

https://cve.mitre.org/cve/cna.html

 

Request a CVE ID from a CNA -

https://cve.mitre.org/cve/request_id.html

 

Become a CNA -

https://cve.mitre.org/cve/cna.html#become_a_cna

 

CVE News page article -

http://cve.mitre.org/news/archives/2017/news.html#August102017_Airbus_and_Kaspersky_Added_as_CVE_Numbering_Authority_CNA

 

--------------------------------------------------------------

Autodesk Added as CVE Numbering Authority (CNA)

 

Autodesk is now a CVE Numbering Authority (CNA) for all currently supported Autodesk Applications and Cloud Services.

 

CNAs are OS and product vendors, developers, security researchers, and research organizations that assign CVE IDs to newly discovered issues without directly involving MITRE in the details of the specific vulnerabilities, and include the CVE IDs in the first public disclosure of the vulnerabilities.

 

CNAs are the main method for requesting a CVE ID. The following 70 organizations currently participate as CNAs: Adobe; Alibaba; Apache; Apple; Atlassian; Autodesk; BlackBerry; Brocade; CA; Canonical; CERT/CC; Check Point; Cisco; Dahua; Debian GNU/Linux; Dell EMC; Distributed Weakness Filing Project; Drupal.org; Duo; Eclipse Foundation; Elastic; F5; Flexera Software; Fortinet; FreeBSD; Google; HackerOne; HP; Hewlett Packard Enterprise; Huawei; IBM; ICS-CERT; Intel; IOActive; ISC; JPCERT/CC; Juniper; KrCERT/CC; Larry Cashdollar; Lenovo; MarkLogic; McAfee; Micro Focus; Microsoft; MITRE (primary CNA); Mozilla; Netflix; Netgear; Nvidia; Objective Development; OpenSSL; Oracle; Puppet; Qihoo 360; Qualcomm; Rapid 7; Red Hat; Schneider Electric; Siemens; Silicon Graphics; Symantec; Synology; Talos; Tenable; TIBCO; Trend Micro; VMware; Yandex; Zero Day Initiative, and ZTE.

 

For more information about requesting CVE ID numbers from CNAs, visit Request a CVE ID on the CVE website at https://cve.mitre.org/cve/request_id.html.

 

LINKS:

 

Autodesk -

https://www.autodesk.com/

 

CNAs -

https://cve.mitre.org/cve/cna.html

 

Request a CVE ID from a CNA -

https://cve.mitre.org/cve/request_id.html

 

Become a CNA -

https://cve.mitre.org/cve/cna.html#become_a_cna

 

CVE News page article -

http://cve.mitre.org/news/archives/2017/news.html#August092017_Autodesk_Added_as_CVE_Numbering_Authority_CNA

 

---------------------------------------------------------------

Follow us on LinkedIn and Twitter

 

Please follow us on Twitter for the latest from CVE:

 

* Feed of the latest CVE IDs -

https://twitter.com/CVEnew/

 

* Feed of news and announcements about CVE -

https://twitter.com/CVEannounce/

 

Please also visit us on LinkedIn to more easily comment on our news articles and CVE Blog posts:

 

* CVE-CWE-CAPEC on LinkedIn -

https://www.linkedin.com/company/11033649

 

* CVE Blog -

https://cve.mitre.org/blog/

 

---------------------------------------------------------------

Details/Credits + Subscribing and Unsubscribing

 

Managing Editor: Dan Adinolfi, Cyber Security Technical Center. Writer: Bob Roberge. The MITRE Corporation (www.mitre.org) maintains CVE and provides impartial technical guidance to the CVE Board and CVE Numbering Authorities on all matters related to ongoing development of CVE.

 

To unsubscribe from the CVE-Announce e-newsletter, open a new email message and copy the following text to the BODY of the message "SIGNOFF CVE-Announce-List", then send the message to: listserv@lists.mitre.org. To subscribe, send an email message to listserv@lists.mitre.org with the following text in the BODY of the message: "SUBSCRIBE CVE-Announce-List".

 

Copyright 2017, The MITRE Corporation. CVE and the CVE logo are registered trademarks of The MITRE Corporation. CVE is sponsored by US-CERT (www.us-cert.gov) in the office of Cybersecurity and Communications (www.dhs.gov/office-cybersecurity-and-communications) at the U.S. Department of Homeland Security (www.dhs.gov).

