Security Severity Ratings: Difference between revisions
No edit summary |
|||
Line 9: | Line 9: | ||
;'''sec-critical''': Exploitable vulnerabilities which can lead to the widespread compromise of many users. | ;'''sec-critical''': Exploitable vulnerabilities which can lead to the widespread compromise of many users. | ||
{| class="wikitable collapsible | {| class="wikitable collapsible " style="width: 100%" | ||
! ''sec-critical Examples:'' | ! ''sec-critical Examples:'' | ||
|- | |- | ||
Line 30: | Line 30: | ||
;'''sec-high''': Obtain confidential data from other sites the user is visiting or the local machine, or inject data or code into those sites, requiring no more than normal browsing actions. Indefinite DoS of the user's system, requiring OS reinstallation or extensive cleanup. Exploitable web vulnerabilities that can lead to the targeted compromise of a small number of users. | ;'''sec-high''': Obtain confidential data from other sites the user is visiting or the local machine, or inject data or code into those sites, requiring no more than normal browsing actions. Indefinite DoS of the user's system, requiring OS reinstallation or extensive cleanup. Exploitable web vulnerabilities that can lead to the targeted compromise of a small number of users. | ||
{| class="wikitable collapsible | {| class="wikitable collapsible " style="width: 100%" | ||
! ''sec-high Examples:'' | ! ''sec-high Examples:'' | ||
|- | |- | ||
Line 43: | Line 43: | ||
;'''sec-moderate''': Vulnerabilities which can provide an attacker additional information or positioning that could be used in combination with other vulnerabilities. Disclosure of sensitive information that represents a violation of privacy but by itself does not expose the user or organization to immediate risk. The vulnerability combined with another moderate vulnerability could result in an attack of high or critical severity (aka stepping stone). Indefinite application Denial of Service (DoS) via corruption of state, requiring application re-installation or temporary DoS of the user's system, requiring reboot. The lack of standard defense in depth techniques and security controls. | ;'''sec-moderate''': Vulnerabilities which can provide an attacker additional information or positioning that could be used in combination with other vulnerabilities. Disclosure of sensitive information that represents a violation of privacy but by itself does not expose the user or organization to immediate risk. The vulnerability combined with another moderate vulnerability could result in an attack of high or critical severity (aka stepping stone). Indefinite application Denial of Service (DoS) via corruption of state, requiring application re-installation or temporary DoS of the user's system, requiring reboot. The lack of standard defense in depth techniques and security controls. | ||
{| class="wikitable collapsible | {| class="wikitable collapsible " style="width: 100%" | ||
! ''sec-moderate Examples:'' | ! ''sec-moderate Examples:'' | ||
|- | |- | ||
Line 59: | Line 59: | ||
;'''sec-low''': Minor security vulnerabilities such as leaks or spoofs of non-sensitive information. Missing best practice security controls | ;'''sec-low''': Minor security vulnerabilities such as leaks or spoofs of non-sensitive information. Missing best practice security controls | ||
{| class="wikitable collapsible | {| class="wikitable collapsible " style="width: 100%" | ||
! ''sec-low Examples:'' | ! ''sec-low Examples:'' | ||
|- | |- | ||
Line 71: | Line 71: | ||
;'''sec-other''': Bugs that may not be exploitable security issues but are kept confidential to protect sensitive information. Bugs that contain sensitive information about the bug submitter or another user Bugs that are related to security issues currently unfixed in Mozilla products or other products | ;'''sec-other''': Bugs that may not be exploitable security issues but are kept confidential to protect sensitive information. Bugs that contain sensitive information about the bug submitter or another user Bugs that are related to security issues currently unfixed in Mozilla products or other products | ||
