<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for MozillaThunderbird</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2017:0687-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2017-03-14T14:03:02Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2017-03-14T14:03:02Z</InitialReleaseDate>
    <CurrentReleaseDate>2017-03-14T14:03:02Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for MozillaThunderbird</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update to Mozilla Thunderbird 45.8.0 fixes security issues and bugs.

The following security issues from advisory MFSA 2017-07 were fixed. (boo#1028391)
In general, these flaws cannot be exploited through email in
Thunderbird because scripting is disabled when reading mail,
but are potentially risks in browser or browser-like contexts:

- CVE-2017-5400: asm.js JIT-spray bypass of ASLR and DEP
- CVE-2017-5401: Memory Corruption when handling ErrorResult
- CVE-2017-5402: Use-after-free working with events in FontFace objects (bmo#1334876)
- CVE-2017-5404: Use-after-free working with ranges in selections
- CVE-2017-5407: Pixel and history stealing via floating-point timing side channel with SVG filters
- CVE-2017-5410: Memory corruption during JavaScript garbage collection incremental sweeping
- CVE-2017-5408: Cross-origin reading of video captions in violation of CORS
- CVE-2017-5405: FTP response codes can cause use of uninitialized values for ports (bmo#1336699)
- CVE-2017-5398: Memory safety bugs fixed in Thunderbird 45.8

The following non-security issues were fixed:

