throbber
October 2002
`
`SECURITY PATCHES AND
`THE CVE VULNERABILITY
`NAMING SCHEME: TOOLS
`TO ADDRESS COMPUTER
`SYSTEM VULNERABILITIES
`Elizabeth B. Lennon, Editor, Information
`Technology Laboratory, National Institute of
`Standards and Technology
`Today more than ever, timely response
`to vulnerabilities is critical to maintain
`the operational availability, confiden-
`tiality, and integrity of information
`technology (IT) systems. To assist fed-
`eral agencies and industry respond to
`vulnerabilities in a timely manner,
`ITL recently released two new publi-
`cations dealing with vulnerabilities in
`computer systems: NIST Special Pub-
`lication (SP) 800-40, Procedures for
`Handling Security Patches, by Peter
`Mell and Miles C. Tracy, and NIST
`SP 800-51, Use of the Common Vulner-
`abilities and Exposures (CVE) Vulnera-
`bility Naming Scheme, by Peter Mell
`and Tim Grance. This ITL Bulletin
`summarizes these two documents on
`system vulnerabilities, available at
`http://csrc.nist.gov/publications/
`nistpubs/index.html.
`
`Security Patches
`Failure to keep operating system and
`application software up to date is a
`common mistake made by IT profes-
`sionals. Despite extensive testing, all
`operating systems and applications are
`released with bugs (errors in the soft-
`ware) that affect security, perfor-
`mance, and stability. As software
`programs expand, the potential num-
`ber of bugs grows. Many security-
`related bugs are generally discovered
`only after a large number of users start
`using the software, and hackers and
`independent testers start attempting
`to compromise it. Once a bug is dis-
`covered, the software manufacturer
`often releases a piece of software to
`correct the bug. This software is often
`called a patch, hotfix, or service pack.
`
`Patches are released for three reasons:
`■ To fix faults in an application or
`operating system. Many hacker
`attacks are based on exploiting faults
`in the computer code of applications
`and operating systems. Patches are
`also released to correct performance
`or functionality problems.
`■ To alter functionality or to address a
`new security threat. An example of
`this is new virus definitions for an
`antivirus application. There was
`nothing “wrong” with the code of
`the antivirus program, but it had to
`be updated to detect new viruses
`that did not exist when the applica-
`tion was first released.
`■ To change or modify the software
`configuration to make it less suscep-
`tible to attacks and more secure.
`Applying patches in a timely and con-
`sistent manner is critical to maintain-
`ing the operational availability,
`confidentiality, and integrity of IT sys-
`tems. However, failure to keep operat-
`ing system and application software
`patched is an all too common mistake
`made by IT professionals. New
`patches are released daily, and it is
`often difficult for even experienced
`system administrators to keep abreast
`of all the new patches.
`The CERT/Coordination Center
`(CC) (http://www.cert.org) estimates
`that 95 percent of all network intru-
`sions could be avoided by keeping sys-
`tems up to date with appropriate
`patches. In an increasingly intercon-
`nected world, it is critical that system
`administrators keep their systems
`patched to the most secure level. A
`common misperception among some
`system administrators is that a firewall
`reduces the need for timely patching.
`Unfortunately, this is incorrect
`because a firewall generally permits
`some level of traffic between most
`
`Continued on page 2
`
`ITL Bulletins are published by the
`Information Technology Laboratory
`(ITL) of the National Institute of
`Standards and Technology (NIST).
`Each bulletin presents an in-depth
`discussion of a single topic of significant
`interest to the information systems
`community. Bulletins are issued on
`an as-needed basis and are available
`from ITL Publications, National
`Institute of Standards and Technology,
`100 Bureau Drive, Stop 8901,
`Gaithersburg, MD 20899-8901,
`telephone (301) 975-2832. To be
`placed on a mailing list to receive
`future bulletins, send your name,
`organization, and business address to
`this office. You will be placed on this
`mailing list only.
`
`Bulletins issued since March 2001
`
`❐ An Introduction to IPsec (Internet Protocol
`Security), March 2001
`❐ Biometrics – Technologies For Highly
`Secure Personal Authentication, May 2001
`❐ Engineering Principles for Information
`Technology Security, June 2001
`❐ A Comparison of The Security
`Requirements for Cryptographic Modules
`In FIPS 140-1 and FIPS 140-2, July
`2001
`❐ Security Self-assessment Guide For
`Information Technology Systems,
`September 2001
`❐ Computer Forensics Guidance, November
`2001
`❐ Guidelines on Firewalls and Firewall
`Policy, January 2002
`❐ Risk Management Guidance for
`Information Technology Systems, February
`2002
`❐ Techniques for System and Data Recovery,
`April 2002
`❐ Contingency Planning Guide for
`Information Technology Systems, June
`2002
`❐ Overview: The Government Smart Card
`Interoperability Specification, July 2002
`❐ Cryptographic Standards and Guidelines:
`A Status Report, September 2002
`
`WIZ, Inc. EXHIBIT - 1023
`WIZ, Inc. v. Orca Security LTD.
