<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for Mozilla Firefox</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2016:0306-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-02-01T21:33:51Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-02-01T21:33:51Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-02-01T21:33:51Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for Mozilla Firefox</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update fixes the following security related issues by updating packages to a more recent version:

Update of NSPR to 4.11
Update of NSS to 3.21
Update of Firefox to 44.0
  * MFSA 2016-01/CVE-2016-1930/CVE-2016-1931
    Miscellaneous memory safety hazards
  * MFSA 2016-02/CVE-2016-1933 (bmo#1231761)
    Out of Memory crash when parsing GIF format images
  * MFSA 2016-03/CVE-2016-1935 (bmo#1220450)
    Buffer overflow in WebGL after out of memory allocation
  * MFSA 2016-04/CVE-2015-7208/CVE-2016-1939 (bmo#1191423, bmo#1233784)
    Firefox allows for control characters to be set in cookie names
  * MFSA 2016-06/CVE-2016-1937 (bmo#724353)
    Missing delay following user click events in protocol handler dialog
  * MFSA 2016-07/CVE-2016-1938 (bmo#1190248)
    Errors in mp_div and mp_exptmod cryptographic functions in NSS
    (fixed by requiring NSS 3.21)
  * MFSA 2016-09/CVE-2016-1942/CVE-2016-1943 (bmo#1189082, bmo#1228590)
    Addressbar spoofing attacks
  * MFSA 2016-10/CVE-2016-1944/CVE-2016-1945/CVE-2016-1946
    (bmo#1186621, bmo#1214782, bmo#1232096)
    Unsafe memory manipulation found through code inspection
  * MFSA 2016-11/CVE-2016-1947 (bmo#1237103)
    Application Reputation service disabled in Firefox 43</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160306-1/</URL>
      <Description>Link for SUSE-SU-2016:0306-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for SUSE-SU-2016:0306-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Version" Name="MozillaFirefox-44.0-103.1">
      <FullProductName ProductID="MozillaFirefox-44.0-103.1">MozillaFirefox-44.0-103.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-branding-upstream-44.0-103.1">
      <FullProductName ProductID="MozillaFirefox-branding-upstream-44.0-103.1">MozillaFirefox-branding-upstream-44.0-103.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-buildsymbols-44.0-103.1">
      <FullProductName ProductID="MozillaFirefox-buildsymbols-44.0-103.1">MozillaFirefox-buildsymbols-44.0-103.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-devel-44.0-103.1">
      <FullProductName ProductID="MozillaFirefox-devel-44.0-103.1">MozillaFirefox-devel-44.0-103.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-common-44.0-103.1">
      <FullProductName ProductID="MozillaFirefox-translations-common-44.0-103.1">MozillaFirefox-translations-common-44.0-103.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-other-44.0-103.1">
      <FullProductName ProductID="MozillaFirefox-translations-other-44.0-103.1">MozillaFirefox-translations-other-44.0-103.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libfreebl3-3.21-68.1">
      <FullProductName ProductID="libfreebl3-3.21-68.1">libfreebl3-3.21-68.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libfreebl3-32bit-3.21-68.1">
      <FullProductName ProductID="libfreebl3-32bit-3.21-68.1">libfreebl3-32bit-3.21-68.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoftokn3-3.21-68.1">
      <FullProductName ProductID="libsoftokn3-3.21-68.1">libsoftokn3-3.21-68.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoftokn3-32bit-3.21-68.1">
      <FullProductName ProductID="libsoftokn3-32bit-3.21-68.1">libsoftokn3-32bit-3.21-68.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nspr-4.11-28.1">
      <FullProductName ProductID="mozilla-nspr-4.11-28.1">mozilla-nspr-4.11-28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nspr-32bit-4.11-28.1">
      <FullProductName ProductID="mozilla-nspr-32bit-4.11-28.1">mozilla-nspr-32bit-4.11-28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nspr-devel-4.11-28.1">
      <FullProductName ProductID="mozilla-nspr-devel-4.11-28.1">mozilla-nspr-devel-4.11-28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-3.21-68.1">
      <FullProductName ProductID="mozilla-nss-3.21-68.1">mozilla-nss-3.21-68.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-32bit-3.21-68.1">
      <FullProductName ProductID="mozilla-nss-32bit-3.21-68.1">mozilla-nss-32bit-3.21-68.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-certs-3.21-68.1">
      <FullProductName ProductID="mozilla-nss-certs-3.21-68.1">mozilla-nss-certs-3.21-68.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-certs-32bit-3.21-68.1">
      <FullProductName ProductID="mozilla-nss-certs-32bit-3.21-68.1">mozilla-nss-certs-32bit-3.21-68.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-devel-3.21-68.1">
      <FullProductName ProductID="mozilla-nss-devel-3.21-68.1">mozilla-nss-devel-3.21-68.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-sysinit-3.21-68.1">
      <FullProductName ProductID="mozilla-nss-sysinit-3.21-68.1">mozilla-nss-sysinit-3.21-68.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-sysinit-32bit-3.21-68.1">
      <FullProductName ProductID="mozilla-nss-sysinit-32bit-3.21-68.1">mozilla-nss-sysinit-32bit-3.21-68.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-tools-3.21-68.1">
      <FullProductName ProductID="mozilla-nss-tools-3.21-68.1">mozilla-nss-tools-3.21-68.1</FullProductName>
    </Branch>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before 43.0 stores cookies containing vertical tab characters, which allows remote attackers to obtain sensitive information by reading HTTP Cookie headers.</Note>
    </Notes>
    <CVE>CVE-2015-7208</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160306-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7208.html</URL>
        <Description>CVE-2015-7208</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959277</URL>
        <Description>SUSE Bug 959277</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963637</URL>
        <Description>SUSE Bug 963637</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 44.0 and Firefox ESR 38.x before 38.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.</Note>
    </Notes>
    <CVE>CVE-2016-1930</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160306-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1930.html</URL>
        <Description>CVE-2016-1930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963520</URL>
        <Description>SUSE Bug 963520</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963632</URL>
        <Description>SUSE Bug 963632</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 44.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to uninitialized memory encountered during brotli data compression, and other vectors.</Note>
