-
-
Notifications
You must be signed in to change notification settings - Fork 245
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
cve-bin-tool supported #1439
Comments
Could you please provide further details:
Thanks |
Link to tool: https://github.com/intel/cve-bin-tool/tree/main |
Looks very promising. Nevertheless, a benchmark and further comparison would be very useful as the current EMBA integration checks for over 700 binary identifiers. As far as I can see they have a quite understandable Regex integration for all of the search patterns. See here https://github.com/intel/cve-bin-tool/blob/main/cve_bin_tool/checkers/asterisk.py |
I decrypted a D-Link DIR-878 firmware and made a compare test with cve-bin-tool and emba for it. https://github.com/0xricksanchez/dlink-decrypt This would be the cve-bin-tool outcome: cve_report DIR878_FW1.30B08_decrypted.pdf and emba provided these findings: I used this file for input: cve-bin-tool was extreamly fast, it took just a few minutes to go through the filesystem, emba default scan profile lasted for 01:08:45, but it was also an acceptable run. :) |
a quick check based only on the filenames for the checking patterns showed that EMBA supports already at least 139 patterns from cve-bin-tool (371 checks at all):
|
Thank you for checking:
as cve-bin-tool is only checking for system components we need to adjust the EMBA run a bit more with only running the scanning modules s06, s08, s09, s24, s25. I do not think that we will be as fast ... but a bit faster compared to the default scan ;) |
I did a compare tests for the original DIR_878_FW1.30B08.bin file and the decrypted version binary with emba. The original use "SHRS" encryption and I got this: and the decrypted file version in emba dropped some more findings: but almost identical. I used this cve-bin-tool command syntax recently:
|
My SBOM Testfirmware results: cve-bin-tool:
EMBA:
Syft
The thing I like in cve-bin-tool is that the vulnerability check is so damn fast. I will do a further evaluation if we can use the sqlite database from them for our own vulnearbility identification. |
looks as an integration of this tool could be easily realized via the csv2cve mechanism:
After the run we have in /home/m1k3/Downloads/asdf.csv all the needed data. I think with this mechanism we need to split every component in one csv input file and let cve-bin-tool run in threaded mode. The main issue I have seen is that in some cases we look for unknown or multiple vendor entries which is in our current implementation just a Any further suggestions? |
Like wise. I can second that cve-bin-tool wins the time race here ! I think the if emba is run without any profile arguments, it should pick the one that the most basic and runs faster(like a quick scan) than being the other way around. Even if i pick a smaller set of scans it still takes a long time. Besides, what is the purpose of the tool if it takes blindingly long time to run, it really not scalable. Reminds me of the old days to run make on the code and come back an hour later to see what went wrong. It is an excellent tool with a lot of features, but i feel that it needs some restructuring and speed ! |
cve-bin-tool is a SBOM tool. EMBA is a complete firmware analysis framework. So, comparing apples with oranges is always difficult. At least you need to use the right scanning-profile like one of the SBOM profiles. And also in such case you are comparing one tool with extraction with one that is not able to handle extraction and always needs pre-processing. Additionally, EMBA will check multiple package-managers and more binary identifiers (see results here)
use the right scanning-profile or enable only the modules you need.
You have a different use-case as I. For addressing different use-cases we have scanning-profiles. Use them and they will make you happy :)
You are welcome to improve it -> PR can be submitted here. Make it faster and make it better ... you can be part of it! |
The CVE Binary Tool helps you determine if your system includes known vulnerabilities. You can scan binaries for over 200 common, vulnerable components (openssl, libpng, libxml2, expat and others)。
The text was updated successfully, but these errors were encountered: