<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for MozillaThunderbird</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2017:0357-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2017-02-01T17:54:52Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2017-02-01T17:54:52Z</InitialReleaseDate>
    <CurrentReleaseDate>2017-02-01T17:54:52Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for MozillaThunderbird</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update to Mozilla Thunderbird 45.7.0 fixes security issues and bugs.

The following security issues from advisory MFSA 2017-03 were fixed (boo#1021991)
In general, these flaws cannot be exploited through email in
Thunderbird because scripting is disabled when reading mail,
but are potentially risks in browser or browser-like contexts:

- CVE-2017-5375: Excessive JIT code allocation allows bypass of ASLR and DEP (boo#1021814)
- CVE-2017-5376: Use-after-free in XSL (boo#1021817)
- CVE-2017-5378: Pointer and frame data leakage of Javascript objects (boo#1021818)
- CVE-2017-5380: Potential use-after-free during DOM manipulations (boo#1021819)
- CVE-2017-5390: Insecure communication methods in Developer Tools JSON viewer (boo#1021820)
- CVE-2017-5396: Use-after-free with Media Decoder (boo#1021821)
- CVE-2017-5383: Location bar spoofing with unicode characters (boo#1021822)
- CVE-2017-5373: Memory safety bugs fixed in Thunderbird 45.7 (boo#1021824)

The following non-security bugs were fixed:

