Security glossary

Updated -

Abstract Syntax Notation One (ASN.1)

Abstract Syntax Notation One is a standard and notation that describes rules and structures for representing, encoding, transmitting, and decoding data.

Adjacent attacker

An attacker who can reach the vulnerable component from across short-range networks such as Bluetooth.

Affected

A security flaw in the source code or product; does not directly translate into something exploitable.

Application linked with a <library_name>

Application leveraging functionalities or features exported by the library <library_name>.

Arbitrary code execution (ACE)

The ability for a local attacker to execute arbitrary code on the system by exploiting a vulnerability. Exploiting such a vulnerability may allow the attacker to perform any action on the system, with the privileges of the exploited component.

Arbitrary memory read

Arbitrary memory read means the attacker has the unrestricted ability to read memory of their choosing in a given context. It can lead to information disclosure.

Arbitrary memory write

Arbitrary memory write means the attacker has the unrestricted ability to write to memory of their choosing in a given context. It can lead to a denial of service or (in some cases) arbitrary code execution.

Authenticated attacker

An attacker who has to perform an authentication step (log in) to perform intended actions.

Brute force

Brute force is an attack or technique using a trial-and-error method to access accounts, usually in rapid repetition. For example, an attacker can systematically check all possible passwords and passphrases using a repetitive or iterative mechanism until the correct one is found.

Buffer overflow

The software copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer. It can lead to a denial of service or (in some cases) arbitrary code execution.

Source: https://cwe.mitre.org/data/definitions/120.html

Capabilities

Linux kernel uses capabilities to compartmentalize the one all-mighty UNIX root privilege into a set of non-overlapping sub privileges (called capabilities) that can be individually assigned where higher granularity than root/non-root is suitable.

Refer following for capabilities list - https://man7.org/linux/man-pages/man7/capabilities.7.html

Clickjacking

Clickjacking is a web security vulnerability that occurs when a victim user is tricked into clicking on UI objects that appear to belong to a foreground decoy web page, while they actually belong to a hidden background web page.

Source:
https://cwe.mitre.org/data/definitions/1021.html

Code Scanning

A tool for identifying potential security issues within an application.

Common Vulnerabilities and Exposures (CVE)

A list of publicly disclosed computer security flaws. When someone refers to a CVE, they mean a security flaw assigned a CVE ID number.

Common Vulnerability Scoring System (CVSS)

An industry standard for assessing the severity of security vulnerabilities.

Common Weakness Enumeration (CWE)

A community-developed list of common weaknesses seen in software and hardware that can lead to significant security risks during development. They are part of the vulnerability assessment review.

Content Security Policy (CSP)

CSP is a client side protection that aims to detect and mitigate injection attacks like XSS. CSP helps browsers put together policies to prevent unauthorized code execution and unnecessary access to the resources of web applications.

Cookies

Also known as web cookie, browser cookie, http cookie. Basically a cookie is a small piece of data that a server sends to the user's web browser. The browser may store it and send it back with later requests to the same server. Typically, it is used to tell if two requests came from the same browser — keeping a user logged-in.

Cross-Origin Resource Sharing (CORS)

Cross-origin resource sharing (CORS) is a web security mechanism that can be used to lessen the restrictions enforced by the Same Origin Policy (SOP). The CORS mechanism allows web servers to specify via HTTP headers which origins are granted access to the resources they serve.

Cross-site request forgery (CSRF)

Cross-site request forgery (CSRF) is a web security vulnerability that occurs when the web application can’t verify whether a request from a user was intentionally sent by the user who submitted the request. An attacker can trick a victim user into making an unintentional request to the web server which will be treated as an authentic request. This allows the malicious attacker to perform unauthorized activities without the user’s knowledge.

Source:
https://cwe.mitre.org/data/definitions/352.html

Cross-site scripting (XSS)

Cross-site scripting (XSS) is a web security vulnerability that occurs when the web application dynamically generates a web page that contains untrusted user data. This data can contain malicious content (typically JavaScript or HTML) which is executed in the context of a victim user's browser when the victim visits the generated web page. XSS allows an attacker to circumvent the same origin policy inducing the victim user to execute arbitrary JavaScript code. The most common attack performed with XSS involves the disclosure of information stored in user cookies.