{| class="wikitable collapsible | {| class="wikitable collapsible " style="width: 100%" | ||
! ''sec-other Examples:'' | ! ''sec-other Examples:'' | ||
|- | |- | ||
Line 87: | Line 87: | ||
=== Shared Keywords === | === Shared Keywords === | ||
{| style="width: 800px;" class="wikitable collapsible | {| style="width: 800px;" class="wikitable collapsible fullwidth-table" | ||
! Shared Keywords | ! Shared Keywords | ||
|- | |- | ||
Line 127: | Line 127: | ||
=== Group Keywords === | === Group Keywords === | ||
{| style="width: 800px;" class="wikitable collapsible | {| style="width: 800px;" class="wikitable collapsible fullwidth-table" | ||
! Group Keywords | ! Group Keywords | ||
|- | |- | ||
Line 137: | Line 137: | ||
| Client Security (ie. Firefox, Thunderbird, etc) | | Client Security (ie. Firefox, Thunderbird, etc) | ||
| | | | ||
{|class="wikitable collapsible | {|class="wikitable collapsible fullwidth-table" | ||
! csec- | ! csec- | ||
|- | |- | ||
Line 172: | Line 172: | ||
| Web Security (Web Sites, Web Services, etc) | | Web Security (Web Sites, Web Services, etc) | ||
| | | | ||
{|class="wikitable collapsible | {|class="wikitable collapsible fullwidth-table" | ||
! wsec- | ! wsec- | ||
|- | |- | ||
Line 217: | Line 217: | ||
| Operations Security (Mozilla owned & operated severs and services) | | Operations Security (Mozilla owned & operated severs and services) | ||
| | | | ||
{|class="wikitable collapsible | {|class="wikitable collapsible fullwidth-table" | ||
! opsec- | ! opsec- | ||
|- | |- | ||
Line 229: | Line 229: | ||
|} | |} | ||
=== Whiteboard Tags === | === Whiteboard Tags === | ||
{| style="width: 800px;" class="wikitable collapsible | {| style="width: 800px;" class="wikitable collapsible fullwidth-table" | ||
! Whiteboard Tags | ! Whiteboard Tags | ||
|- | |- | ||
Line 294: | Line 294: | ||
|} | |} | ||
=== Feature Page Codes === | === Feature Page Codes === | ||
{| style="width: 800px;" class="wikitable collapsible | {| style="width: 800px;" class="wikitable collapsible fullwidth-table" | ||
! Feature Page Codes | ! Feature Page Codes | ||
|- | |- | ||
Line 343: | Line 343: | ||
|} | |} | ||
=== Flags === | === Flags === | ||
{| style="width: 800px;" class="wikitable collapsible | {| style="width: 800px;" class="wikitable collapsible fullwidth-table" | ||
! Flags | ! Flags | ||
|- | |- | ||
Line 383: | Line 383: | ||
|} | |} | ||
=== Priority Matrix=== | === Priority Matrix=== | ||
{| class="wikitable collapsible | {| class="wikitable collapsible " style="width: 100%" | ||
! Priority Matrix (primarily OpSec) | ! Priority Matrix (primarily OpSec) | ||
|- | |- |
Revision as of 17:19, 4 June 2013
Severity Ratings
Severity Ratings & Examples | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|
The following items are keywords for the severity of an issue.
If there are mitigating circumstances that severely reduce the effectiveness of the exploit, then the exploit could be reduced by one level of severity. Examples of mitigating circumstances include difficulty in reproducing due to very specific timing or load order requirements, complex or unusual set of actions the user would have to take beyond normal browsing behaviors, or unusual software configuration. As a rough guide, to be considered for reduction in severity an exploit should execute successfully less than 10% of the time. If measures can be taken to improve the reliability of the exploit to over 10% (by combining it with other existing bugs or techniques), then it should not be considered to be mitigated. |
Additional Status Codes, Whiteboard Tracking Tags & Flags
If a potential security issue has not yet been assigned a severity rating, or a rating is not appropriate, the whiteboard may instead contain one of the following security status codes.
