<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for MozillaThunderbird</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2019:1606-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2019-06-24T10:32:20Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2019-06-24T10:32:20Z</InitialReleaseDate>
    <CurrentReleaseDate>2019-06-24T10:32:20Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for MozillaThunderbird</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for MozillaThunderbird fixes the following issues:

Security issues fixed:

- CVE-2019-11703: Fixed a heap-based buffer overflow in icalmemorystrdupanddequote() (bsc#1137595).
- CVE-2019-11704: Fixed a heap-based buffer overflow in parser_get_next_char() (bsc#1137595).
- CVE-2019-11705: Fixed a stack-based buffer overflow in icalrecur_add_bydayrules() (bsc#1137595).
- CVE-2019-11706: Fixed a type confusion in icaltimezone_get_vtimezone_properties() (bsc#1137595).
- CVE-2019-11707: Fixed a type confusion in Array.pop (bsc#1138872).
- CVE-2019-11708: Fixed a sandbox escape using Prompt:Open (bsc#1138872).

This update was imported from the SUSE:SLE-15:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2019-1606</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LLKQ5EZXADDPRD2AIRRG5BLXWO4VGDSF/#LLKQ5EZXADDPRD2AIRRG5BLXWO4VGDSF</URL>
      <Description>E-Mail link for openSUSE-SU-2019:1606-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1137595</URL>
      <Description>SUSE Bug 1137595</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1138872</URL>
      <Description>SUSE Bug 1138872</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-11703/</URL>
      <Description>SUSE CVE CVE-2019-11703 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-11704/</URL>
      <Description>SUSE CVE CVE-2019-11704 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-11705/</URL>
      <Description>SUSE CVE CVE-2019-11705 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-11706/</URL>
      <Description>SUSE CVE CVE-2019-11706 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-11707/</URL>
      <Description>SUSE CVE CVE-2019-11707 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-11708/</URL>
      <Description>SUSE CVE CVE-2019-11708 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.0">
      <Branch Type="Product Name" Name="openSUSE Leap 15.0">
        <FullProductName ProductID="openSUSE Leap 15.0" CPE="cpe:/o:opensuse:leap:15.0">openSUSE Leap 15.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.1">
      <Branch Type="Product Name" Name="openSUSE Leap 15.1">
        <FullProductName ProductID="openSUSE Leap 15.1" CPE="cpe:/o:opensuse:leap:15.1">openSUSE Leap 15.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-60.7.2-lp151.2.7.1">
      <FullProductName ProductID="MozillaThunderbird-60.7.2-lp151.2.7.1">MozillaThunderbird-60.7.2-lp151.2.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-buildsymbols-60.7.2-lp151.2.7.1">
      <FullProductName ProductID="MozillaThunderbird-buildsymbols-60.7.2-lp151.2.7.1">MozillaThunderbird-buildsymbols-60.7.2-lp151.2.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-translations-common-60.7.2-lp151.2.7.1">
      <FullProductName ProductID="MozillaThunderbird-translations-common-60.7.2-lp151.2.7.1">MozillaThunderbird-translations-common-60.7.2-lp151.2.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-translations-other-60.7.2-lp151.2.7.1">
      <FullProductName ProductID="MozillaThunderbird-translations-other-60.7.2-lp151.2.7.1">MozillaThunderbird-translations-other-60.7.2-lp151.2.7.1</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaThunderbird-60.7.2-lp151.2.7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:MozillaThunderbird-60.7.2-lp151.2.7.1">MozillaThunderbird-60.7.2-lp151.2.7.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-buildsymbols-60.7.2-lp151.2.7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-60.7.2-lp151.2.7.1">MozillaThunderbird-buildsymbols-60.7.2-lp151.2.7.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-translations-common-60.7.2-lp151.2.7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:MozillaThunderbird-translations-common-60.7.2-lp151.2.7.1">MozillaThunderbird-translations-common-60.7.2-lp151.2.7.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-translations-other-60.7.2-lp151.2.7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:MozillaThunderbird-translations-other-60.7.2-lp151.2.7.1">MozillaThunderbird-translations-other-60.7.2-lp151.2.7.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-60.7.2-lp151.2.7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:MozillaThunderbird-60.7.2-lp151.2.7.1">MozillaThunderbird-60.7.2-lp151.2.7.