<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for Mozilla Thunderbird</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2018:0818-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-03-26T11:29:18Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-03-26T11:29:18Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-03-26T11:29:18Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for Mozilla Thunderbird</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for Mozilla Thunderbird to version 52.7 fixes multiple issues.
    
The following bugs were fixed:
    
- Searching message bodies of messages in local folders, including filter
  and quick filter operations, did not find content in message attachments
- Better error handling for Yahoo accounts
    
The following security fixes are included as part of the mozilla platform. 
In general, these flaws cannot be exploited through email in Thunderbird
because scripting is disabled when reading mail, but are potentially risks
in browser or browser-like contexts (MFSA 2018-09, bsc#1085130, bsc#1085671):

- CVE-2018-5127: Buffer overflow manipulating SVG animatedPathSegList
- CVE-2018-5129: Out-of-bounds write with malformed IPC messages
- CVE-2018-5144: Integer overflow during Unicode conversion
- CVE-2018-5146: Out of bounds memory write in libvorbis
- CVE-2018-5125: Memory safety bugs fixed in Thunderbird 52.7
- CVE-2018-5145: Memory safety bugs fixed in Thunderbird 52.7
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2018-313</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1085130</URL>
      <Description>SUSE Bug 1085130</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1085671</URL>
      <Description>SUSE Bug 1085671</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5125/</URL>
      <Description>SUSE CVE CVE-2018-5125 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5127/</URL>
      <Description>SUSE CVE CVE-2018-5127 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5129/</URL>
      <Description>SUSE CVE CVE-2018-5129 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5144/</URL>
      <Description>SUSE CVE CVE-2018-5144 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5145/</URL>
      <Description>SUSE CVE CVE-2018-5145 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5146/</URL>
      <Description>SUSE CVE CVE-2018-5146 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Package Hub 12">
      <Branch Type="Product Name" Name="SUSE Package Hub 12">
        <FullProductName ProductID="SUSE Package Hub 12" CPE="cpe:/o:suse:packagehub:12">SUSE Package Hub 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-52.7-57.1">
      <FullProductName ProductID="MozillaThunderbird-52.7-57.1">MozillaThunderbird-52.7-57.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-buildsymbols-52.7-57.1">
      <FullProductName ProductID="MozillaThunderbird-buildsymbols-52.7-57.1">MozillaThunderbird-buildsymbols-52.7-57.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-devel-52.7-57.1">
      <FullProductName ProductID="MozillaThunderbird-devel-52.7-57.1">MozillaThunderbird-devel-52.7-57.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-translations-common-52.7-57.1">
      <FullProductName ProductID="MozillaThunderbird-translations-common-52.7-57.1">MozillaThunderbird-translations-common-52.7-57.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-translations-other-52.7-57.1">
      <FullProductName ProductID="MozillaThunderbird-translations-other-52.7-57.1">MozillaThunderbird-translations-other-52.7-57.1</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaThunderbird-52.7-57.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:MozillaThunderbird-52.7-57.1">MozillaThunderbird-52.7-57.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-buildsymbols-52.7-57.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.7-57.1">MozillaThunderbird-buildsymbols-52.7-57.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-devel-52.7-57.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:MozillaThunderbird-devel-52.7-57.1">MozillaThunderbird-devel-52.7-57.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-translations-common-52.7-57.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:MozillaThunderbird-translations-common-52.7-57.1">MozillaThunderbird-translations-common-52.7-57.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-translations-other-52.7-57.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:MozillaThunderbird-translations-other-52.7-57.1">MozillaThunderbird-translations-other-52.7-57.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bugs were reported in Firefox 58 and Firefox ESR 52.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 52.7, Firefox ESR &lt; 52.7, and Firefox &lt; 59.</Note>
    </Notes>
    <CVE>CVE-2018-5125</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-52.7-57.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.7-57.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-52.7-57.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-52.7-57.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-52.7-57.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5125.html</URL>
        <Description>CVE-2018-5125</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085130</URL>
        <Description>SUSE Bug 1085130</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A buffer overflow can occur when manipulating the SVG "animatedPathSegList" through script. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.7, Firefox ESR &lt; 52.7, and Firefox &lt; 59.</Note>
    </Notes>
    <CVE>CVE-2018-5127</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-52.7-57.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.7-57.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-52.7-57.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-52.7-57.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-52.7-57.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5127.html</URL>
        <Description>CVE-2018-5127</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085130</URL>
        <Description>SUSE Bug 1085130</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A lack of parameter validation on IPC messages results in a potential out-of-bounds write through malformed IPC messages. This can potentially allow for sandbox escape through memory corruption in the parent process. This vulnerability affects Thunderbird &lt; 52.7, Firefox ESR &lt; 52.7, and Firefox &lt; 59.</Note>
    </Notes>
    <CVE>CVE-2018-5129</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-52.7-57.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.7-57.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-52.7-57.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-52.7-57.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-52.7-57.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5129.html</URL>
        <Description>CVE-2018-5129</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085130</URL>
        <Description>SUSE Bug 1085130</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An integer overflow can occur during conversion of text to some Unicode character sets due to an unchecked length parameter. This vulnerability affects Firefox ESR &lt; 52.7 and Thunderbird &lt; 52.7.</Note>
    </Notes>
    <CVE>CVE-2018-5144</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-52.7-57.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.7-57.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-52.7-57.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-52.7-57.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-52.7-57.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5144.html</URL>
        <Description>CVE-2018-5144</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085130</URL>
        <Description>SUSE Bug 1085130</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bugs were reported in Firefox ESR 52.6. These bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 52.7 and Thunderbird &lt; 52.7.</Note>
    </Notes>
    <CVE>CVE-2018-5145</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-52.7-57.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.7-57.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-52.7-57.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-52.7-57.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-52.7-57.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5145.html</URL>
        <Description>CVE-2018-5145</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085130</URL>
        <Description>SUSE Bug 1085130</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An out of bounds memory write while processing Vorbis audio data was reported through the Pwn2Own contest. This vulnerability affects Firefox &lt; 59.0.1, Firefox ESR &lt; 52.7.2, and Thunderbird &lt; 52.7.</Note>
    </Notes>
    <CVE>CVE-2018-5146</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-52.7-57.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.7-57.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-52.7-57.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-52.7-57.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-52.7-57.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5146.html</URL>
        <Description>CVE-2018-5146</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085671</URL>
        <Description>SUSE Bug 1085671</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085687</URL>
        <Description>SUSE Bug 1085687</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180395</URL>
        <Description>SUSE Bug 1180395</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