`
`

`

`2
`
`internal and external hosts. As long as
`a communication channel is allowed
`between the internal network and the
`Internet or other external network,
`there is a risk of compromise; thus
`patching becomes critical.
`
`Identifying Vulnerabilities and
`Applicable Patches
`Vulnerabilities are weaknesses in soft-
`ware that can be exploited by a mali-
`cious entity to gain greater access and/
`or permission than it is authorized to
`have on a computer. Not all vulnera-
`bilities have related patches; thus, sys-
`tem administrators must not only be
`aware of vulnerabilities and patches,
`but also of the need to mitigate
`unpatched vulnerabilities through other
`methods (e.g., workarounds, firewalls,
`and router access control lists).
`To help address this growing problem,
`we recommend that organizations have
`an explicit and documented patching
`and vulnerability policy and a system-
`atic, accountable, and documented
`process for handling patches. NIST SP
`800-40, Procedures for Handling Secu-
`rity Patches, provides principles and
`methodologies for accomplishing this.
`One of several possible techniques is
`through the creation of a patch and
`vulnerability group (PVG). This group
`facilitates the identification and distri-
`bution of patches within the organiza-
`tion. Its duties include:
`
`ITL Bulletins Via E-Mail
`We now offer the option of delivering
`your ITL Bulletins in ASCII format
`directly to your e-mail address. To
`subscribe to this service, send an e-mail
`message from your business e-mail
`account to listproc@nist.gov with the
`message subscribe itl-bulletin, and your
`name, e.g., John Doe. For instructions
`on using listproc, send a message to
`listproc@nist.gov with the message
`HELP. To have the bulletin sent to an
`e-mail address other than the From
`address, contact the ITL editor at
`301-975-2832 or
`elizabeth.lennon@nist.gov.
`
`■ Creating a reasonably representa-
`tive organizational hardware and
`software inventory,
`Identifying newly discovered vul-
`nerabilities and security patches,
`■ Prioritizing patch application,
`■ Creating an organization-specific
`patch database,
`■ Testing patches for functionality
`and security (to the degree that
`resources allow),
`■ Distributing patch and vulnerability
`information to local administrators,
`■ Verifying patch installation through
`network and host vulnerability
`scanning,
`■ Training system administrators in
`the use of vulnerability databases,
`■ Deploying patches automatically
`(when applicable), and
`■ Configuring Automatic Update of
`Applications (when applicable).
`If organizations use the PVG
`approach, this does not diminish the
`responsibility of all systems adminis-
`trators to patch the systems under
`their control. Each systems adminis-
`trator should:
`■ Apply patches identified by the
`PVG,
`■ Test patches on the specific target
`systems, and
`Identify patches and vulnerabilities
`associated with software not moni-
`tored by the PVG.
`Besides creating a PVG, organizations
`should be aware that applying patches
`and mitigating vulnerabilities is sel-
`dom, especially in large organizations,
`a straightforward process. To help
`with this, NIST SP 800-40 covers
`areas such as obtaining patches, priori-
`tizing patches, testing patches, and
`applying patches. An overview of spe-
`cific government patch and vulnera-
`bility resources is included.
`Appendices present a glossary of
`terms, patching resources for a variety
`of platforms and applications, guid-
`ance on using the NIST ICAT Meta-
`base, commonly used vulnerability
`
`October 2002
`
`resources, and guidance on using
`other available tools and resources.
`
`Recommendations for Handling
`Security Patches
`Organizations should have an explicit
`and documented patching and vulner-
`ability policy as well as a systematic,
`accountable, and documented set of
`processes and procedures for handling
`patches. The patching and vulnerabil-
`ity policy should specify what tech-
`niques an organization will use to
`monitor for new patches and vulnera-
`bilities and which personnel will be
`responsible for such monitoring. An
`organization’s patching process should
`define a method for deciding which
`systems get patched and which
`patches get installed first. It should
`also include a methodology for testing
`and safely installing patches.