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-buildsymbols-60.7.2-lp151.2.7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-60.7.2-lp151.2.7.1">MozillaThunderbird-buildsymbols-60.7.2-lp151.2.7.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-translations-common-60.7.2-lp151.2.7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:MozillaThunderbird-translations-common-60.7.2-lp151.2.7.1">MozillaThunderbird-translations-common-60.7.2-lp151.2.7.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-translations-other-60.7.2-lp151.2.7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:MozillaThunderbird-translations-other-60.7.2-lp151.2.7.1">MozillaThunderbird-translations-other-60.7.2-lp151.2.7.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw in Thunderbird's implementation of iCal causes a heap buffer overflow in parser_get_next_char when processing certain email messages, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60.7.1.</Note>
    </Notes>
    <CVE>CVE-2019-11703</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:MozillaThunderbird-60.7.2-lp151.2.7.1</ProductID>
        <ProductID>openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-60.7.2-lp151.2.7.1</ProductID>
        <ProductID>openSUSE Leap 15.0:MozillaThunderbird-translations-common-60.7.2-lp151.2.7.1</ProductID>
        <ProductID>openSUSE Leap 15.0:MozillaThunderbird-translations-other-60.7.2-lp151.2.7.1</ProductID>
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-60.7.2-lp151.2.7.1</ProductID>
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-60.7.2-lp151.2.7.1</ProductID>
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-translations-common-60.7.2-lp151.2.7.1</ProductID>
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-translations-other-60.7.2-lp151.2.7.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LLKQ5EZXADDPRD2AIRRG5BLXWO4VGDSF/#LLKQ5EZXADDPRD2AIRRG5BLXWO4VGDSF</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-11703.html</URL>
        <Description>CVE-2019-11703</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1137595</URL>
        <Description>SUSE Bug 1137595</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw in Thunderbird's implementation of iCal causes a heap buffer overflow in icalmemory_strdup_and_dequote when processing certain email messages, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60.7.1.</Note>
    </Notes>
    <CVE>CVE-2019-11704</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:MozillaThunderbird-60.7.2-lp151.2.7.1</ProductID>
        <ProductID>openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-60.7.2-lp151.2.7.1</ProductID>
        <ProductID>openSUSE Leap 15.0:MozillaThunderbird-translations-common-60.7.2-lp151.2.7.1</ProductID>
        <ProductID>openSUSE Leap 15.0:MozillaThunderbird-translations-other-60.7.2-lp151.2.7.1</ProductID>
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-60.7.2-lp151.2.7.1</ProductID>
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-60.7.2-lp151.2.7.1</ProductID>
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-translations-common-60.7.2-lp151.2.7.1</ProductID>
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-translations-other-60.7.2-lp151.2.7.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LLKQ5EZXADDPRD2AIRRG5BLXWO4VGDSF/#LLKQ5EZXADDPRD2AIRRG5BLXWO4VGDSF</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-11704.html</URL>
        <Description>CVE-2019-11704</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1137595</URL>
        <Description>SUSE Bug 1137595</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw in Thunderbird's implementation of iCal causes a stack buffer overflow in icalrecur_add_bydayrules when processing certain email messages, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60.7.1.</Note>
    </Notes>
    <CVE>CVE-2019-11705</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:MozillaThunderbird-60.7.2-lp151.2.7.1</ProductID>
        <ProductID>openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-60.7.2-lp151.2.7.1</ProductID>
        <ProductID>openSUSE Leap 15.0:MozillaThunderbird-translations-common-60.7.2-lp151.2.7.1</ProductID>
        <ProductID>openSUSE Leap 15.0:MozillaThunderbird-translations-other-60.7.2-lp151.2.7.1</ProductID>
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-60.7.2-lp151.2.7.1</ProductID>
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-60.7.2-lp151.2.7.1</ProductID>
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-translations-common-60.7.2-lp151.2.7.1</ProductID>
