Re: [EXT] RE: Glossary

2022-07-13 Thread Alec J Summers
:59 PM To: Jason Oberg Cc: Fung, Jason , Alec J Summers , Hoole, Alexander , jw...@redhat.com , Seifried, Kurt , CWE CAPEC Board Subject: Re: [EXT] RE: Glossary I'm OK with not further tweaking the definition of 'vulnerability'; yet while providing updated definitions for 'weakness

Re: [EXT] RE: Glossary

2022-07-12 Thread SJ Jazz
te) >> are not liked by everyone.  >> >> >> >> *From:* Alec J Summers >> *Sent:* Monday, July 11, 2022 11:32 AM >> *To:* Fung, Jason M ; Hoole, Alexander < >> alexander.ho...@microfocus.com>; jw...@redhat.com; Seifried, Kurt < >> k...@s

Re: [EXT] RE: Glossary

2022-07-12 Thread Jason Oberg
gt; > *From:* Alec J Summers > *Sent:* Monday, July 11, 2022 11:32 AM > *To:* Fung, Jason M ; Hoole, Alexander < > alexander.ho...@microfocus.com>; jw...@redhat.com; Seifried, Kurt < > k...@seifried.org> > *Cc:* CWE CAPEC Board > *Subject:* Re: [EXT] RE: Glossary

RE: [EXT] RE: Glossary

2022-07-12 Thread Fung, Jason M
; Seifried, Kurt Cc: CWE CAPEC Board Subject: Re: [EXT] RE: Glossary Good afternoon! With the release of the Top25 and CWE v4.8, I wanted to pick this thread up from where we got it a month or so ago. As a refresher, the User Experience Working Group (UEWG) agreed on these definitions as updates

Re: [EXT] RE: Glossary

2022-07-11 Thread Jeremy West
and Integration > > ** > > *MITRE - Solving Problems for a Safer World™* > > > > > > > > *From: *Fung, Jason M > *Date: *Tuesday, May 31, 2022 at 1:33 PM > *To: *Hoole, Alexander , jw...@redhat.com > , Seifried, Kurt >

Re: [EXT] RE: Glossary

2022-07-11 Thread Alec J Summers
Subject: RE: [EXT] RE: Glossary Love the definitions! The only part to nitpick is this phrase “vulnerability is a property of …” I am not sure if vulnerability is commonly perceived as a “property”. E.g., the following sentence does not read as smoothly if vulnerability is replaced with property

RE: [EXT] RE: Glossary

2022-05-31 Thread Fung, Jason M
Subject: [EXT] RE: Glossary Good afternoon/evening Everyone, Please consider the following points: 1. I agree with Jason O. that the terms are a stepping stone to understanding how these concepts play out in the real world. However, a slightly different perspective is the following (without

Re: [EXT] Re: Glossary

2022-05-31 Thread Jeremy West
On Tue, May 24, 2022 at 4:32 PM Jason Oberg wrote: > Jeremy, welcome! > > I like the idea of defining a weakness wrt to a protection for an asset. > The protection could have weaknesses because of mistakes, forgetfulness, or > any other reason (e.g. environment). An asset-based definition fits

[EXT] RE: Glossary

2022-05-31 Thread Alexander Hoole
Just a quick correction… see below. Upon reflection, the example should not attribute an LDAP Entry Poisoning vuln (only JNDI Injection). An attack chain, which could include an LDAP Entry Poising vector (or more simply a maliciously controlled LDAP Server), could be part of a remote code

[EXT] RE: Glossary

2022-05-31 Thread Alexander Hoole
Good afternoon/evening Everyone, Please consider the following points: 1. I agree with Jason O. that the terms are a stepping stone to understanding how these concepts play out in the real world. However, a slightly different perspective is the following (without defining all of the base

[EXT] Re: Glossary

2022-05-24 Thread Jason Oberg
Jeremy, welcome! I like the idea of defining a weakness wrt to a protection for an asset. The protection could have weaknesses because of mistakes, forgetfulness, or any other reason (e.g. environment). An asset-based definition fits really well for hardware and I think for a lot of software, but

[EXT] Re: Glossary

2022-05-24 Thread Jason Oberg
Hi Alec and all, Happy to hear there is an initiative to help align these definitions. I know it's a very common confusion point for many. A couple of thoughts/comments from me: - In the weakness definition the word "mistake" throws me off a bit because that implies there was awareness of