Good morning!
Sorry to bother you. I am conducting a study on determining the impact range of
vulnerabilities. My research primarily uses the SZZ method to identify the
affected versions of a vulnerability through patch analysis[1].
Previously, I had also emailed you to ask some questions. For example,
regarding CVE-2022-43551[2], you mentioned that earlier versions might not be
vulnerable due to HSTS feature was not enabled by default and was labled as
experimental. So I'm wondering what the significance of doing this work is. For
the reason,I would like to ask, how do you determine the impact range of a
vulnerability? Do you rely on dynamic analysis by running a Proof-of-Concept
(PoC) or static code review?
This would be an important contribution to open-source software, as it could
significantly reduce the time required for manually determining affected
versions!
Thanks!
[1] https://dl.acm.org/doi/10.1145/3510003.3510113
[2] https://curl.se/docs/CVE-2022-43551.html
--
Unsubscribe: https://lists.haxx.se/mailman/listinfo/curl-library
Etiquette: https://curl.se/mail/etiquette.html