Hanks.wang-Focus on system defense and mobile security Research [email protected]
CVE's official definition of vnlnerability and exposure
Below is the CVE Initiative ' s definitions of the terms "Vulnerability"and"Exposure":
Vulnerability
An information security "vulnerability" was a mistake in software so can be directly used by a hacker to gain access to a System or network.
CVE considers a mistake a vulnerability if it allows an attacker to use it to violate a reasonable security policy for tha T system (this excludes entirely "open" security policies in which all users be trusted, or where there is no Considerati On the risk to the system).
For CVE, a vulnerability are a state with a computing system (or set of systems) that either:
- Allows an attacker to execute commands as another user
- Allows an attacker to access data which is contrary to the specified access restrictions for that data
- Allows an attacker to pose as another entity
- Allows an attacker to conduct a denial of service
Examples of vulnerabilities include:
- PHF (remote command execution as user" nobody ")
- rpc.ttdbserverd (remote command execution as root)
- world-writeable password file (modification of system-critical data)
- default password (remote command execution or other access)
- denial of Service Problems", "a attacker to cause a Blue screen of death
smurf (denial of service by flooding a network)
Review vulnerabilities on the Common Vulnerabilities and Exposures (CVE) List.
Back to Topexposure
An information security "exposure" was a system configuration issue or a mistake in software that allows access to Informat Ion or capabilities that can is used by a hacker as a stepping-stone into a system or network.
CVE considers a configuration issue or a mistake an exposure if it does isn't directly allow compromise but could is an impo Rtant component of a successful attack, and is a violation of a reasonable security policy.
an "exposure" describes a state in a Computing system (or set of systems) that's not a vulnerability, but either:
- Allows an attacker to conduct information gathering activities
- Allows an attacker to hide activities
- Includes a capability that behaves as expected and can be easily compromised
- is a primary point of entry a attacker could attempt to use to gain access to the system or data
- is considered a problem according to some reasonable security policy
Examples of exposures include:
- Running services such as finger (useful for information gathering, though it works as advertised)
- Inappropriate settings for Windows NT auditing policies (where "inappropriate" is enterprise-specific)
- Running services that is common attack points (e.g., HTTP, FTP, or SMTP)
- Use of applications or services, can is successfully attacked by brute force methods (e.g., use of trivially broken en Cryption, or a small key space)
Review exposures on the Common Configuration enumeration (CCE) List.
http://www.cve.mitre.org/about/terminology.html
Mobile Security-CVE official definitions for vnlnerability and exposure