Mobile Security-CVE official definitions for vnlnerability and exposure

Source: Internet
Author: User

Hanks.wang-Focus on system defense and mobile security Research [email protected]


CVE's official definition of vnlnerability and exposure


Below is the CVE Initiative ' s definitions of the terms "Vulnerability"and"Exposure":

Vulnerability

An information security "vulnerability" was a mistake in software so can be directly used by a hacker to gain access to a System or network.

CVE considers a mistake a vulnerability if it allows an attacker to use it to violate a reasonable security policy for tha T system (this excludes entirely "open" security policies in which all users be trusted, or where there is no Considerati On the risk to the system).

For CVE, a vulnerability are a state with a computing system (or set of systems) that either:

    • Allows an attacker to execute commands as another user
    • Allows an attacker to access data which is contrary to the specified access restrictions for that data
    • Allows an attacker to pose as another entity
    • Allows an attacker to conduct a denial of service

Examples of vulnerabilities include:

    • PHF (remote command execution as user" nobody ")
    • rpc.ttdbserverd (remote command execution as root)
    • world-writeable password file (modification of system-critical data)
    • default password (remote command execution or other access)
    • denial of Service Problems", "a attacker to cause a Blue screen of death
    • smurf (denial of service by flooding a network)

Review vulnerabilities on the Common Vulnerabilities and Exposures (CVE) List.

Back to Topexposure

An information security "exposure" was a system configuration issue or a mistake in software that allows access to Informat Ion or capabilities that can is used by a hacker as a stepping-stone into a system or network.

CVE considers a configuration issue or a mistake an exposure if it does isn't directly allow compromise but could is an impo Rtant component of a successful attack, and is a violation of a reasonable security policy.

an "exposure" describes a state in a Computing system (or set of systems) that's not a vulnerability, but either:

    • Allows an attacker to conduct information gathering activities
    • Allows an attacker to hide activities
    • Includes a capability that behaves as expected and can be easily compromised
    • is a primary point of entry a attacker could attempt to use to gain access to the system or data
    • is considered a problem according to some reasonable security policy

Examples of exposures include:

    • Running services such as finger (useful for information gathering, though it works as advertised)
    • Inappropriate settings for Windows NT auditing policies (where "inappropriate" is enterprise-specific)
    • Running services that is common attack points (e.g., HTTP, FTP, or SMTP)
    • Use of applications or services, can is successfully attacked by brute force methods (e.g., use of trivially broken en Cryption, or a small key space)

Review exposures on the Common Configuration enumeration (CCE) List.


http://www.cve.mitre.org/about/terminology.html


Mobile Security-CVE official definitions for vnlnerability and exposure

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.