Source:
https://cwe.mitre.org/data/definitions/79.html

CVE Numbering Authority (CNA)

An organization responsible for the regular assignment of CVE IDs to vulnerabilities and for creating and publishing information about the Vulnerability in the associated CVE Record.

Cybersecurity and Infrastructure Security Agency (CISA)

An agency of the United States Department of Homeland Security responsible for strengthening cybersecurity and infrastructure protection.

Default configuration

The configuration as shipped. This can also be options used when no configuration is provided.

Denial of service

A system resource (e.g., website, application, server) is made partially or fully unavailable. The attacker can not obtain secrets or alter data, but can prevent other users from accessing the service/system.

Exploitable Vulnerabilities in the Wild

When an exploit is observed to be actively used to compromise systems.

Exploitation

A code or sequence of commands that takes advantage of a vulnerability to cause unintended behavior in a digital system. In software, this is a weakness or absence of a safeguard, resulting in an unplanned adverse outcome.

Exploit Prediction Scoring System (EPSS)

A community-driven effort to combine descriptive information about vulnerabilities (CVEs) with evidence of actual exploitation in the wild.

Finder

Commonly known as the reporter. These are upstream parties, researchers, and individuals who report a vulnerability to Red Hat. All finder data is aggregated and triaged by Product Security. Finders may also wish to keep vulnerability information embargoed with Red Hat and other vendors until a fix is available. In these circumstances, Red Hat coordinates the embargo and disclosure dates with the finder. Finders are recognized on our public CVE pages for valid flaws that are done in coordination with Red Hat.

Hardening

The process of securing a server or computer system by minimizing its attack surface, or surface of vulnerability, and potential attack vectors.

Heap-based buffer overflow

A type of buffer overflow where the buffer being overwritten is allocated on the heap. The heap is a memory region which is explicitly allocated by the programmer at runtime using a routine such as malloc(). A heap-based buffer overflow can lead to a denial of service or (in some cases) arbitrary code execution.

Source: https://cwe.mitre.org/data/definitions/122.html

HTTP request smuggling

When malformed or abnormal HTTP requests are interpreted by one or more entities in the data flow between the user and the web server, such as a proxy or firewall, they can be interpreted inconsistently, allowing the attacker to "smuggle" a request to one device without the other device being aware of it. Typically, this vulnerability can allow the attacker to bypass security controls or gain unauthorized access to sensitive data.

Source:
https://cwe.mitre.org/data/definitions/444.html

Impact

The severity of damage that could be incurred. This might be financial, physical, reputational, or other.

Incident Response Plan(IRP)

This plan alerts key internal stakeholders and assists in directing the required resources to be allocated for the correction, testing, and distribution of the fixes to our subscribers to resolve the vulnerability.

Information disclosure

The vulnerable component exposes sensitive information to an actor that is not explicitly authorized to have access to that information.

Integer overflow or wraparound

The software performs an arithmetic operation and the result of such operation exceeds the maximum size of the integer type used to store it. An integer overflow can introduce other weaknesses (e.g., stack-based or heap-based buffer overflow) when the result of the calculation is used later on in the program.

Source: https://cwe.mitre.org/data/definitions/190.html

Local attacker

An attacker with the ability to execute code on the local system in any privilege level. The typical example is a local shell account. Users who can upload code that will be executed on the server, or who can gain Arbitrary Code Execution by exploiting another vulnerability, also may have this level of access.

Local attacker with access to console

An attacker with the ability to execute code on the local system in any privilege level and access to the physical system console.

Major Incident Orchestration

When a major incident is identified, Red Hat orchestrates efforts to provide a corporate response for addressing the issue and prioritizes remediating the vulnerability as quickly as possible.

Malicious server

An attacker-controlled server which can take advantage of victim clients.

Man-in-the-middle attacker

An attacker with the ability to secretly relay and possibly alter the communications between two parties who believe that they are directly communicating with each other. Such an attacker usually needs full control of a network device or firewall between the two parties.

Source:
https://en.wikipedia.org/wiki/Man-in-the-middle_attack

Memory leak

The software does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory. It can lead to a denial of service.

