Open Source Vulnerability Database Shuts Down (osvdb.org) 34
Reader StonyCreekBare writes: From the Blog at osvdb.org "As of today, a decision has been made to shut down the Open Source Vulnerability Database (OSVDB), and will not return. We are not looking for anyone to offer assistance at this point, and it will not be resurrected in its previous form. This was not an easy decision, and several of us struggled for well over ten years trying to make it work at great personal expense. The industry simply did not want to contribute and support such an effort."
Well, their choice (Score:2)
Not remotely saying that some/most vendors do a crap job with security disclosures and patching in general. But some folks don't make it easy to get along with.
Re: (Score:2)
Re:Well, their choice (Score:5, Informative)
MITRE CVE is not everything (Score:5, Informative)
They probably shut down because the MITRE's CVE database is pretty much regarded as the canonical database for all vulnerabilities, open and proprietary. I've not see a security advisory that didn't have a CVE number for a long time. I don't remember ever seeing one with a reference to OSVDB.
MITRE itself has a list of things it thinks deserve CVE IDs: https://cve.mitre.org/cve/data_sources_product_coverage.html [mitre.org] for details. Things outside of this list may not ever receive a CVE ID, even if they are valid vulnerabilities.
The takeaway is that lots of products have vulnerabilities but never receive CVEs or are included in the CVE dictionary. This is why alternates like OSVDB popped up, and why alternate vulnerability ID systems popped up recently (see DWF [seclists.org] as a primary example).
It's a shame to lose something like OSVDB, as there really isn't a good canonical source of ALL vulnerabilities. MITRE's CVE works for vulnerabilities in big name products, but it is nowhere near inclusive of all vulnerabilities reported. Of course, OSVDB hasn't been updated recently either, so there's a big gap in even knowing what's out there. Maybe projects like DWF will help us move in that direction.
So, no money, no candy (Score:2)
"The industry didn't want to contribute and support such an effort." What did you expect? That they were going to throw money at you because OPEN SOURCE?
Re: (Score:3)
One way or another, they hope to monetize it.
Alternative Site (Score:3)
Re: (Score:1)
Comment removed (Score:5, Interesting)
Re: (Score:2)
Re: (Score:1)
You're problem is that you are reporting these things to them.
The right thing to do is publicize first.
Let them ask questions later.
The whole "responsible disclosure" thing is code for "we don't want people to know our shit sucks".
If everyone just anonymously posted security issues online they would get exploited, and therefore fixed, much faster.
Re: (Score:2)
This makes me wonder how many security researchers simply go to work for the black market.\
How exactly do you make a living as a "security researcher" anyway, if companies treat you like this?
Re: (Score:3)
This has been the front page story, until lately:
https://yro.slashdot.org/story/16/04/06/1529210/nest-reminds-customers-that-ownership-isnt-what-it-used-to-be
Is slashdot applying censorship? Who are really the new overlords? Has Alphabet paid SlashdotMedia to silence its criticism?
I would find this troubling indeed, only it appears that it's just a second-page story now. There's this new thing called the passage of time.
Re: (Score:2)
Oh, okay, it's back now. My apologies. I thought you were talking about the "latest update bricks thermostats with a lifetime warranty" story from yesterday.
Re: (Score:2)
Google web cache
Google is doing their very best to hide its existence but for the moment its still there.
http://webcache.googleusercont... [googleusercontent.com]
Of course companies would want a DB of weaknesses. (Score:2)
We want to show people we truly put the safety and security of our customers above profitability. The we know the stockholders will understand.
(and if you believe that there is a bridge in Brooklyn I can show you