Gray Hat Hacking 80
Gray Hat Hacking 80
52
Reference
The CERT/CC Vulnerability Disclosure Policy
www.cert.org/kb/vul_disclosure.html
• The issue begins when the originator (the reporter of the problem) e-mails the
maintainer (the software vendor) with details about the problem. The moment
the e-mail is sent is considered the date of contact. The originator is responsible
for locating the maintainer’s appropriate contact information, which can
usually be obtained through the maintainer’s website. If this information is
not available, e-mails should be sent to one or all of the addresses shown next.
These common e-mail formats should be implemented by vendors:
security-alert@[maintainer]
secure@[maintainer]
security@[maintainer]
support@[maintainer]
info@[maintainer]
• The maintainer will be allowed five days from the date of contact to reply to
the originator. The date of contact is from the perspective of the originator of
the issue, meaning if the person reporting the problem sends an e-mail from
New York at 10:00 A.M. to a software vendor in Los Angeles, the time of contact
is 10:00 A.M. Eastern time. The maintainer must respond within five days,
which would be 7:00 A.M. Pacific time. An auto-response to the originator’s
e-mail is not considered sufficient contact. If the maintainer does not establish
contact within the allotted timeframe, the originator is free to disclose the
information. Once contact has been made, decisions on delaying disclosures
should be discussed between the two parties. The RFP policy warns the vendor
that contact should be made sooner rather than later. It reminds the software
maker that the finder of the problem is under no obligation to cooperate, but
is simply being asked to do so for the best interests of all parties.
• The originator should make every effort to assist the vendor in reproducing
the problem and adhering to reasonable requests. It is also expected that the