Security Severity Ratings: Difference between revisions

From MozillaWiki
Jump to navigation Jump to search
Line 137: Line 137:
! style="width:10%"| Description
! style="width:10%"| Description
|-
|-
| csec-buffer-overrun
|csec-bounds || client security issues due to incorrect boundary conditions (read or write)
| The identified flaw is a buffer overrun
|-
|csec-disclosure || Disclosure of sensitive user data, personal information, etc in a client product.
|-
|csec-dos || Used to tag client Denial of Service bugs. For web server denial of service bugs please use wsec-dos as these tend to be more severe. Search 28
|-
|csec-intoverflow || client security issues due to integer overflow
|-
|csec-oom || A client crash or hang that occurs in Out Of Memory conditions Search 2
|-
|csec-other || client security issues that don't fit into other categories
|-
|csec-priv-escalation || client privilege escalation security issues
|-
|csec-sop || violations of the client Same Origin Policy (Universal-XSS bugs, for example).
|-
|csec-uaf || client security issues due to a use-after-free Search 1
|-
|csec-ui-redress || client security issues due to UI Redress attacks, either site-on-site ("clickjacking" and friends) or manipulation of the browser UI to fool users into taking the wrong action.
|-
|csec-uninitialized || client security issues due to use of uninitialized memory
|-
|csec-wildptr || client security issues due to pointer misuse not otherwise covered (see csec-uaf, csec-uninitialized, csec-intoverflow, csec-bounds)
|-
|-
|}
|}
Line 151: Line 172:
! style="width:10%"| Description
! style="width:10%"| Description
|-
|-
| wsec-xss
|wsec-authentication || Website or server authentication security issues (lockouts, password policy, etc)
| The identified flaw is cross site scripting flaw
|-
|wsec-authorization || web/server authorization security issues
|-
|wsec-cookie || Cookie related errors (HTTPOnly / Secure Flag, incorrect domain / path)
|-
|wsec-crossdomain || Issue such as x-frame-options, crossdomain.xml, cross site sharing settings
|-
|wsec-crypto || Crypto related items such as password hashing
|-
|wsec-csrf || Cross-Site Request Forgery (CSRF) bugs in server products
|-
|wsec-disclosure || Disclosure of sensitive data, personal information, etc from a web service
|-
|wsec-dos || Used to denote web server Denial of Service bugs. For similar bugs in client software please use csec-dos instead.
|-
|wsec-errorhandling || Any error handling issue
|-
|wsec-impersonation || Impersonation / Spoofing attacks (UI Redress, etc)
|-
|wsec-injection || Injection attacks other than SQLi or XSS
|-
|wsec-input || Failure to perform input validation. Most often you will probably use the xss tag instead
|-
|wsec-logging || Logging issues such as requests for CEF log points.
|-
|wsec-other || web/server security issues that don't fit into other categories
|-
|wsec-session || Issues related to sesson management (Session fixation, etc)
|-
|wsec-sqli || SQL Injection
|-
|wsec-xss || Cross-Site Scripting (XSS) bugs in server products
|-
|-
|}
|}

Revision as of 21:31, 21 August 2012

Severity Ratings

Severity Ratings & Examples

The following items are keywords for the severity of an issue.

sec-critical
Exploitable vulnerabilities which can lead to the widespread compromise of many users.
sec-high
Obtain confidential data from other sites the user is visiting or the local machine, or inject data or code into those sites, requiring no more than normal browsing actions. Indefinite DoS of the user's system, requiring OS reinstallation or extensive cleanup. Exploitable web vulnerabilities that can lead to the targeted compromise of a small number of users.
sec-moderate
Vulnerabilities which can provide an attacker additional information or positioning that could be used in combination with other vulnerabilities. Disclosure of sensitive information that represents a violation of privacy but by itself does not expose the user or organization to immediate risk. The vulnerability combined with another moderate vulnerability could result in an attack of high or critical severity (aka stepping stone). Indefinite application Denial of Service (DoS) via corruption of state, requiring application re-installation or temporary DoS of the user's system, requiring reboot. The lack of standard defense in depth techniques and security controls.
sec-low
Minor security vulnerabilities such as leaks or spoofs of non-sensitive information. Missing best practice security controls
sec-other
Bugs that may not be exploitable security issues but are kept confidential to protect sensitive information. Bugs that contain sensitive information about the bug submitter or another user Bugs that are related to security issues currently unfixed in Mozilla products or other products
Mitigating Circumstances

If there are mitigating circumstances that severely reduce the effectiveness of the exploit, then the exploit could be reduced by one level of severity. Examples of mitigating circumstances include difficulty in reproducing due to very specific timing or load order requirements, complex or unusual set of actions the user would have to take beyond normal browsing behaviors, or unusual software configuration.

As a rough guide, to be considered for reduction in severity an exploit should execute successfully less than 10% of the time. If measures can be taken to improve the reliability of the exploit to over 10% (by combining it with other existing bugs or techniques), then it should not be considered to be mitigated.

Additional Status Codes or Whiteboard Tracking Tags

If a potential security issue has not yet been assigned a severity rating, or a rating is not appropriate, the whiteboard may instead contain one of the following security status codes.

archive