:59 PM
To: Jason Oberg
Cc: Fung, Jason , Alec J Summers ,
Hoole, Alexander , jw...@redhat.com
, Seifried, Kurt , CWE CAPEC Board
Subject: Re: [EXT] RE: Glossary
I'm OK with not further tweaking the definition of 'vulnerability'; yet while
providing updated definitions for 'weakness
te)
>> are not liked by everyone.
>>
>>
>>
>> *From:* Alec J Summers
>> *Sent:* Monday, July 11, 2022 11:32 AM
>> *To:* Fung, Jason M ; Hoole, Alexander <
>> alexander.ho...@microfocus.com>; jw...@redhat.com; Seifried, Kurt <
>> k...@s
gt;
> *From:* Alec J Summers
> *Sent:* Monday, July 11, 2022 11:32 AM
> *To:* Fung, Jason M ; Hoole, Alexander <
> alexander.ho...@microfocus.com>; jw...@redhat.com; Seifried, Kurt <
> k...@seifried.org>
> *Cc:* CWE CAPEC Board
> *Subject:* Re: [EXT] RE: Glossary
; Seifried, Kurt
Cc: CWE CAPEC Board
Subject: Re: [EXT] RE: Glossary
Good afternoon!
With the release of the Top25 and CWE v4.8, I wanted to pick this thread up
from where we got it a month or so ago. As a refresher, the User Experience
Working Group (UEWG) agreed on these definitions as updates
and Integration
>
> **
>
> *MITRE - Solving Problems for a Safer World™*
>
>
>
>
>
>
>
> *From: *Fung, Jason M
> *Date: *Tuesday, May 31, 2022 at 1:33 PM
> *To: *Hoole, Alexander , jw...@redhat.com
> , Seifried, Kurt
>
Subject: RE: [EXT] RE: Glossary
Love the definitions!
The only part to nitpick is this phrase “vulnerability is a property of …” I
am not sure if vulnerability is commonly perceived as a “property”. E.g., the
following sentence does not read as smoothly if vulnerability is replaced with
property
Subject: [EXT] RE: Glossary
Good afternoon/evening Everyone,
Please consider the following points:
1. I agree with Jason O. that the terms are a stepping stone to
understanding how these concepts play out in the real world. However, a
slightly different perspective is the following (without
attacks* targeting CVE-2021-44228
> have been observed (e.g., VMWare
> <https://www.bleepingcomputer.com/news/security/lazarus-hackers-target-vmware-servers-with-log4shell-exploits/>,
> …).
>
>
>
> Thoughts?
>
>
>
> Best,
>
> -A
>
>
>
> *From
On Tue, May 24, 2022 at 4:32 PM Jason Oberg wrote:
> Jeremy, welcome!
>
> I like the idea of defining a weakness wrt to a protection for an asset.
> The protection could have weaknesses because of mistakes, forgetfulness, or
> any other reason (e.g. environment). An asset-based definition fits
execution exploit.
-A
From: Alexander Hoole
Sent: Friday, May 27, 2022 6:39 PM
To: Jeremy West ; Kurt Seifried
Cc: Alec J Summers ; CWE CAPEC Board
Subject: RE: Glossary
Good afternoon/evening Everyone,
Please consider the following points:
1. I agree with Jason O. that the terms are a stepping
d (e.g.,
VMWare<https://www.bleepingcomputer.com/news/security/lazarus-hackers-target-vmware-servers-with-log4shell-exploits/>,
…).
Thoughts?
Best,
-A
From: Jeremy West
Sent: Tuesday, May 24, 2022 2:03 PM
To: Kurt Seifried
Cc: Alec J Summers ; CWE CAPEC Board
Subject: Re: Glossary
Correct Kurt. Process is defined here as an executing process on the stack.
On Tue, May 24, 2022 at 5:01 PM Kurt Seifried wrote:
> "process" means executing process, or like a business process, e.g.
> password reset policy?
>
> On Tue, May 24, 2022 at 2:15 PM Jeremy West wrote:
>
>> Red Hat
"process" means executing process, or like a business process, e.g.
password reset policy?
On Tue, May 24, 2022 at 2:15 PM Jeremy West wrote:
> Red Hat adopted the following definition of a weakness a year or so ago. "A
> weakness is specifically the absence of a safeguard in an asset or
Jeremy, welcome!
I like the idea of defining a weakness wrt to a protection for an asset.
The protection could have weaknesses because of mistakes, forgetfulness, or
any other reason (e.g. environment). An asset-based definition fits really
well for hardware and I think for a lot of software, but
Hi Alec and all,
Happy to hear there is an initiative to help align these definitions. I
know it's a very common confusion point for many.
A couple of thoughts/comments from me:
- In the weakness definition the word "mistake" throws me off a bit
because that implies there was awareness of
Red Hat adopted the following definition of a weakness a year or so ago. "A
weakness is specifically the absence of a safeguard in an asset or process
that provides a higher potential or frequency of a threat occurring, but
does not meet the exploitability criteria for a vulnerability." We've
Dear CWE/CAPEC Board Members,
Good afternoon! I hope the week is going well for you all.
During a recent CWE/CAPEC User Experience Working Group session, the topic of
definitions came up – more specifically, the difficulty in agreeing on good
ones and making sure they are understood by
17 matches
Mail list logo