HSC
Network Security Consulting Agency Since 1989 - Specialized in Unix, Windows, TCP/IP and Internet
Text mode: access to the page content
Hervé Schauer Consultants
You are here: Home > Resources > Standardization > Security Advisory Format
Go to: HSC Trainings
Search:  
Version française
   Services   
o Skills & Expertise
o Consulting
o ISO 27001 services
o Vulnerabilities monitoring
o Audit & Assessment
o Penetration tests
o Vunerability assessment (TSAR)
o Forensics
o ARJEL
o Training courses
o E-learning
   Conferences   
o Agenda
o Past events
o Tutorials
   Resources   
o Thematic index
o Tips
o Lectures
o Courses
o Articles
o Tools (download)
o Vulnerability watch
   Company   
o Hervé Schauer
o Team
o Job opportunities
o Credentials
o History
o Partnerships
o Associations
   Press and
 communication
 
 
o HSC Newsletter
o Press review
o Press releases
o Publications
   Contacts   
o How to reach us
o Specific inquiries
o Directions to our office
o Hotels near our office
|>|Security Advisory Format  
> Access to the content TXT draft-debeaupuis-saf-00.txt [19KB]  
> Description Definition of a format for security advisories.  
> Context & Dates Internet draft published at the IETF .
This work is related to our Security monitoring service .
19 May 1999 
> Author Tristan Debeaupuis 
> Type Text, 12 pages long.  
> Abstract &
Table of content
This memo describes a format for security advisories. An advisory is a document describing a vulnerability of a program, an operating system or, more generally, a software or hardware component of the information system.

This specification tries to minimize changes in issuers and readers current practices (messages style). It also aims at defining a format which can be easily read by both programs and humans. It focuses on the structure of documents. This specification is primarily useful for advisories issuers such as CSIRTs [RFC2350] and users and is linked with intrusion detection.  

> Related documents
themeAdvisories
[Service]  Security monitoring
[Article]  Patch 0 Day ! [26 February 2007 - French]
[Presentation]  Software vulnerabilities: latest trends and possible solutions [23 March 2005 - French]
[Presentation]  Vulnerabilities: from discovery to exploitation [4 November 2004 - French]
> Copyright Distribution of this document is unlimited

 

Last modified on 24 September 2003 at 16:48:18 CET - webmaster@hsc.fr
Information on this server - © 1989-2010 Hervé Schauer Consultants