Source:
https://cwe.mitre.org/data/definitions/401.html

Namespaces

Various kinds of namespaces (e.g. user namespace, network namespace) allow user processes to have an isolated view of global (shared) system resources.

Refer following for different namespace types available on Linux - https://man7.org/linux/man-pages/man7/namespaces.7.html

National Institute of Standards and Technology (NIST)

Promotes U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life.

Not affected

The security issue does not exist in the source code and the product.

Notification and Assessment Coordination

Investigate security concerns, conduct a formal assessment of vulnerabilities, and provide guidance for the best possible solution.

NULL pointer dereference

The software dereferences (i.e., uses) a pointer that it expects to be valid, but is NULL. It typically leads to a denial of service (application crash).

Source: https://cwe.mitre.org/data/definitions/476.html

OAuth (Open Authorization)

An open standard authorization protocol that can allow users to access services and resources of web applications without sharing user credentials.

Out-of-bounds read

The software reads data past the end, or before the beginning, of the intended buffer. It can lead to information disclosure.

Source: https://cwe.mitre.org/data/definitions/125.html

Out-of-bounds write

The software writes data past the end, or before the beginning, of the intended buffer. It can lead to a denial of service or (in some cases) arbitrary code execution.

Source: https://cwe.mitre.org/data/definitions/787.html

Out of Scope

The affected product is affected but not eligible for a fix due to its life cycle stage.

Path traversal or Directory traversal

The vulnerable application uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory (e.g., /var/www) but the application does not properly neutralize special elements (such as ".." and "/" separators) within the pathname. This can cause the pathname to resolve to an unintended location that is outside of the restricted directory. An attacker may be able to traverse the file system and read or write the contents of arbitrary files, leading to a denial of service or (in some cases) arbitrary code execution.

Source:
https://cwe.mitre.org/data/definitions/22.html

Pentesting

Addresses application readiness for release to discover issues that cannot be fully addressed by testing tools in either static or dynamic testing environments.

Physical attacker

Attacker needs to have physical access (or physical access equivalent such as guest user able to add virtual hardware to the guest on the host level) to the system to either plug in a physical device or otherwise tamper with the system within close proximity.

Privilege escalation

The process of exploiting a bug, design flaw or configuration oversight in software to gain additional access to system resources that are otherwise unavailable.

Privileged guest user

A user inside the guest with additional permissions or properties above those granted on normal user creation. Usually a guest root user or an unprivileged guest user with sudo permissions.

Race condition

Race condition occurs when multiple processes/threads read and write to some shared data and they try to change it at the same time, possibly leading to memory or data corruption.

Red Hat Security Bulletin (RHSB)

A document that provides the most actionable information to help customers make appropriate risk-based decisions.

Red Hat Severity Rating

Rates the severity of security issues found in Red Hat products using a four-point scale (Low, Moderate, Important, and Critical). These scoring systems provide a prioritized risk assessment to help you understand and schedule upgrades to your systems, enabling informed decisions on each issue's risk in your unique environment.

Source:
https://access.redhat.com/security/updates/classification/

Regression

It's a bug introduced by a patch that undoes or invalidates previous vulnerability fixes.

Remote attacker

An attacker who can reach the vulnerable component from across the network. Depending how the service is configured and any firewalls in place, this might range from the local network only to the internet at large.

Remote code execution (RCE)

An arbitrary code execution by a remote attacker.

Role Based Access Control (RBAC)

A security paradigm about authorization privileges. RBAC mechanism generally has users and its associated roles which helps to restrict additional privileges of individuals to add efficiency in the system compliance.

RBAC is an access-control mechanism to manage user privileges and restrict access to authorized users. Roles are created within an organization, and users are assigned particular roles to perform certain operations. Access is granted based on roles of individual users.

Root privileged users

Users running with the effective user id 0, or with equivalent linux capabilities, such as CAP_SYS_ADMIN.

Same Origin Policy (SOP)

The same-origin policy is a web security mechanism that aims to prevent scripts loaded by different origins from interacting with each other. An origin consists of a URI scheme, domain and port number. For example, the SOP prevents JavaScript code running on a malicious website from accessing the Document Object Model (DOM) of a third-party legitimate web page.

Secure Boot

Mechanism used to verify the integrity of firmware and software running on a platform.