 

For more information about CVE, visit the CVE website at https://cve.mitre.org or send an email to cve@mitre.org.

 

Friday, August 4, 2017

CVE Announce - August 4, 2017 (opt-in newsletter from the CVE website)

Welcome to the latest issue of the CVE-Announce e-newsletter. This email newsletter is designed to bring recent news about CVE, such as new website features, new CNAs, CVE in the news, etc. right to your email box. Common Vulnerabilities and Exposures (CVE) is the standard for cybersecurity vulnerability names. The CVE Board provides oversight and input into CVE's strategic direction, ensuring CVE meets the vulnerability identification needs of the technology community. CVE Numbering Authorities (CNAs) are major OS vendors, security researchers, and research organizations that assign CVE Identifiers (CVE IDs) to newly discovered issues without directly involving MITRE in the details of the specific vulnerabilities, and include the CVE IDs in the first public disclosure of the vulnerabilities. Details on subscribing (and unsubscribing) to the email newsletter are at the end. Please feel free to pass this newsletter on to interested colleagues.

 

Comments: cve@mitre.org

 

-------------------------------------------------------

CVE-Announce e-newsletter/August 4, 2017

-------------------------------------------------------

 

Contents:

 

1. Alibaba Added as CVE Numbering Authority (CNA)

2. CVE BLOG: "Become a CNA"

3. Slides from "CVE IDs and How to Get Them" Talk at DEF CON 25 Now Available

4. Minutes from CVE Board Teleconference Meetings on May 24 and July 26 Now Available

5. Follow us on LinkedIn and Twitter

6. Details/Credits + Subscribing and Unsubscribing

 

 

FEATURE STORY:

 

Alibaba Added as CVE Numbering Authority (CNA)

 

Alibaba, Inc. is now a CVE Numbering Authority (CNA) for projects listed on its Alibaba GitHub website (https://github.com/alibaba) only.

 

CNAs are OS and product vendors, developers, security researchers, and research organizations that assign CVE IDs to newly discovered issues without directly involving MITRE in the details of the specific vulnerabilities, and include the CVE IDs in the first public disclosure of the vulnerabilities.

 

CNAs are the main method for requesting a CVE ID. The following 69 organizations currently participate as CNAs: Adobe; Alibaba; Apache; Apple; BlackBerry; Brocade; CA; Canonical; CERT/CC; Check Point; Cisco; Dahua; Debian GNU/Linux; Dell EMC; Distributed Weakness Filing Project; Drupal.org; Duo; Eclipse Foundation; Elastic; F5; Flexera Software; Fortinet; FreeBSD; Google; HackerOne; HP; Hewlett Packard Enterprise; Huawei; IBM; ICS-CERT; Intel; IOActive; ISC; JPCERT/CC; Juniper; KrCERT/CC; Larry Cashdollar; Lenovo; MarkLogic; McAfee; Micro Focus; Microsoft; MITRE (primary CNA); Mozilla; Netflix; Netgear; Nvidia; Objective Development; OpenSSL; Oracle; Puppet; Qihoo 360; Qualcomm; Rapid 7; Red Hat; Schneider Electric; Siemens; Silicon Graphics; Symantec; Synology; Talos; Tenable: TIBCO; Trend Micro; VMware; Yandex; Zero Day Initiative, and ZTE.

 

For more information about requesting CVE ID numbers from CNAs, visit Request a CVE ID on the CVE website at https://cve.mitre.org/cve/request_id.html.

 

LINKS:

 

Alibaba -

http://www.alibaba.com/

 

CNAs -

https://cve.mitre.org/cve/cna.html

 

Request a CVE ID from a CNA -

https://cve.mitre.org/cve/request_id.html

 

Become a CNA -

https://cve.mitre.org/cve/cna.html#become_a_cna

 

CVE News page article -

https://cve.mitre.org/news/archives/2017/news.html#August022017_Alibaba_Added_as_CVE_Numbering_Authority_CNA

 

--------------------------------------------------------------

CVE BLOG: "Become a CNA"

 

CVE Numbering Authorities, or "CNAs," are how the CVE List is built. Every CVE ID added to the list is assigned by a CNA.

