Skip to main content

Read VEX files

Project description

vex-reader

OpenSSF Best Practices OpenSSF Scorecard GitHub release (latest SemVer) PyPI release Downloads

Utility to read Red Hat VEX files that are located at https://access.redhat.com/security/data/csaf/v2/vex/.

I'm (slowly) aiming to make this a bit more extensible so that it can be used with other VEX files beyond just Red Hat, but I'm basing all of this off of Red Hat VEX files to aim to make this a proper parsing library for any VEX documents.

Installation

Install vex-reader from PyPI:

pip install vex-reader

Usage

The best way to use vex-reader is to install the Python module. It provides the vex-reader binary and you can import the library for use in your own applications.

vex-reader --vex tests/cve-2002-2443.json
CVE-2002-2443
-------------

Public on : 2002-06-15
Impact    : Moderate
CVSS Score: 5.0

Vulnerability summary
krb5: UDP ping-pong flaw in kpasswd


Vulnerability description
schpw.c in the kpasswd service in kadmind in MIT Kerberos 5 (aka krb5) before 1.11.3 does not properly validate UDP packets before
sending responses, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged packet that
triggers a communication loop, as demonstrated by krb_pingpong.nasl, a related issue to CVE-1999-0103.


CVSS score applicability
The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational
purposes to better understand the severity of this vulnerability.


Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License
(https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide
attribution to Red Hat Inc. and provide a link to the original.


Additional Information
  Bugzilla: 962531

External References
  https://bugzilla.redhat.com/show_bug.cgi?id=962531
  https://www.cve.org/CVERecord?id=CVE-2002-2443
  https://nvd.nist.gov/vuln/detail/CVE-2002-2443

Red Hat affected packages and issued errata
  RHSA-2013:0942 -- Red Hat Enterprise Linux Workstation (v. 6)

CVSS v2 Vector
  Red Hat: AV:N/AC:L/Au:N/C:N/I:N/A:P
  NVD    : AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS v2 Score Breakdown
                           Red Hat    NVD
  CVSS v2 Base Score       5.0        5.0
  Access Vector            Network    Network
  Access Complexity        Low        Low
  Authentication           None       None
  Confidentiality Impact   None       None
  Integrity Impact         None       None
  Availability Impact      Partial    Partial

Copyright © Red Hat, Inc. All rights reserved

By default, vex-reader will pull the CVSS score from NVD's API. If this is undesirable (for testing, etc) you can pass the --no-nvd argument to prevent lookups. Currently, vex-reader requires the VEX file to parse to be on-disk.

Development

Contributions to vex-reader are welcome. Currently, it works predominantly with Red Hat's VEX files and has limited success with other VEX files (such as from Cisco). If vex-reader fails to parse the VEX file you're feeding it, you can either submit a patch or open an issue and link to the VEX file you're trying to parse.

Development setup:

git clone https://github.com/vdanen/vex-reader.git
cd vex-reader
python3 -m venv venv
source venv/bin/activate
pip install --upgrade pip
pip install -e .

When working from the git repository for development, use:

$ python -m vex.vex_reader --vex tests/cve-2002-2443.json

A good place to find some VEX documents to play with is here: https://wid.cert-bund.de/.well-known/csaf-aggregator/aggregator.json

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

vex_reader-0.9.5.tar.gz (54.7 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

vex_reader-0.9.5-py3-none-any.whl (41.7 kB view details)

Uploaded Python 3

File details

Details for the file vex_reader-0.9.5.tar.gz.

File metadata

  • Download URL: vex_reader-0.9.5.tar.gz
  • Upload date:
  • Size: 54.7 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.13.11

File hashes

Hashes for vex_reader-0.9.5.tar.gz
Algorithm Hash digest
SHA256 c6fbc0405361400198be0f0be073940fea2f1ffcbe74cd85f1f185768f2bf0ec
MD5 a763cb8e9ff7fefc5985562d7f31733d
BLAKE2b-256 8f6ba8d2b4272d1a90be17a9257f83131b1c51172ab486992396073d33ee9a87

See more details on using hashes here.

File details

Details for the file vex_reader-0.9.5-py3-none-any.whl.

File metadata

  • Download URL: vex_reader-0.9.5-py3-none-any.whl
  • Upload date:
  • Size: 41.7 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.13.11

File hashes

Hashes for vex_reader-0.9.5-py3-none-any.whl
Algorithm Hash digest
SHA256 b2e9e3127a58f9ef9cb2d4e762e16b8b1360de74bdb84c2893ed2e0fd9de3478
MD5 645850f1ab91008488ae20534e8791a8
BLAKE2b-256 829f2fd88dc32e1452784a41b86884a7d79f2096848b451e1e413989e835dedd

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page