One Article Review

Accueil - L'article:
Source SANS.webp SANS Institute
Identifiant 366507
Date de publication 2017-05-18 06:55:07 (vue: 2017-05-18 06:55:07)
Titre My Little CVE Bot, (Thu, May 18th)
Texte The massive spread of the WannaCry ransomware last Friday was another good proof that many organisations still fail to patch their systems. Everybody admits that patching is a boring task. They are many constraints that make this process very difficult to implement and... apply!Thats why any help is welcome to know what to patch and when. This is the key: What to patch? What are the applications/appliancesthat are deployed in your infrastructure? When to patch? When are new vulnerabilities discovered? The classification of vulnerabilities is based on the CVE (or Common Vulnerabilities and Exposures) standard maintained by mitre.org[1]. To explain briefly, when a security researcher or a security firm finds a new vulnerability, a CVE number is assigned to it (CVE-YYYY-NNNNN). The CVE contains all the details of the vulnerability (which application/system is affected, the severity and many more information). As an example, the vulnerability exploited by WannaCry was %%cve:2017-0143%%. Those CVE are stored in open databases and many organisations are using them and provide online services like cvedetails.com[2]. There are plenty of them that offer almost all the same features but they don width:700px" /> Based on cve-search, I can provide details about new CVEs to my customers or any other organisationsjust by querying the database. Indeed, reading the daily flow of CVE is difficult and useless for many people. They have to focus on what affect them. To help them, Im using a quick padding:5px 10px"> email_contact | days_to_check | output_format | product_definition [ | product_definition ] ... The script will parse this config file and search for new CVE for each product definition. Results will be sent via email to the specified address. As I width:700px" /> Of course, the main requirement is to know what you are using on your infrastructure. The information used in the config file describes the products is based on the CPE standard[6] which categorisesapplications, operating systems and hardware devices. This information can be found byNmap. An alternative is touse the following tool on your own network (only!): cve-scan[7]. It scans hosts and searches for vulnerabilities in thecve-search database. My script is available on my GitHubrepository[5]. [1]https://cve.mitre.org [2]http://www.cvedetails.com/ [3]https://github.com/cve-search/cve-search [4]https://hub.docker.com/r/rootshell/cvesearch/ [5]https://github.com/xme/toolbox [6]http://cpe.mitre.org/ [7]https://github.com/NorthernSec/cve-scan Xavier Mertens (@xme) ISC Handler - Freelance Security Consultant PGP Key (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
Notes
Envoyé Oui
Condensat 0143 10px 18th @xme about address admits affect affected all almost alternative another any application/system applications/appliancesthat apply are assigned attribution available based boring bot briefly but bynmap can categorisesapplications center check classification com com/ com/cve com/northernsec/cve com/r/rootshell/cvesearch/ com/xme/toolbox common commons config constraints consultant contact contains course cpe creative customers cve cve:2017 cvedetails cves daily database databases days definition deployed describes details devices difficult discovered docker don each edu email everybody example explain exploited exposures fail features file finds firm flow focus following format found freelance friday githubrepository good handler hardware have help hosts http://cpe http://www https://cve https://github https://hub https://isc implement indeed information infrastructure internet isc key key: know last license like little main maintained make many massive may mertens mitre more network new nnnnn noncommercial number offer online only open operating org org/ organisations organisationsjust other output own padding:5px parse patch patching people pgp plenty process product products proof provide querying quick ransomware reading requirement researcher results same sans scan scans script search search/cve searches security sent services severity specified spread standard states stored storm systems task thats thecve them those thu tool touse united used useless using very vulnerabilities vulnerability wannacry welcome what when which why width:700px will xavier your yyyy
Tags
Stories Wannacry
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: