<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for MozillaThunderbird</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2016:3019-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-12-06T09:05:20Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-12-06T09:05:20Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-12-06T09:05:20Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for MozillaThunderbird</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for MozillaThunderbird fixes some potential security issues and bugs.

The following security flaws cannot be exploited through email because scripting
is disabled when reading mail, but are potentially risks in browser or
browser-like contexts:

- CVE-2016-9079: SVG Animation Remote Code Execution (MFSA 2016-92, bsc#1012964)
- CVE-2016-5296: Heap-buffer-overflow WRITE in rasterize_edges_1 (bsc#1010411)
- CVE-2016-5297: Incorrect argument length checking in Javascript (bsc#1010401)
- CVE-2016-9066: Integer overflow leading to a buffer overflow in nsScriptLoadHandler (bsc#1010404)
- CVE-2016-5291: Same-origin policy violation using local HTML file and saved shortcut file (bsc#1010410)
- CVE-2016-5290: Memory safety bugs fixed in Thunderbird ESR 45.5 (bsc#1010427)

The update contains changes in behavior:

- Changed recipient address entry: Arrow-keys now copy the pop-up
  value to the input field. Mouse-hovered pop-up value can no
  longer be confirmed with tab or enter key. This restores the
  behavior of Thunderbird 24.
- Support changes to character limit in Twitter

The following bugs were fixed:

