Chapter 3: Proper and Ethical Disclosure
59
Confirmation of the Flaw
PART I
In the event that the vendor confirms the flaw does indeed exist, it must follow up this
statement with the following action items:
• A list of products/versions affected by the confirmed flaw
• A statement on how a fix will be distributed
• A timeframe for distributing the fix
Disproof of the Flaw
In the event that the vendor disproves the reported flaw, the vendor then must show the
finder that one or both of the following are true:
• The reported flaw does not exist in the supported product.
• The behavior that the finder reported exists, but does not create a security
concern. If this statement is true, the vendor should forward validation data to
the finder, such as:
• Product documentation that confirms the behavior is normal or
nonthreatening.
• Test results that confirm the behavior is only a security concern when the
product is configured inappropriately.
• An analysis that shows how an attack could not successfully exploit this
reported behavior.
The finder may choose to dispute this conclusion of disproof by the vendor. In this
case, the finder should reply to the vendor with its own testing results that validate its
claim and contradict the vendor’s findings. The finder should also supply an analysis of
how an attack could exploit the reported flaw. The vendor is responsible for reviewing
the dispute, investigating it again, and responding to the finder accordingly.
Unable to Confirm or Disprove the Flaw
In the event the vendor cannot confirm or disprove the reported flaw, the vendor should
inform the finder of the results and produce detailed evidence of any investigative work.
Test results and analytical summaries should be forwarded to the finder. At this point,
the finder can move forward in the following ways:
• Provide code to the vendor that better demonstrates the proposed vulnerability.
• If no change is established, the finder can move to release their VSR to the
public. In this case, the finder should follow appropriate guidelines for
releasing vulnerability information to the public (covered later in the chapter).
Resolution
In cases where a flaw is confirmed, the vendor must take proper steps to develop a solu-
tion to fix the problem. Remedies should be created for all supported products and
versions of the software that are tied to the identified flaw. Although not required by