OSCT Advisory Template

The exact content of an advisory will vary depending on the nature of the vulnerability but the following can be used as a template for construction. (This may be modified depending on the format of the GSVG advisory received.)

(Mail Subject of the form: [Advisory type] Description)

(Introduction)

(Summary including reference to reporting entity and timeline to discosure)

(GSVG reference and rating)

(Brief explanation of the risk)

(Status and timeline of availability of patches)

(Recommendation for action if any)

(Signature)



Dear Site Admins and Security Contacts,

The EGEE/LCG Grid Security Vulnerability Group (GSVG) and the Operational Security Coordination Team (OSCT)
 were made aware on <date> of a security vulnerability in <description of software and versions affected>. 
Details of this vulnerability were reported by <details of the reporter>.

The vulnerability has been assigned GSVG bug #<GSVG reference number> and rated  
<select from: LOW|MEDIUM|HIGH|EXTREMELY CRITICAL>

Further details of the GSVG rating system are available here: <supply GSVG link>

Exploiting the vulnerability allows <brief details NOT including method of exploit>.

A patch is expected to be available from <who> before <date and time>.

Sites running vulnerable version of this software are recommended to <do something or not>

Regards,
<who> on behalf of the Operational Security Coordination Team.


SUBJECT: [HEADS UP] Torque/OpenPBS local root privilege escalation vulnerability


Dear Site Admins and Security Contacts,

The Grid Security Vulnerability Group (GSVG) and the Operational Security Coordination Team (OSCT) 
have been made aware this morning of a security flaw affecting Torque/OpenPBS, which was initially 
published on BugTraq on Wed, 18 Oct 2006 23:45:

http://csirt.fe.up.pt/docs/TORQUE-audit.pdf

The vulnerability is being handled by GSVG (bug #20883). It has been confirmed and has been 
rated EXTREMELY CRITICAL. 

The vulnerability allows a local user of the batch system to obtain root privileges and a trivial exploit has 
been published.

A patch has been built and in currently being tested and certified. At present we expect a patch to be 
available today and an update will be published at latest 18:00 UTC.

Sites are responsible for making their own assessment of risk based on local policy and conditions but 
the OSCT currently recommends to temporarlily close batch queues to new jobs pending 
availability of more information.

Regards,
John Smith on behalf of the Operational Security Coordination Team.


-- Main.ineilson - 25 Oct 2006
Edit | Attach | Watch | Print version | History: r2 < r1 | Backlinks | Raw View | WYSIWYG | More topic actions
Topic revision: r2 - 2006-11-03 - IanRobertNeilson
 
    • Cern Search Icon Cern Search
    • TWiki Search Icon TWiki Search
    • Google Search Icon Google Search

    LCG All webs login

This site is powered by the TWiki collaboration platform Powered by PerlCopyright & 2008-2019 by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding TWiki? Send feedback