- crash when viewing certain IMAP messages
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2017-345</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1028391</URL>
      <Description>SUSE Bug 1028391</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5398/</URL>
      <Description>SUSE CVE CVE-2017-5398 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5400/</URL>
      <Description>SUSE CVE CVE-2017-5400 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5401/</URL>
      <Description>SUSE CVE CVE-2017-5401 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5402/</URL>
      <Description>SUSE CVE CVE-2017-5402 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5404/</URL>
      <Description>SUSE CVE CVE-2017-5404 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5405/</URL>
      <Description>SUSE CVE CVE-2017-5405 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5407/</URL>
      <Description>SUSE CVE CVE-2017-5407 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5408/</URL>
      <Description>SUSE CVE CVE-2017-5408 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5410/</URL>
      <Description>SUSE CVE CVE-2017-5410 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Package Hub 12">
      <Branch Type="Product Name" Name="SUSE Package Hub 12">
        <FullProductName ProductID="SUSE Package Hub 12" CPE="cpe:/o:suse:packagehub:12">SUSE Package Hub 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-45.8.0-27.1">
      <FullProductName ProductID="MozillaThunderbird-45.8.0-27.1">MozillaThunderbird-45.8.0-27.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-buildsymbols-45.8.0-27.1">
      <FullProductName ProductID="MozillaThunderbird-buildsymbols-45.8.0-27.1">MozillaThunderbird-buildsymbols-45.8.0-27.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-devel-45.8.0-27.1">
      <FullProductName ProductID="MozillaThunderbird-devel-45.8.0-27.1">MozillaThunderbird-devel-45.8.0-27.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-translations-common-45.8.0-27.1">
      <FullProductName ProductID="MozillaThunderbird-translations-common-45.8.0-27.1">MozillaThunderbird-translations-common-45.8.0-27.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-translations-other-45.8.0-27.1">
      <FullProductName ProductID="MozillaThunderbird-translations-other-45.8.0-27.1">MozillaThunderbird-translations-other-45.8.0-27.1</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaThunderbird-45.8.0-27.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1">MozillaThunderbird-45.8.0-27.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-buildsymbols-45.8.0-27.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1">MozillaThunderbird-buildsymbols-45.8.0-27.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-devel-45.8.0-27.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1">MozillaThunderbird-devel-45.8.0-27.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-translations-common-45.8.0-27.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1">MozillaThunderbird-translations-common-45.8.0-27.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-translations-other-45.8.0-27.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1">MozillaThunderbird-translations-other-45.8.0-27.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bugs were reported in Thunderbird 45.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 52, Firefox ESR &lt; 45.8, Thunderbird &lt; 52, and Thunderbird &lt; 45.8.</Note>
    </Notes>
    <CVE>CVE-2017-5398</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>10</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5398.html</URL>
        <Description>CVE-2017-5398</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1028391</URL>
        <Description>SUSE Bug 1028391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1028393</URL>
        <Description>SUSE Bug 1028393</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">JIT-spray targeting asm.js combined with a heap spray allows for a bypass of ASLR and DEP protections leading to potential memory corruption attacks. This vulnerability affects Firefox &lt; 52, Firefox ESR &lt; 45.8, Thunderbird &lt; 52, and Thunderbird &lt; 45.8.</Note>
    </Notes>
    <CVE>CVE-2017-5400</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5400.html</URL>
        <Description>CVE-2017-5400</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1028391</URL>
        <Description>SUSE Bug 1028391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1028393</URL>
        <Description>SUSE Bug 1028393</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A crash triggerable by web content in which an "ErrorResult" references unassigned memory due to a logic error. The resulting crash may be exploitable. This vulnerability affects Firefox &lt; 52, Firefox ESR &lt; 45.8, Thunderbird &lt; 52, and Thunderbird &lt; 45.8.</Note>
    </Notes>
    <CVE>CVE-2017-5401</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5401.html</URL>
        <Description>CVE-2017-5401</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1028391</URL>
        <Description>SUSE Bug 1028391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1028393</URL>
        <Description>SUSE Bug 1028393</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free can occur when events are fired for a "FontFace" object after the object has been already been destroyed while working with fonts. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 52, Firefox ESR &lt; 45.8, Thunderbird &lt; 52, and Thunderbird &lt; 45.8.</Note>
    </Notes>
    <CVE>CVE-2017-5402</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5402.html</URL>
        <Description>CVE-2017-5402</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1028391</URL>
        <Description>SUSE Bug 1028391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1028393</URL>
        <Description>SUSE Bug 1028393</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free error can occur when manipulating ranges in selections with one node inside a native anonymous tree and one node outside of it. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 52, Firefox ESR &lt; 45.8, Thunderbird &lt; 52, and Thunderbird &lt; 45.8.</Note>
    </Notes>
    <CVE>CVE-2017-5404</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5404.html</URL>
        <Description>CVE-2017-5404</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1028391</URL>
        <Description>SUSE Bug 1028391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1028393</URL>
        <Description>SUSE Bug 1028393</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Certain response codes in FTP connections can result in the use of uninitialized values for ports in FTP operations. This vulnerability affects Firefox &lt; 52, Firefox ESR &lt; 45.8, Thunderbird &lt; 52, and Thunderbird &lt; 45.8.</Note>
    </Notes>
    <CVE>CVE-2017-5405</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5405.html</URL>
        <Description>CVE-2017-5405</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1028391</URL>
        <Description>SUSE Bug 1028391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1028393</URL>
        <Description>SUSE Bug 1028393</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Using SVG filters that don't use the fixed point math implementation on a target iframe, a malicious page can extract pixel values from a targeted user. This can be used to extract history information and read text values across domains. This violates same-origin policy and leads to information disclosure. This vulnerability affects Firefox &lt; 52, Firefox ESR &lt; 45.8, Thunderbird &lt; 52, and Thunderbird &lt; 45.8.</Note>
    </Notes>
    <CVE>CVE-2017-5407</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5407.html</URL>
        <Description>CVE-2017-5407</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1028391</URL>
        <Description>SUSE Bug 1028391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1028393</URL>
        <Description>SUSE Bug 1028393</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Video files loaded video captions cross-origin without checking for the presence of CORS headers permitting such cross-origin use, leading to potential information disclosure for video captions. This vulnerability affects Firefox &lt; 52, Firefox ESR &lt; 45.8, Thunderbird &lt; 52, and Thunderbird &lt; 45.8.</Note>
    </Notes>
    <CVE>CVE-2017-5408</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5408.html</URL>
        <Description>CVE-2017-5408</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1028391</URL>
        <Description>SUSE Bug 1028391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1028393</URL>
        <Description>SUSE Bug 1028393</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory corruption resulting in a potentially exploitable crash during garbage collection of JavaScript due errors in how incremental sweeping is managed for memory cleanup. This vulnerability affects Firefox &lt; 52, Firefox ESR &lt; 45.8, Thunderbird &lt; 52, and Thunderbird &lt; 45.8.</Note>
    </Notes>
    <CVE>CVE-2017-5410</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5410.html</URL>
        <Description>CVE-2017-5410</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1028391</URL>
        <Description>SUSE Bug 1028391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1028393</URL>
        <Description>SUSE Bug 1028393</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
