![]() |
|
AusCERT Bulletin Formats |
|
Date: 11 June 2009 Original URL: http://www.auscert.org.au/render.html?cid=1976&it=11045 AusCERT sends out two forms of bulletin - AusCERT Security Bulletins (or 'ASB's) and External Security Bulletins (or 'ESB's). Previously, there were four types of bulletin - External Security Bulletins (ESB), AusCERT Advisories (AA), AusCERT Alerts (AL) and AusCERT Updates (AU). The new two-type system allows a simpler differentiation between bulletin types - ASB's are written in-house, referencing information available that may not have a current coherent source, while ESB's are bulletins written by other vendors that we have summarised and re-released. Both ASBs and ESBs contain 'header information' that quickly summarise the contents and allow readers to determine important information at a glance. Document Titles and Subject LinesBulletin titles (which is also used as the subject line of mailouts) are formatted to indicate basic information in as short a format as possible. The titles include the AusCERT bulletin ID (for instance ASB-2009.0001 or ESB-2009.0123), revision number if applicable (eg. ESB-2009.0123.2) and an 'ALERT' flag if the contents of the bulletin are time critical or reference an actively exploited vulnerability. Titles also include a list of 'environment' tags that list operating systems or hardware types the vulnerability affects. Unless the vulnerability is very specific this will usually only contain operating system families such as Windows ([Win]) and Linux ([Linux]). The rest of the title is either the product or publisher along with the most severe impact of the vulnerability. In the case of a bulletin regarding multiple vulnerabilities this will be replaced with 'Multiple Vulnerabilities'. For instance, previously what might have been sent out with a subject line of: (AUSCERT AL-2009.0000) [Win] Critical vulnerabilities in ImportantProgram may result in data loss would now have a subject line like: ESB-2009.0000 - ALERT [Win] ImportantProgram: Delete arbitrary files - Remote/unauthenticated or ESB-2009.0000 - ALERT [Win] ImportantProgram: Multiple vulnerabilities Bulletin HeaderSince more information is now included in the bulletin title the header will only include the bulletin ID, date and a short descriptive sentence. In the case of ESBs, this is often the subject of the original bulletin. Bulletin SummaryThe bulletin summary is an index of the important information in the bulletin. Both ESBs and ASBs contain a summary, although some fields may only be found in one type. A description of each field is below. ProductThe product field gives the names and version numbers of products affected by the bulletin. The product may be an operating system, in which case no Operating System field will be given. Both ESBs and ASBs will have a Product field. PublisherOnly present in an ESB, the Publisher field gives the name of the original source of the bulletin. Often this is an operating system vendor (like Microsoft or Red Hat), but it may be another security team or research group. Operating SystemThis field gives a list of operating systems or operating system families that are affected by the vulnerability. The operating systems themselves are not affected by the vulnerability, but the program that is affected will run on those operating systems. PlatformA rarely used field, platform will specify particular architectures (eg i386, SPARC) that are affected by this vulnerability in a similar fashion to the Operating System field. In order to be brief, the Platform field will only be used if the architectures affected is a subset of the architectures that the operating systems affected run on. Impact and AccessPreviously separate as two fields, the Impact and Access matrix list the impacts of the vulnerabilities along with the associated access required to exploit them. Impact ValuesThere are several predefined values for the Impact. The values and their meanings are below.
Access ValuesThere are several possible values for the access required to exploit a vulnerability. Generally the less access required the worse the vulnerability.
ResolutionThe Resolution field gives a quick indication on how to protect against the vulnerability. The possible values are:
CVEThis field lists any CVE identifiers that relate to this vulnerability. CVE's are an excellent way of tracking vulnerabilities that affect multiple products. ReferenceThis fields lists other AusCERT bulletin ID's that are related to this vulnerability. These ID's should also appear as links at the top of the page so that related bulletins can be navigated to easily. Bulletin URLOnly available in ESB's, this field lists URLs of the original bulletin source. Often the original bulletin will have further links and information that might be of use. Bulletin VersioningIf new information becomes available regarding a bulletin we have already released we will update information on our website and may resend the bulletin if the information is important. Previously only the most recent version of the bulletin was available on our website, however now previous versions will be available as attachments to the current version. Updates will have a version number appended to the bulletin ID. For instance, the second version of ESB-2009.0000 is ESB-2009.0000.2. After an update is done the original version will be renamed to ESB-2009.0000.1. If a new version is considered to contain important information, the bulletin will be resent with an extra tag of 'UPDATE' in the subject line. For bulletins that were already tagged with 'ALERT', this will become 'UPDATED ALERT'. ExampleAn example bulletin under the new system is below.
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2009.0001
A critical vulnerability in ImportantProgram may allow code execution
16 April 2009
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: ImportantProduct
Publisher: ExamplePublisher
Operating System: Windows
Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated
Denial of Service -- Remote/Unauthenticated
Patches Available: Yes
CVE Names: CVE-2009-0000
Original Bulletin:
http://www.example.com/example?id
--------------------------BEGIN INCLUDED TEXT--------------------
This is an example bulletin.
Normally the details of the vulnerability and how to fix it would be here.
--------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your
organisation's
site policies and procedures. AusCERT takes no responsibility for
consequences
which may arise from following or acting on information or advice contained
in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
http://www.auscert.org.au/render.html?cid=1980
If you believe that your computer system has been compromised or attacked in
any way, we encourage you to let us know by completing the secure National
IT
Incident Reporting Form at:
http://www.auscert.org.au/render.html?it=3192
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
|