`When designing a process for han-
`dling patches, consider the principles
`that make up the PVG patching con-
`cept. Other patching variations may
`be acceptable, but the core concepts
`should be found within the chosen
`patching methodology. These ideas
`include using organizational invento-
`ries, vulnerability and patch monitor-
`ing, patch prioritization techniques,
`organizational patch databases, patch
`testing, patch distribution, patch
`application verification, patch training,
`automated patch deployment, and
`automatic updating of applications.
`The patch process can be automated
`or manual; however, organizations
`should expect to transition to more
`automated methods in the future. The
`movement towards automated patch
`methods will parallel organizational
`plans to centralize services and stan-
`dardize desktop configurations.
`While patching and vulnerability
`monitoring can often appear an over-
`whelming task, consistent mitigation
`of organizational vulnerabilities can be
`achieved through a tested, prioritized,
`and integrated patching and remedia-
`tion process. It is our hope that NIST
`SP 800-40 will aid those whose job is
`to undertake this important and
`difficult task.
`
`■
`■
`

`

`October 2002
`
`Common Vulnerabilities and
`Exposures (CVE) Vulnerability
`Naming Scheme
`
`Closely related to the handling of
`security patches is a means to identify
`and organize known IT system vulner-
`abilities. As described in NIST SP
`800-51, the Common Vulnerabilities
`and Exposures (CVE) vulnerability
`naming scheme is a dictionary of com-
`mon names for publicly known IT
`system vulnerabilities. It is an emerg-
`ing industry standard that has
`achieved wide acceptance by the secu-
`rity industry and a number of govern-
`ment organizations. Technical
`vulnerability experts from 31 industry,
`academia, and government organiza-
`tions vote on the common names.
`CVE provides the computer security
`community with:
`a comprehensive list of publicly
`known vulnerabilities,
`an analysis of the authenticity of
`newly published vulnerabilities, and
`a unique name to be used for each
`vulnerability.
`General CVE information is available
`at http://cve.mitre.org. The vulnera-
`bilities listed in CVE can be viewed
`using the NIST ICAT vulnerability
`index at http://icat.nist.gov.
`
`Who we are
`The Information Technology Laboratory
`(ITL) is a major research component of
`the National Institute of Standards and
`Technology (NIST) of the Technology
`Administration, U.S. Department of
`Commerce. We develop tests and
`measurement methods, reference data,
`proof-of-concept implementations, and
`technical analyses that help to advance the
`development and use of new information
`technology. We seek to overcome barriers
`to the efficient use of information
`technology, and to make systems more
`interoperable, easily usable, scalable, and
`secure than they are today. Our web site is
`http://www.itl.nist.gov/.
`
`Guidelines for Use of the CVE
`Vulnerability Naming Scheme
`
`1. Federal departments and agencies
`should give substantial consider-
`ation to the acquisition and use of
`security-related IT products and
`services that are compatible with the
`CVE vulnerability naming scheme.
`Most federal departments and agen-
`cies use commercial off-the-shelf
`(COTS) security products and ser-
`vices to track, detect, or counter
`known vulnerabilities. A problem
`with many of these products is that
`different products use different
`names for the same vulnerabilities.
`Without a consistent vulnerability
`terminology, it is difficult to com-
`pare the vulnerability coverage of
`such security products. Also, it may
`be complex to correlate alerts
`among databases and tools of differ-
`ent vendors or services.
`CVE-compatible products and ser-
`vices, however, use the same name
`for each vulnerability, thus address-
`ing many of these coverage and cor-
`relation concerns. Therefore, it is
`important to consider acquiring
`CVE-compatible security products
`and services. Agencies should be
`careful, however, to consider CVE
`compatibility only for products and
`services that inherently make use of
`vulnerability names. Such products
`and services include vulnerability
`scanners, vulnerability databases,
`vulnerability advisory services, vul-
`nerability patch services, most
`intrusion detection systems (IDSs),
`and some firewalls.
`Your organization’s use of CVE-
`compatible products can assist you by
`■ determining which product cov-
`ers the vulnerabilities most appli-
`cable to an agency’s network
`infrastructure; and
`increasing the assurance that the
`alerts produced by the product(s)
`you choose will be able to be cor-
`related with alerts from your
`other products and from your
`incident response center.
`
`3
`
`The requirements for CVE compat-
`ibility are described at http://cve.
`mitre.org/compatible/requirements.
`html. Currently identified compati-
`ble products and services are listed
`on the Compatible Products pages,
`http://cve.mitre.org/compatible.
`While CVE compatibility should be
`an important consideration in IT
`security product and service acquisi-
`tion, federal departments and agen-
`cies should foremost consider their
`overall requirements (functionality,
`cost, performance, architecture, etc.)
`when acquiring products and services.