Shared Keywords | ||
---|---|---|
Code | Description | Examples |
sec-audit | Bug requires a code audit to investigate potential security problems. DO NOT USE for an actual vulnerability; if a bug has or might have a sec-low/sec-moderate/sec-high/sec-critical rating then it is not a sec-audit bug. Such a vulnerability might spawn a separate sec-audit bug as a task item to scan for the same pattern elsewhere in the code. | Look for pattern x in library y
Audit file z for string buffer abuse. |
sec-vector | Flaws not in Mozilla controlled software, but can cause security problems for Mozilla users. | Bugs in plugins
Bugs in system libraries used by Firefox |
sec-want | New features or improvement ideas related to security | User interface refinements
Support for new types of authentication Code refactoring / cleanup |
sec-incident | Issues resulting in an incident response or 'chemspill' actions by the security team. | Sever compromise
Code issues that would cause client code to be respun. |
A security review is needed for the bug, this could mean a variety of things. If there is no secr:<username> in the whiteboard the item has not been triaged and action is unknown. Once triaged a note will be placed in the bug as to the action to be taken | ||
The security review / actions desired have been completed. This will result in either a link to the notes from security actions or a note from the assigned resource in the bug. |
Group Keywords
Group Keywords | |||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Code | Description | Examples | |||||||||||||||||||||||||||||||||||||
csec- | Client Security (ie. Firefox, Thunderbird, etc) |
| |||||||||||||||||||||||||||||||||||||
wsec- | Web Security (Web Sites, Web Services, etc) |
| |||||||||||||||||||||||||||||||||||||
opsec- | Operations Security (Mozilla owned & operated severs and services) |
|
Whiteboard Tags
Whiteboard Tags | ||
---|---|---|
Code | Description | Examples |
This designates the assigned security resource that is accountable for actions to be taken on the designated item. When possible the bug will be assigned to the security contact for action. This will be used when that is not possible or practical. | sec-review?:curtisk@blah.bah indicates that curtisk is the accountable party for action | |
[Q2] | This designates a bug as being identified as a request to be done or targeted for a given operational quarter. If no year is given it is for the current year. | [Q2] indicates second quarter of the current calendar year, [Q1-2013] would be used to indicate a target for an upcoming quarter that has not occurred. |
[k90] | This designates a bug as being part of the Kilimanjaro effort so that it can be tracked, triaged and given appropriate priority and attention. | |
[basecamp] | This designates a bug as being part of the basecamp sub effort of the Kilimanjaro effort. | |
[fennec] | This designates a bug as being a critical bug for the efforts around our mobile browser project. This could be combined with either the [k9o] or [basecamp] tags as a bug could be part of both. | |
[triage needed] | Used to mark a bug for weekly triage meeting. | |
Indicates a secreview or tasks related to said review are yet to be completed. | ||
[start mm/dd/yyyy][target mm/dd/yyyy] | This indicates that expected dates to start and complete work on a given review or security bug. | [start 01/29/2013][target 02/09/2013] indicates work will start on 29-Jan and expected target for completion on 09-Feb |
Indicates the given secreivew or related tasks have been completed | ||
mentorship | Indicates that a given bug is part of our security mentorship program. The assignee of said bug is the Mozilla mentor for such a bug. | |
[score:##] | This indicates the relative severity score for risk rating bugs per the calculator at https://people.mozilla.com/~ckoenig/ | [score:30:moderate] shows that the issue has a numerical score of 30 and a severity of moderate. |
[FX] | Indicates an item related to Firefox | |
[FXOS] | Indicates an item related to Firefox OS | |
[Web] | Indicates an item related to our Web properties |
Feature Page Codes
Feature Page Codes | ||
---|---|---|
Code | Description | Examples |
sec-review-needed | A security review is needed for the feature, this could mean a variety of things. If there is no <username> in the notes then a full review needs to be scheduled, if a <username> is present than that person will follow-up with the feature team on whatever task is needed. | |
sec-review-complete | The security review / actions desired have been completed. This will result in a link to the notes from security actions or a note from the assigned resource. | |
sec-review-active | There are active tasks associated with the review that are yet to be completed in order for the review to be seen as completed. These will be captured in the "Action Items" section of the review notes. | |
sec-review-sched | Security review tasks have been scheduled, if this is a full security review the date of the scheduled review will be present in the security notes. | |
sec-review-unnecessary | After triage it was felt the feature needed no review or security actions. | |
Security health: <blank> | There are no notes or status is unknown. | Color: <None> |
Security health: OK | The tasks are on schedule or completed and are considered non-blocking. | Color: Green |
Security health: Blocked | Some aspect of the security review has given cause to block the feature from further work or landing. The reasons will be listed in the security notes or linked to a larger review outcome for follow-up. | Color: Yellow |
Security health: At Risk | Some aspect of the security review may cause the feature to be blocked or put the feature at risk of being off schedule.The reasons will be listed in the security notes or linked to a larger review outcome for follow-up. | Color: Red |
Security health: Assigned | Security tasks have been assigned to a member of the team to followup. The name of this resource will be in the security notes. | Color: Teal |
Flags
Flags | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|
Flag | Description | Settings | ||||||||
sec-review | Security review - Requesting action from the security assurance team or showing the results of said action |
| ||||||||
sec-bounty | Shows the status of a bug with regards to a bounty payout per our bounty guidlines |
|
Priority Matrix
Priority Matrix (primarily OpSec) |
---|
by this issue and it should be resolved immediatly. Examples:
Examples:
Examples:
|