- Reply with selected text containing quote resulted in wrong quoting level indication
- Email invitation might not be displayed when description contains non-ASCII characters
- Attempting to sort messages on the Date field whilst a quick filter is applied got stuck
  on sort descending
- Mail address display at header pane displayed incorrectly if the address contains UTF-8
  according to RFC 6532
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2016-1412</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TGREHQXPWYA3JLTHOF5UWISQWEQ7FXCL/#TGREHQXPWYA3JLTHOF5UWISQWEQ7FXCL</URL>
      <Description>E-Mail link for openSUSE-SU-2016:3019-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1009026</URL>
      <Description>SUSE Bug 1009026</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1010401</URL>
      <Description>SUSE Bug 1010401</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1010404</URL>
      <Description>SUSE Bug 1010404</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1010410</URL>
      <Description>SUSE Bug 1010410</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1010411</URL>
      <Description>SUSE Bug 1010411</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1010427</URL>
      <Description>SUSE Bug 1010427</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1012964</URL>
      <Description>SUSE Bug 1012964</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5290/</URL>
      <Description>SUSE CVE CVE-2016-5290 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5291/</URL>
      <Description>SUSE CVE CVE-2016-5291 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5296/</URL>
      <Description>SUSE CVE CVE-2016-5296 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5297/</URL>
      <Description>SUSE CVE CVE-2016-5297 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9066/</URL>
      <Description>SUSE CVE CVE-2016-9066 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9079/</URL>
      <Description>SUSE CVE CVE-2016-9079 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Package Hub 12">
      <Branch Type="Product Name" Name="SUSE Package Hub 12">
        <FullProductName ProductID="SUSE Package Hub 12" CPE="cpe:/o:suse:packagehub:12">SUSE Package Hub 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-45.5.1-17.1">
      <FullProductName ProductID="MozillaThunderbird-45.5.1-17.1">MozillaThunderbird-45.5.1-17.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-buildsymbols-45.5.1-17.1">
      <FullProductName ProductID="MozillaThunderbird-buildsymbols-45.5.1-17.1">MozillaThunderbird-buildsymbols-45.5.1-17.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-devel-45.5.1-17.1">
      <FullProductName ProductID="MozillaThunderbird-devel-45.5.1-17.1">MozillaThunderbird-devel-45.5.1-17.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-translations-common-45.5.1-17.1">
      <FullProductName ProductID="MozillaThunderbird-translations-common-45.5.1-17.1">MozillaThunderbird-translations-common-45.5.1-17.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-translations-other-45.5.1-17.1">
      <FullProductName ProductID="MozillaThunderbird-translations-other-45.5.1-17.1">MozillaThunderbird-translations-other-45.5.1-17.1</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaThunderbird-45.5.1-17.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:MozillaThunderbird-45.5.1-17.1">MozillaThunderbird-45.5.1-17.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-buildsymbols-45.5.1-17.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.5.1-17.1">MozillaThunderbird-buildsymbols-45.5.1-17.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-devel-45.5.1-17.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:MozillaThunderbird-devel-45.5.1-17.1">MozillaThunderbird-devel-45.5.1-17.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-translations-common-45.5.1-17.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:MozillaThunderbird-translations-common-45.5.1-17.1">MozillaThunderbird-translations-common-45.5.1-17.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-translations-other-45.5.1-17.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:MozillaThunderbird-translations-other-45.5.1-17.1">MozillaThunderbird-translations-other-45.5.1-17.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bugs were reported in Firefox 49 and Firefox ESR 45.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 45.5, Firefox ESR &lt; 45.5, and Firefox &lt; 50.</Note>
    </Notes>
    <CVE>CVE-2016-5290</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-45.5.1-17.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.5.1-17.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-45.5.1-17.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-45.5.1-17.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-45.5.1-17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TGREHQXPWYA3JLTHOF5UWISQWEQ7FXCL/#TGREHQXPWYA3JLTHOF5UWISQWEQ7FXCL</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5290.html</URL>
        <Description>CVE-2016-5290</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009026</URL>
        <Description>SUSE Bug 1009026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010427</URL>
        <Description>SUSE Bug 1010427</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A same-origin policy bypass with local shortcut files to load arbitrary local content from disk. This vulnerability affects Thunderbird &lt; 45.5, Firefox ESR &lt; 45.5, and Firefox &lt; 50.</Note>
    </Notes>
    <CVE>CVE-2016-5291</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-45.5.1-17.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.5.1-17.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-45.5.1-17.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-45.5.1-17.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-45.5.1-17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TGREHQXPWYA3JLTHOF5UWISQWEQ7FXCL/#TGREHQXPWYA3JLTHOF5UWISQWEQ7FXCL</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5291.html</URL>
        <Description>CVE-2016-5291</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009026</URL>
        <Description>SUSE Bug 1009026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010410</URL>
        <Description>SUSE Bug 1010410</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A heap-buffer-overflow in Cairo when processing SVG content caused by compiler optimization, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 45.5, Firefox ESR &lt; 45.5, and Firefox &lt; 50.</Note>
    </Notes>
    <CVE>CVE-2016-5296</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-45.5.1-17.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.5.1-17.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-45.5.1-17.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-45.5.1-17.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-45.5.1-17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TGREHQXPWYA3JLTHOF5UWISQWEQ7FXCL/#TGREHQXPWYA3JLTHOF5UWISQWEQ7FXCL</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5296.html</URL>
        <Description>CVE-2016-5296</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009026</URL>
        <Description>SUSE Bug 1009026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010395</URL>
        <Description>SUSE Bug 1010395</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An error in argument length checking in JavaScript, leading to potential integer overflows or other bounds checking issues. This vulnerability affects Thunderbird &lt; 45.5, Firefox ESR &lt; 45.5, and Firefox &lt; 50.</Note>
    </Notes>
    <CVE>CVE-2016-5297</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-45.5.1-17.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.5.1-17.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-45.5.1-17.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-45.5.1-17.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-45.5.1-17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TGREHQXPWYA3JLTHOF5UWISQWEQ7FXCL/#TGREHQXPWYA3JLTHOF5UWISQWEQ7FXCL</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5297.html</URL>
        <Description>CVE-2016-5297</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009026</URL>
        <Description>SUSE Bug 1009026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010401</URL>
        <Description>SUSE Bug 1010401</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A buffer overflow resulting in a potentially exploitable crash due to memory allocation issues when handling large amounts of incoming data. This vulnerability affects Thunderbird &lt; 45.5, Firefox ESR &lt; 45.5, and Firefox &lt; 50.</Note>
    </Notes>
    <CVE>CVE-2016-9066</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-45.5.1-17.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.5.1-17.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-45.5.1-17.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-45.5.1-17.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-45.5.1-17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TGREHQXPWYA3JLTHOF5UWISQWEQ7FXCL/#TGREHQXPWYA3JLTHOF5UWISQWEQ7FXCL</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9066.html</URL>
        <Description>CVE-2016-9066</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009026</URL>
        <Description>SUSE Bug 1009026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010404</URL>
        <Description>SUSE Bug 1010404</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability in SVG Animation has been discovered. An exploit built on this vulnerability has been discovered in the wild targeting Firefox and Tor Browser users on Windows. This vulnerability affects Firefox &lt; 50.0.2, Firefox ESR &lt; 45.5.1, and Thunderbird &lt; 45.5.1.</Note>
    </Notes>
    <CVE>CVE-2016-9079</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-45.5.1-17.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.5.1-17.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-45.5.1-17.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-45.5.1-17.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-45.5.1-17.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TGREHQXPWYA3JLTHOF5UWISQWEQ7FXCL/#TGREHQXPWYA3JLTHOF5UWISQWEQ7FXCL</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9079.html</URL>
        <Description>CVE-2016-9079</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1012964</URL>
        <Description>SUSE Bug 1012964</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