`2. Federal departments and agencies
`should periodically monitor their
`systems for applicable vulnerabili-
`ties listed in the CVE vulnerability
`naming scheme.
`NIST recommends monitoring sys-
`tems for vulnerabilities included in
`the CVE list since it is a standard-
`ized, reviewed, and comprehensive
`vulnerability repository. CVE con-
`sists of both standardized and can-
`didate vulnerabilities, and systems
`should be monitored for both types.
`Agencies should identify the CVE
`entries that apply to the software
`used in their systems and correct
`those vulnerabilities. Greater
`emphasis should be placed upon
`systems that are accessible from the
`Internet (e.g., web and e-mail serv-
`ers), systems that house important
`or sensitive applications or data
`(e.g., databases), or network infra-
`structure components (e.g., routers,
`switches, and firewalls). Since it is
`infeasible for an organization to
`find and fix all vulnerabilities in
`every system simultaneously, orga-
`nizations should carefully prioritize
`their monitoring and patching
`efforts (see NIST SP 800-40, Proce-
`dures for Handling Security Patches,
`http://csrc.nist.gov) to correct the
`most severe vulnerabilities on the
`most high-risk systems.
`Automated software tools can scan
`hosts and networks for CVE vulner-
`abilities, and we recommend regular
`use of such products. However, such
`products may not check for every CVE
`
`■
`■
`■
`■
`

`

`4
`
`vulnerability entry. For additional
`thoroughness, systems administra-
`tors and security officers can period-
`ically compare the software
`products used on systems directly to
`the entries listed in the CVE reposi-
`tory. For complete CVE coverage,
`we recommend performing this
`comparison using the NIST ICAT
`Metabase (http://icat.nist.gov).
`ICAT is a publicly available CVE
`search engine that allows one to
`search for vulnerabilities by vendor
`names, products names, version
`numbers, and other parameters.
`When an applicable vulnerability is
`found, ICAT provides a variety of
`vulnerability attributes (e.g., attack
`range and damage potential) and
`links to vulnerability and patch
`information from a variety of public
`resources. In summary, NIST rec-
`ommends the use of automated
`scanning tools on a frequent basis
`combined with periodic manual
`vulnerability discovery using ICAT.
`3. Federal departments and agencies
`should use the CVE vulnerability
`naming scheme in their descrip-
`tions and communications of
`vulnerabilities.
`
`Agencies should use CVE in their
`internal reports of vulnerability
`scans, notifications to system own-
`ers of observed vulnerabilities, and
`alerts identifying the vulnerabilities
`targeted by active exploits. Use of
`CVE will help to minimize confu-
`sion regarding which vulnerability is
`being referenced and provides an
`excellent check on whether the ref-
`erenced vulnerability has been
`eliminated.
`Agencies should also use CVE in
`communicating information about
`vulnerabilities externally. For exam-
`ple, communications to FedCIRC
`or other incident response teams
`should reference, where known, the
`CVE vulnerability name that newly
`observed exploits are targeting.
`Also, communications with vendors
`will be more accurate if CVE num-
`bers are used. If a vendor-supplied
`patch that purports to fix a vulnera-
`bility is defective, a statement to the
`vendor that a given CVE vulnera-
`bility remains after applying the
`patch conveys important informa-
`tion clearly and succinctly. Also,
`communications with vendors of
`scanning tools regarding false posi-
`
`October 2002
`
`tives or false negatives will be clearer
`if the offending vulnerability is
`labeled by CVE number.
`In conclusion, ITL recommends the
`timely and consistent use of security
`patches and the CVE vulnerability
`naming scheme to mitigate the impact
`of vulnerabilities in computer systems.
`The NIST ICAT Vulnerability Meta-
`base is a free resource which to date
`contains more that 5,164 known vul-
`nerabilities. We invite you to explore
`this valuable tool at http://icat.nist.gov/.
`Finally, we acknowledge the leadership,
`vision, and initiative of the MITRE
`Corporation and the various contribu-
`tors in the public and private sectors in
`creating, maintaining, and operating
`the CVE repository.
`
`Disclaimer: Any mention of commercial products
`or reference to commercial organizations is for
`information only; it does not imply recommenda-
`tion or endorsement by NIST nor does it imply
`that the products mentioned are necessarily the best
`available for the purpose.
`
`PERMIT NUMBER G195
`NIST
`POSTAGE & FEES PAID
`PRSRT STD
`
`Address Service Requested
`
`Penalty for Private Use $300
`Official Business
`
`Gaithersburg, MD 20899-8900
`100 Bureau Drive, Stop 8900
`National Institute of Standards and Technology
`U.S. DEPARTMENT OF COMMERCE
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket