Nice.  Lynis sounds like a modern Titan (
https://www.usenix.org/legacy/event/lisa98/full_papers/farmer/farmer.pdf)

On Thu, Aug 20, 2015 at 8:19 PM, Atom Powers <atom.pow...@gmail.com> wrote:

> You may be interested in Lynis and how Assimilation is extending the data.
> https://github.com/CISOfy/lynis
> http://itbestpractices.info/
>
>
>
> On Tue, Aug 18, 2015 at 1:04 PM David Lang <da...@lang.hm> wrote:
>
>> As I see it, you either trust your distro, or you pay one of the
>> vulnerability
>> scanner companies to track such things (and deal with the errors that
>> happen
>> anyway)
>>
>> And then you keep an ear out for critical things that haven't made it to
>> the
>> updates yet anyway.
>>
>> David Lang
>>
>> On Tue, 18 Aug 2015, Paul DiSciascio wrote:
>>
>> > Date: Tue, 18 Aug 2015 07:38:57 -0400
>> > From: Paul DiSciascio <the...@bytemonkey.net>
>> > To: tech@lists.lopsa.org
>> > Subject: Re: [lopsa-tech] getting a list of critical vulnerabilities
>> from the
>> >     NVD at NIST
>> >
>> > On a related note, I'd be curious to know how you plan to map what's in
>> > this database to package versions on the systems you're auditing.  I
>> > tried to tackle this years ago and determined that there would be too
>> > much manual effort to keep that sort of mapping up to date.
>> >
>> > For example, some vulnerability in package-2.3.1 that gets fixed in
>> > package-2.3.2 upstream might be patched in package-2.3.1-a as provided
>> > by RedHat, and NIST's data will indicate that 2.3.1 is vulnerable.
>> >
>> > Does anyone know if there is another data source available to help with
>> > this correlation?
>> >
>> > Thanks,
>> > Paul
>> >
>> >
>> > On 8/17/15 11:29 PM, Aleksey Tsalolikhin wrote:
>> >> Thanks for your kind replies.  Once I got home and put the kidlet to
>> bed
>> >> and my life became nice and quiet and calm, I actually had no trouble
>> >> getting 2cvs to work:
>> >>
>> >>     2csv entry vuln:cve-id vuln:cvss/cvss:base_metrics/cvss:score
>> >> vuln:summary  < nvdcve-2.0-2015.flat  > nvdcve-2.0-2015.csv
>> >>
>> >> Thanks for the pointers to cvskit though and the PowerShell script!  =)
>> >>
>> >> On Mon, Aug 17, 2015 at 7:47 PM, Rickard, Josh A. <
>> ricka...@missouri.edu
>> >> <mailto:ricka...@missouri.edu>> wrote:
>> >>
>> >>     If you’re interested in using PowerShell you could do the
>> following:____
>> >>
>> >>     __ __
>> >>
>> >>     $vulninfo= Invoke-WebRequest -Uri
>> >>     "http://static.nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-recent.xml
>> "____
>> >>
>> >>     __ __
>> >>
>> >>     $entry= $vulninfo.nvd.entry____
>> >>
>> >>     __ __
>> >>
>> >>     $temphostobject= @()____
>> >>
>> >>     $vulnhostobject= @()____
>> >>
>> >>     __ __
>> >>
>> >>     #loop through each entry node____
>> >>
>> >>     ForEach($cvesin $entry){____
>> >>
>> >>     __ __
>> >>
>> >>         IF($cves.cvss.'base_metrics'.score -gt 7){____
>> >>
>> >>             $objectproperties = @{cve=$($cves.'cve-id');____
>> >>
>> >>
>> >>     cvss=$($cves.cvss.'base_metrics'.score);____
>> >>
>> >>                                   summary=$($cves.summary)____
>> >>
>> >>                                 }____
>> >>
>> >>     __ __
>> >>
>> >>             $temphostobject = New-Object PSObject -Property
>> >>     $objectproperties____
>> >>
>> >>             $vulnhostobject += $temphostobject____
>> >>
>> >>         }____
>> >>
>> >>     }____
>> >>
>> >>     __ __
>> >>
>> >>     $vulnhostobject| ft ____
>> >>
>> >>     __ __
>> >>
>> >>     __ __
>> >>
>> >>     I could add some features and make it an advanced function, but
>> this
>> >>     should give you an object that you can return and add to another
>> >>     function or do other fun stuff with.____
>> >>
>> >>     __ __
>> >>
>> >>     Let me know if you need any other help.____
>> >>
>> >>     __ __
>> >>
>> >>     Thanks,____
>> >>
>> >>     __ __
>> >>
>> >>     *Josh Rickard*____
>> >>