 

The majority of CNAs are currently software vendors that assign CVE IDs to issues in their own products, but many vulnerability researchers and third-party coordinators also participate by assigning CVE IDs to issues in third-party products per their specified scopes of coverage. In all cases, by issuing CVE IDs themselves without directly involving MITRE in the details of the specific vulnerabilities, CNAs are able to ensure CVE IDs are available for inclusion in the first-time public announcement of a new vulnerability, which greatly benefits the overall cyber security community as organizations share information about the vulnerabilities and remediate them.

Actively Expanding the Number of CNAs

 

As of today, there are 69 total CNAs participating in the CVE program: 57 software vendors, 7 third-party coordinators, 4 vulnerability researchers, and MITRE as the Primary CNA.

 

And the CVE program has been actively growing the list of participating CNAs, which now includes organizations from around the world with 14 countries represented as of August 2, 2017: Australia - 1; Austria - 1; Canada - 3; China - 6; France - 1; Germany - 1; Israel - 1; Japan - 3; Netherlands - 1; Russia - 1; South Korea - 1; Taiwan - 1; UK - 1; and USA - 47.

 

You too can become a CNA

 

Please consider joining us as a CNA. Participation is voluntary, and the benefits of participation include the ability to publicly disclose a vulnerability with an already assigned CVE ID, the ability to control the disclosure of vulnerability information without pre-publishing, and notification of vulnerabilities in products within a CNA's scope by researchers who request a CVE ID from them.

 

If your organization would like to become a CNA, please follow these three steps:

 

1. Review the "CVE Numbering Authorities (CNA) Rules" document in its entirety at: https://cve.mitre.org/cve/cna/CNA_Rules_v1.1.pdf

2. Closely review the Become a CNA section of this website, which is excerpted from the "CNA Rules" document above at https://cve.mitre.org/cve/cna.html#become_a_cna

3. Contact us via our CVE Request web form by selecting "Other" from the dropdown menu at: https://cveform.mitre.org/

 

We look forward to hearing from you!

 

- The CVE Team

 

LINKS:

 

CVE Numbering Authorities -

https://cve.mitre.org/cve/cna.html

 

CNA Coverage -

https://cve.mitre.org/cve/request_id.html

 

Become a CNA -

https://cve.mitre.org/cve/cna.html#become_a_cna

 

CVE Blog post -

https://cve.mitre.org/blog/index.html#August022017_Become_a_CNA

 

---------------------------------------------------------------

Slides from "CVE IDs and How to Get Them" Talk at DEF CON 25 Now Available

 

Briefing slides are now available from the CVE talk entitled "CVE IDs and How to Get Them" by CVE Numbering Authority Program Lead Dan Adinolfi and CVE Team Member Anthony Singleton on July 28, 2017 at the "Wall of Sheep" at DEF CON 25 in Las Vegas, Nevada, USA.

 

Talk synopsis from the conference website: "The Common Vulnerabilities and Exposures (CVE) program uniquely identifies and names publicly-disclosed vulnerabilities in software and other codebases. Whether you are a vulnerability researcher, a vendor, or a project maintainer, it has never been easier to have CVE IDs assigned to vulnerabilities you are disclosing or coordinating around. This presentation will be an opportunity to find out how to participate as well as a chance to offer your thoughts, questions, or feedback about CVE. Attendees will learn what is considered a vulnerability for CVE, how to assign CVE IDs to vulnerabilities, how to describe those vulnerabilities within CVE ID entries, how to submit those assignments, and where to get more information about CVE assignment."

 

Visit the CVE Calendar at https://cve.mitre.org/news/archives/2017/calendar.html for information on this and other events.

 

LINKS:

 

Slides-

https://cve.mitre.org/CVEIDsAndHowToGetThem.pdf

 

DEF CON 25 -

https://www.defcon.org/html/defcon-25/dc-25-index.html

 

CVE Calendar -

https://cve.mitre.org/news/archives/2017/calendar.html

 

CVE News page article -

https://cve.mitre.org/news/archives/2017/news.html#August022017_Slides_from_CVE_IDs_and_How_to_Get_Them_Talk_at_DEF_CON_25_Now_Available

 

---------------------------------------------------------------

Minutes from CVE Board Teleconference Meetings on May 24 and July 26 Now Available

 

The CVE Board held teleconference meetings on May 24, 2017 and July 26, 2017. Read the May 24 meeting minutes at https://cve.mitre.org/data/board/archives/2017-08/msg00002.html, or the July 26 meeting minutes at https://cve.mitre.org/data/board/archives/2017-08/msg00000.html.

