CVE Binary Checker Tool
Project description
CVE checker for binary code
===========================
This tool scans for a number of common, vulnerable open source components
(openssl, libpng, libxml2, expat and a few others) to let you know if your
system includes common libraries with known vulnerabilities.
Usage:
`python -m cve_bin_tool.cli <flags> <path to directory>`
Possible output levels:
-v (verbose): print scan results as they're found
(regular): print only final summary
-q (quiet): suppress all output but exit with error
number indicating number of files with CVE
Other options:
-x (extract): Autoextract compressed files
When running this script, Python 3 is preferred over Python 2.7 because it has
been more tested, but both versions should work.
This readme is intended to be a quickstart guide for using the tool. If you
require more information, there is also a [user manual](MANUAL.md) available.
How it works
------------
This scanner looks at the strings found in binary files to see if they
match certain vulnerable versions of the following libraries and tools:
* curl
* expat
* libnss
* node.js
* openssl
* png
* tiff
* xerces
* xml2
* zlib
All the checkers can be found in the checkers directory, as can the
[instructions on how to add a new checker](cve_bin_tool/checkers/README.md).
Support for new checkers can be requested via
[GitHub issues](https://github.com/intel/cve-bin-tool/issues).
Limitations
-----------
This scanner does not attempt to exploit issues or examine the code in greater
detail; it only looks for library signatures and version numbers. As such, it
cannot tell if someone has backported fixes to a vulnerable version, and it
will not work if library or version information was intentionally obfuscated.
This tool is meant to be used as a quick-to-run, easily-automatable check in a
non-malicious environment so that developers can be made aware of old libraries
with security issues that have been compiled into their binaries.
Feedback & Contributions
------------------------
Bugs and feature requests can be made via [GitHub
issues](https://github.com/intel/cve-bin-tool). Be aware that these issues are
not private, so take care when providing output to make sure you are not
disclosing security issues in other products.
Pull requests are also welcome via git.
Security Issues
---------------
Security issues with the tool itself can be reported to Intel's security
incident response team via
[https://intel.com/security](https://intel.com/security).
If in the course of using this tool you discover a security issue with someone
else's code, please disclose responsibly to the appropriate party.
===========================
This tool scans for a number of common, vulnerable open source components
(openssl, libpng, libxml2, expat and a few others) to let you know if your
system includes common libraries with known vulnerabilities.
Usage:
`python -m cve_bin_tool.cli <flags> <path to directory>`
Possible output levels:
-v (verbose): print scan results as they're found
(regular): print only final summary
-q (quiet): suppress all output but exit with error
number indicating number of files with CVE
Other options:
-x (extract): Autoextract compressed files
When running this script, Python 3 is preferred over Python 2.7 because it has
been more tested, but both versions should work.
This readme is intended to be a quickstart guide for using the tool. If you
require more information, there is also a [user manual](MANUAL.md) available.
How it works
------------
This scanner looks at the strings found in binary files to see if they
match certain vulnerable versions of the following libraries and tools:
* curl
* expat
* libnss
* node.js
* openssl
* png
* tiff
* xerces
* xml2
* zlib
All the checkers can be found in the checkers directory, as can the
[instructions on how to add a new checker](cve_bin_tool/checkers/README.md).
Support for new checkers can be requested via
[GitHub issues](https://github.com/intel/cve-bin-tool/issues).
Limitations
-----------
This scanner does not attempt to exploit issues or examine the code in greater
detail; it only looks for library signatures and version numbers. As such, it
cannot tell if someone has backported fixes to a vulnerable version, and it
will not work if library or version information was intentionally obfuscated.
This tool is meant to be used as a quick-to-run, easily-automatable check in a
non-malicious environment so that developers can be made aware of old libraries
with security issues that have been compiled into their binaries.
Feedback & Contributions
------------------------
Bugs and feature requests can be made via [GitHub
issues](https://github.com/intel/cve-bin-tool). Be aware that these issues are
not private, so take care when providing output to make sure you are not
disclosing security issues in other products.
Pull requests are also welcome via git.
Security Issues
---------------
Security issues with the tool itself can be reported to Intel's security
incident response team via
[https://intel.com/security](https://intel.com/security).
If in the course of using this tool you discover a security issue with someone
else's code, please disclose responsibly to the appropriate party.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
cve-bin-tool-0.2.0.tar.gz
(21.3 kB
view details)
File details
Details for the file cve-bin-tool-0.2.0.tar.gz
.
File metadata
- Download URL: cve-bin-tool-0.2.0.tar.gz
- Upload date:
- Size: 21.3 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/1.12.1 pkginfo/1.5.0.1 requests/2.21.0 setuptools/40.6.3 requests-toolbelt/0.8.0 tqdm/4.29.1 CPython/3.6.7
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 3dd73f7938f2dd8feba6aaf95a48e6e778d5777a94697567e2964a1bccb42cc4 |
|
MD5 | c229dd10b4885f6adb6df3b9e2126548 |
|
BLAKE2b-256 | 684f6d6534c081f4dd68a6d1487e603853d94b2ddc93f6b6ad5d20b40aea2873 |