>> >>     Security Analyst____
>> >>
>> >>     Information Security and Access Management____
>> >>
>> >>     Division of Information Technology____
>> >>
>> >>     University of Missouri____
>> >>
>> >>     (573) 884-6280 <tel:%28573%29%20884-6280> |ricka...@missouri.edu
>> >>     <mailto:ricka...@missouri.edu>____
>> >>
>> >>     ACA | GCWN | GCFA____
>> >>
>> >>     __ __
>> >>
>> >>     *From:*tech-boun...@lists.lopsa.org
>> >>     <mailto:tech-boun...@lists.lopsa.org>
>> >>     [mailto:tech-boun...@lists.lopsa.org
>> >>     <mailto:tech-boun...@lists.lopsa.org>] *On Behalf Of *Aleksey
>> >>     Tsalolikhin
>> >>     *Sent:* Monday, August 17, 2015 8:57 PM
>> >>     *To:* t...@lopsa.org <mailto:t...@lopsa.org>
>> >>     *Subject:* [lopsa-tech] getting a list of critical vulnerabilities
>> >>     from the NVD at NIST____
>> >>
>> >>     __ __
>> >>
>> >>     Hello,____
>> >>
>> >>     __ __
>> >>
>> >>     I want to get a list of Critical (CVSS > 7) CVE's for a security
>> >>     vulnerability assessment for a client.
>> >>     ____
>> >>
>> >>     __ __
>> >>
>> >>     Scored CVEs are available from https://nvd.nist.gov/download.cfm
>> >>     through a set of XML feeds.  The nice NIST web site says:____
>> >>
>> >>     __ __
>> >>
>> >>     A common way to use the feeds is to perform a one-time import of
>> all
>> >>     of the main XML vulnerability feeds and then use the "modified"
>> >>     feeds to keep up-to-date.____
>> >>
>> >>     __ __
>> >>
>> >>     I thought I'd start out by figuring out how to convert the 2015 XML
>> >>     to CSV.  I got halfway there:____
>> >>
>> >>     __ __
>> >>
>> >>     $ xml2 < nvdcve-2.0-2015.xml > nvdcve-2.0-2015.flat____
>> >>
>> >>     $ 2csv < nvdcve-2.0-2015.flat > nvdcve-2.0-2015.csv____
>> >>
>> >>     usage: 2csv record field [field ...] < in > csv____
>> >>
>> >>     $____
>> >>
>> >>     __ __
>> >>
>> >>     There is no documentation for 2csv that I could find...  I'm now
>> >>     banging my head against it, trial and error...____
>> >>
>> >>     __ __
>> >>
>> >>     I might end up just grepping the data I need out of the flat file.
>> >>     All I'm looking for is CVE ID, Summary and CVSS score.  Has anybody
>> >>     been down this path already?____
>> >>
>> >>     __ __
>> >>
>> >>     -- ____
>> >>
>> >>     Need CFEngine training?  Email train...@verticalsysadmin.com
>> >>     <mailto:train...@verticalsysadmin.com>____
>> >>
>> >>
>> >>
>> >>
>> >> --
>> >> Need CFEngine training?  Email train...@verticalsysadmin.com
>> >> <mailto:train...@verticalsysadmin.com>
>> >>
>> >>
>> >> _______________________________________________
>> >> Tech mailing list
>> >> Tech@lists.lopsa.org
>> >> https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
>> >> This list provided by the League of Professional System Administrators
>> >>  http://lopsa.org/
>> >>
>> > _______________________________________________
>> > Tech mailing list
>> > Tech@lists.lopsa.org
>> > https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
>> > This list provided by the League of Professional System Administrators
>> > http://lopsa.org/
>> >_______________________________________________
>> Tech mailing list
>> Tech@lists.lopsa.org
>> https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
>> This list provided by the League of Professional System Administrators
>>  http://lopsa.org/
>>
> --
> Perfection is just a word I use occasionally with mustard.
> --Atom Powers--
>
> _______________________________________________
> Tech mailing list
> Tech@lists.lopsa.org
> https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
> This list provided by the League of Professional System Administrators
>  http://lopsa.org/
>
>


-- 
Need CFEngine training?  Email train...@verticalsysadmin.com
_______________________________________________
Tech mailing list
Tech@lists.lopsa.org
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to