 

The CVE Board includes numerous cybersecurity-related organizations including commercial security tool vendors, academia, research institutions, government departments and agencies, and other prominent security experts, as well as end-users of vulnerability information. Through open and collaborative discussions, the Board provides critical input regarding the data sources, product coverage, coverage goals, operating structure, and strategic direction of the CVE program. All Board Meetings and Board Email List Discussions are archived for the community.

 

LINKS:

 

CVE Board -

https://cve.mitre.org/community/board/index.html

 

Board Archives -

https://cve.mitre.org/community/board/archive.html#meeting_summaries

https://cve.mitre.org/community/board/archive.html#board_mail_list_archive

 

CVE News page articles -

https://cve.mitre.org/news/archives/2017/news.html#August022017_Minutes_from_CVE_Board_Teleconference_Meeting_on_May_24_Now_Available

https://cve.mitre.org/news/archives/2017/news.html#August022017_Minutes_from_CVE_Board_Teleconference_Meeting_on_July_26_Now_Available

 

---------------------------------------------------------------

Follow us on LinkedIn and Twitter

 

Please follow us on Twitter for the latest from CVE:

 

* Feed of the latest CVE IDs -

https://twitter.com/CVEnew/

 

* Feed of news and announcements about CVE -

https://twitter.com/CVEannounce/

 

Please also visit us on LinkedIn to more easily comment on our news articles and CVE Blog posts:

 

* CVE-CWE-CAPEC on LinkedIn -

https://www.linkedin.com/company/11033649

 

* CVE Blog -

https://cve.mitre.org/blog/

 

---------------------------------------------------------------

Details/Credits + Subscribing and Unsubscribing

 

Managing Editor: Dan Adinolfi, Cyber Security Technical Center. Writer: Bob Roberge. The MITRE Corporation (www.mitre.org) maintains CVE and provides impartial technical guidance to the CVE Board and CVE Numbering Authorities on all matters related to ongoing development of CVE.

 

To unsubscribe from the CVE-Announce e-newsletter, open a new email message and copy the following text to the BODY of the message "SIGNOFF CVE-Announce-List", then send the message to: listserv@lists.mitre.org. To subscribe, send an email message to listserv@lists.mitre.org with the following text in the BODY of the message: "SUBSCRIBE CVE-Announce-List".

 

Copyright 2017, The MITRE Corporation. CVE and the CVE logo are registered trademarks of The MITRE Corporation. CVE is sponsored by US-CERT (www.us-cert.gov) in the office of Cybersecurity and Communications (www.dhs.gov/office-cybersecurity-and-communications) at the U.S. Department of Homeland Security (www.dhs.gov).

 

For more information about CVE, visit the CVE website at https://cve.mitre.org or send an email to cve@mitre.org.

 

Thursday, July 27, 2017

CVE Announce - July 27, 2017 (opt-in newsletter from the CVE website)

Welcome to the latest issue of the CVE-Announce e-newsletter. This email newsletter is designed to bring recent news about CVE, such as new website features, new CNAs, CVE in the news, etc. right to your email box. Common Vulnerabilities and Exposures (CVE) is the standard for cybersecurity vulnerability names. The CVE Board provides oversight and input into CVE's strategic direction, ensuring CVE meets the vulnerability identification needs of the technology community. CVE Numbering Authorities (CNAs) are major OS vendors, security researchers, and research organizations that assign CVE Identifiers (CVE IDs) to newly discovered issues without directly involving MITRE in the details of the specific vulnerabilities, and include the CVE IDs in the first public disclosure of the vulnerabilities. Details on subscribing (and unsubscribing) to the email newsletter are at the end. Please feel free to pass this newsletter on to interested colleagues.

 

Comments: cve@mitre.org

 

-------------------------------------------------------

CVE-Announce e-newsletter/July 27, 2017

-------------------------------------------------------

 

Contents:

 

1. REMINDER: "REJECT" Is Not Always a Permanent State for a CVE ID Begins July 27, 2017

2. "CVE IDs and How to Get Them" Talk at DEF CON 25 on July 28

3. Follow us on LinkedIn and Twitter

4. Details/Credits + Subscribing and Unsubscribing

 

 

FEATURE STORY:

 

REMINDER: "REJECT" Is Not Always a Permanent State for a CVE ID Begins July 27, 2017

 

CVE IDs in the "REJECT" state can now be changed to another state at any time as appropriate.