    </Notes>
    <CVE>CVE-2016-1931</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160306-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1931.html</URL>
        <Description>CVE-2016-1931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963633</URL>
        <Description>SUSE Bug 963633</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the image-deinterlacing functionality in Mozilla Firefox before 44.0 allows remote attackers to cause a denial of service (memory consumption or application crash) via a crafted GIF image.</Note>
    </Notes>
    <CVE>CVE-2016-1933</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160306-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1933.html</URL>
        <Description>CVE-2016-1933</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963634</URL>
        <Description>SUSE Bug 963634</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the BufferSubData function in Mozilla Firefox before 44.0 and Firefox ESR 38.x before 38.6 allows remote attackers to execute arbitrary code via crafted WebGL content.</Note>
    </Notes>
    <CVE>CVE-2016-1935</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160306-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1935.html</URL>
        <Description>CVE-2016-1935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963520</URL>
        <Description>SUSE Bug 963520</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963635</URL>
        <Description>SUSE Bug 963635</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The protocol-handler dialog in Mozilla Firefox before 44.0 allows remote attackers to conduct clickjacking attacks via a crafted web site that triggers a single-click action in a situation where a double-click action was intended.</Note>
    </Notes>
    <CVE>CVE-2016-1937</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160306-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1937.html</URL>
        <Description>CVE-2016-1937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963641</URL>
        <Description>SUSE Bug 963641</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977736</URL>
        <Description>SUSE Bug 977736</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The s_mp_div function in lib/freebl/mpi/mpi.c in Mozilla Network Security Services (NSS) before 3.21, as used in Mozilla Firefox before 44.0, improperly divides numbers, which might make it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging use of the (1) mp_div or (2) mp_exptmod function.</Note>
    </Notes>
    <CVE>CVE-2016-1938</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160306-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1938.html</URL>
        <Description>CVE-2016-1938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963731</URL>
        <Description>SUSE Bug 963731</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before 44.0 stores cookies with names containing vertical tab characters, which allows remote attackers to obtain sensitive information by reading HTTP Cookie headers.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-7208.</Note>
    </Notes>
    <CVE>CVE-2016-1939</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160306-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1939.html</URL>
        <Description>CVE-2016-1939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963637</URL>
        <Description>SUSE Bug 963637</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before 44.0 allows user-assisted remote attackers to spoof a trailing substring in the address bar by leveraging a user's paste of a (1) wyciwyg: URI or (2) resource: URI.</Note>
    </Notes>
    <CVE>CVE-2016-1942</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160306-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1942.html</URL>
        <Description>CVE-2016-1942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963643</URL>
        <Description>SUSE Bug 963643</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before 44.0 on Android allows remote attackers to spoof the address bar via the scrollTo method.</Note>
    </Notes>
    <CVE>CVE-2016-1943</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160306-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1943.html</URL>
        <Description>CVE-2016-1943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963643</URL>
        <Description>SUSE Bug 963643</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Buffer11::NativeBuffer11::map function in ANGLE, as used in Mozilla Firefox before 44.0, might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.</Note>
    </Notes>
    <CVE>CVE-2016-1944</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160306-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1944.html</URL>
        <Description>CVE-2016-1944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963644</URL>
        <Description>SUSE Bug 963644</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The nsZipArchive function in Mozilla Firefox before 44.0 might allow remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging incorrect use of a pointer during processing of a ZIP archive.</Note>
    </Notes>
    <CVE>CVE-2016-1945</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160306-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1945.html</URL>
        <Description>CVE-2016-1945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963644</URL>
        <Description>SUSE Bug 963644</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The MoofParser::Metadata function in binding/MoofParser.cpp in libstagefright in Mozilla Firefox before 44.0 does not limit the size of read operations, which might allow remote attackers to cause a denial of service (integer overflow and buffer overflow) or possibly have unspecified other impact via crafted metadata.</Note>
    </Notes>
    <CVE>CVE-2016-1946</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160306-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1946.html</URL>
        <Description>CVE-2016-1946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963644</URL>
        <Description>SUSE Bug 963644</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox 43.x mishandles attempts to connect to the Application Reputation service, which makes it easier for remote attackers to trigger an unintended download by leveraging the absence of reputation data.</Note>
    </Notes>
    <CVE>CVE-2016-1947</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160306-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1947.html</URL>
        <Description>CVE-2016-1947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963645</URL>
        <Description>SUSE Bug 963645</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