Secure Shell (SSH)

Network protocol that gives a secure way to access a remote system over an insecure network.

Security Architecture

Conducts security assessments and makes recommendations to reduce security exposure and risk to customers.

Security Development Lifecycle

Developed and used by Red Hat to guide building more robust security practices across the organization.

Security-Enhanced Linux (SELinux)

Security-Enhanced Linux (SELinux) is an implementation of mandatory access control (MAC) system in the Linux kernel, which allows users and administrators more control over access control.

Server-side request forgery (SSRF)

Server-side request forgery (SSRF) is a web security vulnerability that occurs when an attacker can induce the vulnerable application into sending a request to a certain URLs, possibly bypassing access controls such as firewalls that prevent the attacker from accessing the URLs directly. A SSRF attack can target internal systems or services behind a firewall that are not accessible from the external network. This can allow a malicious attacker to perform unauthorized activities on behalf of the vulnerable application.

Source:
https://cwe.mitre.org/data/definitions/918.html

Shell / OS / Command Injection

The vulnerable application constructs all or part of an OS command using externally-influenced user input (e.g., forms, cookies, HTTP headers, etc.) but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command. It can lead to remote code execution (RCE).

Source:
https://cwe.mitre.org/data/definitions/78.html

Single sign-on (SSO)

Single sign-on is an authentication scheme that allows a user to log in with a single ID and password to any of several related, yet independent, software systems. True single sign-on allows the user to log in once and access services without re-entering authentication factors.

Specially crafted input

Malicious input that is developed by an attacker, often by modifying benign data, to exploit a security vulnerability in an application or service which processes the input. The input is context-dependent and can take the form of a packet, frame, request, text file, etc.

SQL Injection

The software constructs all or part of an SQL command using externally-influenced user input, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command. A remote attacker may be able to retrieve confidential data from the database, modify or delete data. In some cases, it can lead to arbitrary code execution.

Source:
https://cwe.mitre.org/data/definitions/89.html

SSL/TLS

Security protocol designed to provide secure communications in a computer network.

Stack-based buffer overflow

A type of buffer overflow where the buffer being overwritten is allocated on the stack. The stack is a memory region which is automatically reserved by the system for storing local variables when a function is called. A stack-based buffer overflow can lead to a denial of service or (in some cases) arbitrary code execution.

Source: https://cwe.mitre.org/data/definitions/121.html

The software attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource. An attacker may be able to traverse the file system and read or write the contents of arbitrary files. It can lead to a denial of service or (in some cases) arbitrary code execution.

Source:
https://cwe.mitre.org/data/definitions/59.html

Threat Modeling

Addresses problems in design and fixes attack surface issues prior to full development.

TOCTOU

TOCTOU is a type of race condition that occurs when the software checks the state of a resource before using that resource, but the resource's state can change between the check and the use in a way that invalidates the results of the check. This can cause the software to perform invalid actions (e.g., grant access to sensitive data) when the resource is in an unexpected state.

Source: https://cwe.mitre.org/data/definitions/367.html

Unauthenticated attacker

An attacker who did not have to perform an authentication step to perform intended actions.

Unprivileged guest user

A user with the standard permissions and properties granted on creation.

Use after free (UAF)

The software makes use of heap allocated memory after it has been freed. It can lead to a denial of service or (in some cases) arbitrary code execution.

Source:
https://cwe.mitre.org/data/definitions/416.html

User namespace

User namespaces isolate security-related identifiers and attributes such as user IDs and group IDs, the root directory, keyrings, and capabilities visible to a specific process and its subprocesses to allow privileged functionality while reducing attack vectors.

Vulnerability

A flaw that is exploitable.

Vulnerability Management

How Red Hat categorizes, addresses, and responds to security vulnerabilities.

XML External Entity (XXE)

XML External Entity (XXE) is a web security vulnerability that occurs when the vulnerable application processes an XML document containing XML entities that resolve to arbitrary local files or remote files, causing their content to be embedded into its output. It can lead to information disclosure or (in some cases) arbitrary code execution.

Source: https://cwe.mitre.org/data/definitions/611.html

Zero-Day Vulnerability

A vulnerability in a product or service that has been disclosed publicly but has not been remediated.

Comments