Replies: 4 comments
-
(The second link was added by GitHub, in case anyone wonders.) |
Beta Was this translation helpful? Give feedback.
-
|
There are two conditions for a library bug to be triggered. (1) The target application should use the API in a vulnerable manner and (2) the attacker should find a way to trigger it (e.g., through a network packet). My impression is that NIST mainly focuses on the second part when assigning a CVSS score which sometimes results in an exaggerated score that does not align with the actual security impact. The bug in Please note that this is just my interpretation. I don't know what exact strategy is used to assign a CVSS score. |
Beta Was this translation helpful? Give feedback.
-
|
(In case https://internals.rust-lang.org/t/16699/15 was partly referring to my remarks here, I'd like to clarify that I didn't mean to complain about the surfacing of CVSS information for libraries in general; rather, I meant to question whether RUSTSEC-2020-0036 (as opposed to RUSTSEC-2019-0036) should link itself to CVE-2020-25575, which — to my inexpert eyes — seems to correspond to RUSTSEC-2019-0036 instead.) |
Beta Was this translation helpful? Give feedback.
-
|
Converting this to discussion as there isn't much actionable concrete stuff right now and requires wider discussion round CVSS. Thanks |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
RUSTSEC-2020-0036 (archived version), which advises that
failureis deprecated, is marked asinformational. The RustSec website's page for this advisory lists its CVSS score is 9.8, which, the website says, means this is a "CRITICAL" problem, in all-caps, with a red background. The website then goes into more detail, saying that the deprecatedness offailureenables a low-complexity attack, executable over the network, with high impact to confidentiality, integrity, and availability.The original addition of this advisory (#368) does not show such alarm. This level of alarm appears to have been added by the addition of CVSS information for this and many other advisories in #1085.
It appears that this CVSS information was added in an automated manner because the advisory is linked to CVE-2020-25575. CVE-2020-25575 says it's about "Access of Resource Using Incompatible Type ('Type Confusion')" and references an unsoundness in
failurereported by Qwaz (rust-lang-deprecated/failure#336), although it also mentions "compatibility hazards", which appears to be a reference to woboats's retrospective aboutfailure, which, as far as I see, is hardly referring to any security problem infailure. (Is the CVE advisory confused?)CVE-2020-25575 is also linked by RUSTSEC-2019-0036, which is about rust-lang-deprecated/failure#336.
Am I right in thinking that the CVE link and associated CVSS information belong with RUSTSEC-2019-0036 and not RUSTSEC-2020-0036?
Beta Was this translation helpful? Give feedback.
All reactions