 

Please see the initial announcement article "FOCUS ON: Marking a CVE ID "REJECT" Is Not Permanent; It Can Be Updated and Added to the CVE List" at https://cve.mitre.org/news/archives/2017/news.html#June272017_FOCUS_ON:_Marking_a_CVE_ID_as_REJECT_Is_Not_Permanent_It_Can_Be_Updated_and_Added_to_the_CVE_List from June 27, 2017 for details.

 

LINKS:

 

REJECT -

https://cve.mitre.org/about/faqs.html#reject_signify_in_cve_id

 

About CVE IDs -

https://cve.mitre.org/cve/identifiers/index.html

 

CVE News page article -

https://cve.mitre.org/news/archives/2017/news.html#July272017_REMINDER:_REJECT_Is_Not_Always_a_Permanent_State_for_a_CVE_ID_Begins_July_27_2017

 

---------------------------------------------------------------

"CVE IDs and How to Get Them" Talk at DEF CON 25 on July 28

 

CVE Numbering Authority Program Lead Dan Adinolfi, and CVE Team Member Anthony Singleton, will present a talk entitled "CVE IDs and How to Get Them" at 1:10 p.m. PT in the Neopolitan Ballroom and Milano VIII at Caesars Palace at the "Wall of Sheep" at DEF CON 25 in Las Vegas, Nevada, USA.

 

Talk synopsis from the conference website: "The Common Vulnerabilities and Exposures (CVE) program uniquely identifies and names publicly-disclosed vulnerabilities in software and other codebases. Whether you are a vulnerability researcher, a vendor, or a project maintainer, it has never been easier to have CVE IDs assigned to vulnerabilities you are disclosing or coordinating around. This presentation will be an opportunity to find out how to participate as well as a chance to offer your thoughts, questions, or feedback about CVE. Attendees will learn what is considered a vulnerability for CVE, how to assign CVE IDs to vulnerabilities, how to describe those vulnerabilities within CVE ID entries, how to submit those assignments, and where to get more information about CVE assignment."

 

Visit the CVE Calendar at https://cve.mitre.org/news/archives/2017/calendar.html for information on this and other events.

 

LINKS:

 

"CVE IDs and How to Get Them" talk -

https://www.wallofsheep.com/pages/dc25#dadinolfi

 

DEF CON 25 -

https://www.defcon.org/html/defcon-25/dc-25-index.html

 

---------------------------------------------------------------

Follow us on LinkedIn and Twitter

 

Please follow us on Twitter for the latest from CVE:

 

* Feed of the latest CVE IDs -

https://twitter.com/CVEnew/

 

* Feed of news and announcements about CVE -

https://twitter.com/CVEannounce/

 

Please also visit us on LinkedIn to more easily comment on our news articles and CVE Blog posts:

 

* CVE-CWE-CAPEC on LinkedIn -

https://www.linkedin.com/company/11033649

 

* CVE Blog -

https://cve.mitre.org/blog/

 

---------------------------------------------------------------

Details/Credits + Subscribing and Unsubscribing

 

Managing Editor: Dan Adinolfi, Cyber Security Technical Center. Writer: Bob Roberge. The MITRE Corporation (www.mitre.org) maintains CVE and provides impartial technical guidance to the CVE Board and CVE Numbering Authorities on all matters related to ongoing development of CVE.

 

To unsubscribe from the CVE-Announce e-newsletter, open a new email message and copy the following text to the BODY of the message "SIGNOFF CVE-Announce-List", then send the message to: listserv@lists.mitre.org. To subscribe, send an email message to listserv@lists.mitre.org with the following text in the BODY of the message: "SUBSCRIBE CVE-Announce-List".

 

Copyright 2017, The MITRE Corporation. CVE and the CVE logo are registered trademarks of The MITRE Corporation. CVE is sponsored by US-CERT (www.us-cert.gov) in the office of Cybersecurity and Communications (www.dhs.gov/office-cybersecurity-and-communications) at the U.S. Department of Homeland Security (www.dhs.gov).

 

For more information about CVE, visit the CVE website at https://cve.mitre.org or send an email to cve@mitre.org.