Metadata-Version: 1.2
Name: cve-bin-tool
Version: 0.2.0
Summary: CVE Binary Checker Tool
Home-page: https://github.com/intel/cve-bin-tool
Author: Terri Oda
Author-email: terri.oda@intel.com
Maintainer: Terri Oda
Maintainer-email: terri.oda@intel.com
License: GPLv3
Description: CVE checker for binary code
        ===========================
        
        This tool scans for a number of common, vulnerable open source components
        (openssl, libpng, libxml2, expat and a few others) to let you know if your
        system includes common libraries with known vulnerabilities.
        
        Usage:
        `python -m cve_bin_tool.cli <flags> <path to directory>`
        
            Possible output levels:
            -v (verbose): print scan results as they're found
               (regular): print only final summary
            -q (quiet):   suppress all output but exit with error
                          number indicating number of files with CVE
        
            Other options:
            -x (extract): Autoextract compressed files
        
        When running this script, Python 3 is preferred over Python 2.7 because it has
        been more tested, but both versions should work.
        
        This readme is intended to be a quickstart guide for using the tool.  If you
        require more information, there is also a [user manual](MANUAL.md) available.
        
        How it works
        ------------
        
        This scanner looks at the strings found in binary files to see if they
        match certain vulnerable versions of the following libraries and tools:
        
        * curl
        * expat
        * libnss
        * node.js
        * openssl
        * png
        * tiff
        * xerces
        * xml2
        * zlib
        
        All the checkers can be found in the checkers directory, as can the
        [instructions on how to add a new checker](cve_bin_tool/checkers/README.md).
        Support for new checkers can be requested via
        [GitHub issues](https://github.com/intel/cve-bin-tool/issues).
        
        Limitations
        -----------
        
        This scanner does not attempt to exploit issues or examine the code in greater
        detail; it only looks for library signatures and version numbers.  As such, it
        cannot tell if someone has backported fixes to a vulnerable version, and it
        will not work if library or version information was intentionally obfuscated.
        
        This tool is meant to be used as a quick-to-run, easily-automatable check in a
        non-malicious environment so that developers can be made aware of old libraries
        with security issues that have been compiled into their binaries.
        
        Feedback & Contributions
        ------------------------
        
        Bugs and feature requests can be made via [GitHub
        issues](https://github.com/intel/cve-bin-tool).  Be aware that these issues are
        not private, so take care when providing output to make sure you are not
        disclosing security issues in other products.
        
        Pull requests are also welcome via git.
        
        Security Issues
        ---------------
        
        Security issues with the tool itself can be reported to Intel's security
        incident response team via
        [https://intel.com/security](https://intel.com/security).
        
        If in the course of using this tool you discover a security issue with someone
        else's code, please disclose responsibly to the appropriate party.
        
        
Keywords: security,tools,CVE
Platform: UNKNOWN
Classifier: Development Status :: 4 - Beta
Classifier: Intended Audience :: Developers
Classifier: License :: OSI Approved :: MIT License
Classifier: Natural Language :: English
Classifier: Operating System :: OS Independent
Classifier: Programming Language :: Python :: 2.7
Classifier: Programming Language :: Python :: 3.3
Classifier: Programming Language :: Python :: 3.4
Classifier: Programming Language :: Python :: 3.5
Classifier: Programming Language :: Python :: 3.6
Classifier: Programming Language :: Python :: 3.7
Classifier: Programming Language :: Python :: Implementation :: CPython
Classifier: Programming Language :: Python :: Implementation :: PyPy