- Message preview pane non-functional after IMAP folder was renamed or moved
- 'Move To' button on 'Search Messages' panel not working
- Message sent to 'undisclosed recipients' shows no recipient
  (non-functional since Thunderbird version 38)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2017-188</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1021814</URL>
      <Description>SUSE Bug 1021814</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1021817</URL>
      <Description>SUSE Bug 1021817</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1021818</URL>
      <Description>SUSE Bug 1021818</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1021819</URL>
      <Description>SUSE Bug 1021819</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1021820</URL>
      <Description>SUSE Bug 1021820</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1021821</URL>
      <Description>SUSE Bug 1021821</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1021822</URL>
      <Description>SUSE Bug 1021822</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1021824</URL>
      <Description>SUSE Bug 1021824</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1021991</URL>
      <Description>SUSE Bug 1021991</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5373/</URL>
      <Description>SUSE CVE CVE-2017-5373 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5375/</URL>
      <Description>SUSE CVE CVE-2017-5375 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5376/</URL>
      <Description>SUSE CVE CVE-2017-5376 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5378/</URL>
      <Description>SUSE CVE CVE-2017-5378 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5380/</URL>
      <Description>SUSE CVE CVE-2017-5380 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5383/</URL>
      <Description>SUSE CVE CVE-2017-5383 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5390/</URL>
      <Description>SUSE CVE CVE-2017-5390 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5396/</URL>
      <Description>SUSE CVE CVE-2017-5396 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Package Hub 12">
      <Branch Type="Product Name" Name="SUSE Package Hub 12">
        <FullProductName ProductID="SUSE Package Hub 12" CPE="cpe:/o:suse:packagehub:12">SUSE Package Hub 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-45.7.0-23.1">
      <FullProductName ProductID="MozillaThunderbird-45.7.0-23.1">MozillaThunderbird-45.7.0-23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-buildsymbols-45.7.0-23.1">
      <FullProductName ProductID="MozillaThunderbird-buildsymbols-45.7.0-23.1">MozillaThunderbird-buildsymbols-45.7.0-23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-devel-45.7.0-23.1">
      <FullProductName ProductID="MozillaThunderbird-devel-45.7.0-23.1">MozillaThunderbird-devel-45.7.0-23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-translations-common-45.7.0-23.1">
      <FullProductName ProductID="MozillaThunderbird-translations-common-45.7.0-23.1">MozillaThunderbird-translations-common-45.7.0-23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-translations-other-45.7.0-23.1">
      <FullProductName ProductID="MozillaThunderbird-translations-other-45.7.0-23.1">MozillaThunderbird-translations-other-45.7.0-23.1</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaThunderbird-45.7.0-23.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:MozillaThunderbird-45.7.0-23.1">MozillaThunderbird-45.7.0-23.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-buildsymbols-45.7.0-23.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.7.0-23.1">MozillaThunderbird-buildsymbols-45.7.0-23.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-devel-45.7.0-23.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:MozillaThunderbird-devel-45.7.0-23.1">MozillaThunderbird-devel-45.7.0-23.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-translations-common-45.7.0-23.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:MozillaThunderbird-translations-common-45.7.0-23.1">MozillaThunderbird-translations-common-45.7.0-23.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-translations-other-45.7.0-23.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:MozillaThunderbird-translations-other-45.7.0-23.1">MozillaThunderbird-translations-other-45.7.0-23.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bugs were reported in Firefox 50.1 and Firefox ESR 45.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.</Note>
    </Notes>
    <CVE>CVE-2017-5373</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-45.7.0-23.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.7.0-23.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-45.7.0-23.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-45.7.0-23.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-45.7.0-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5373.html</URL>
        <Description>CVE-2017-5373</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021824</URL>
        <Description>SUSE Bug 1021824</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021991</URL>
        <Description>SUSE Bug 1021991</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">JIT code allocation can allow for a bypass of ASLR and DEP protections leading to potential memory corruption attacks. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.</Note>
    </Notes>
    <CVE>CVE-2017-5375</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-45.7.0-23.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.7.0-23.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-45.7.0-23.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-45.7.0-23.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-45.7.0-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5375.html</URL>
        <Description>CVE-2017-5375</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021814</URL>
        <Description>SUSE Bug 1021814</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021991</URL>
        <Description>SUSE Bug 1021991</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free while manipulating XSL in XSLT documents. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.</Note>
    </Notes>
    <CVE>CVE-2017-5376</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-45.7.0-23.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.7.0-23.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-45.7.0-23.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-45.7.0-23.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-45.7.0-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5376.html</URL>
        <Description>CVE-2017-5376</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021817</URL>
        <Description>SUSE Bug 1021817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021991</URL>
        <Description>SUSE Bug 1021991</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Hashed codes of JavaScript objects are shared between pages. This allows for pointer leaks because an object's address can be discovered through hash codes, and also allows for data leakage of an object's content using these hash codes. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.</Note>
    </Notes>
    <CVE>CVE-2017-5378</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-45.7.0-23.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.7.0-23.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-45.7.0-23.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-45.7.0-23.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-45.7.0-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5378.html</URL>
        <Description>CVE-2017-5378</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021818</URL>
        <Description>SUSE Bug 1021818</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021991</URL>
        <Description>SUSE Bug 1021991</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A potential use-after-free found through fuzzing during DOM manipulation of SVG content. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.</Note>
    </Notes>
    <CVE>CVE-2017-5380</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-45.7.0-23.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.7.0-23.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-45.7.0-23.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-45.7.0-23.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-45.7.0-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5380.html</URL>
        <Description>CVE-2017-5380</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021819</URL>
        <Description>SUSE Bug 1021819</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021991</URL>
        <Description>SUSE Bug 1021991</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">URLs containing certain unicode glyphs for alternative hyphens and quotes do not properly trigger punycode display, allowing for domain name spoofing attacks in the location bar. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.</Note>
    </Notes>
    <CVE>CVE-2017-5383</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-45.7.0-23.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.7.0-23.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-45.7.0-23.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-45.7.0-23.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-45.7.0-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5383.html</URL>
        <Description>CVE-2017-5383</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021822</URL>
        <Description>SUSE Bug 1021822</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021991</URL>
        <Description>SUSE Bug 1021991</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The JSON viewer in the Developer Tools uses insecure methods to create a communication channel for copying and viewing JSON or HTTP headers data, allowing for potential privilege escalation. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.</Note>
    </Notes>
    <CVE>CVE-2017-5390</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-45.7.0-23.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.7.0-23.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-45.7.0-23.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-45.7.0-23.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-45.7.0-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5390.html</URL>
        <Description>CVE-2017-5390</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021820</URL>
        <Description>SUSE Bug 1021820</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021991</URL>
        <Description>SUSE Bug 1021991</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability in the Media Decoder when working with media files when some events are fired after the media elements are freed from memory. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.</Note>
    </Notes>
    <CVE>CVE-2017-5396</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-45.7.0-23.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.7.0-23.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-45.7.0-23.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-45.7.0-23.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-45.7.0-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5396.html</URL>
        <Description>CVE-2017-5396</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021821</URL>
        <Description>SUSE Bug 1021821</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021991</URL>
        <Description>SUSE Bug 1021991</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