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-translations-other-60.7.2-lp151.2.7.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LLKQ5EZXADDPRD2AIRRG5BLXWO4VGDSF/#LLKQ5EZXADDPRD2AIRRG5BLXWO4VGDSF</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-11705.html</URL>
        <Description>CVE-2019-11705</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1137595</URL>
        <Description>SUSE Bug 1137595</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw in Thunderbird's implementation of iCal causes a type confusion in icaltimezone_get_vtimezone_properties when processing certain email messages, resulting in a crash. This vulnerability affects Thunderbird &lt; 60.7.1.</Note>
    </Notes>
    <CVE>CVE-2019-11706</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:MozillaThunderbird-60.7.2-lp151.2.7.1</ProductID>
        <ProductID>openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-60.7.2-lp151.2.7.1</ProductID>
        <ProductID>openSUSE Leap 15.0:MozillaThunderbird-translations-common-60.7.2-lp151.2.7.1</ProductID>
        <ProductID>openSUSE Leap 15.0:MozillaThunderbird-translations-other-60.7.2-lp151.2.7.1</ProductID>
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-60.7.2-lp151.2.7.1</ProductID>
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-60.7.2-lp151.2.7.1</ProductID>
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-translations-common-60.7.2-lp151.2.7.1</ProductID>
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-translations-other-60.7.2-lp151.2.7.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LLKQ5EZXADDPRD2AIRRG5BLXWO4VGDSF/#LLKQ5EZXADDPRD2AIRRG5BLXWO4VGDSF</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-11706.html</URL>
        <Description>CVE-2019-11706</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1137595</URL>
        <Description>SUSE Bug 1137595</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A type confusion vulnerability can occur when manipulating JavaScript objects due to issues in Array.pop. This can allow for an exploitable crash. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Firefox ESR &lt; 60.7.1, Firefox &lt; 67.0.3, and Thunderbird &lt; 60.7.2.</Note>
    </Notes>
    <CVE>CVE-2019-11707</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:MozillaThunderbird-60.7.2-lp151.2.7.1</ProductID>
        <ProductID>openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-60.7.2-lp151.2.7.1</ProductID>
        <ProductID>openSUSE Leap 15.0:MozillaThunderbird-translations-common-60.7.2-lp151.2.7.1</ProductID>
        <ProductID>openSUSE Leap 15.0:MozillaThunderbird-translations-other-60.7.2-lp151.2.7.1</ProductID>
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-60.7.2-lp151.2.7.1</ProductID>
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-60.7.2-lp151.2.7.1</ProductID>
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-translations-common-60.7.2-lp151.2.7.1</ProductID>
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-translations-other-60.7.2-lp151.2.7.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LLKQ5EZXADDPRD2AIRRG5BLXWO4VGDSF/#LLKQ5EZXADDPRD2AIRRG5BLXWO4VGDSF</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-11707.html</URL>
        <Description>CVE-2019-11707</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1138614</URL>
        <Description>SUSE Bug 1138614</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Insufficient vetting of parameters passed with the Prompt:Open IPC message between child and parent processes can result in the non-sandboxed parent process opening web content chosen by a compromised child process. When combined with additional vulnerabilities this could result in executing arbitrary code on the user's computer. This vulnerability affects Firefox ESR &lt; 60.7.2, Firefox &lt; 67.0.4, and Thunderbird &lt; 60.7.2.</Note>
    </Notes>
    <CVE>CVE-2019-11708</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:MozillaThunderbird-60.7.2-lp151.2.7.1</ProductID>
        <ProductID>openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-60.7.2-lp151.2.7.1</ProductID>
        <ProductID>openSUSE Leap 15.0:MozillaThunderbird-translations-common-60.7.2-lp151.2.7.1</ProductID>
        <ProductID>openSUSE Leap 15.0:MozillaThunderbird-translations-other-60.7.2-lp151.2.7.1</ProductID>
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-60.7.2-lp151.2.7.1</ProductID>
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-60.7.2-lp151.2.7.1</ProductID>
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-translations-common-60.7.2-lp151.2.7.1</ProductID>
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-translations-other-60.7.2-lp151.2.7.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>10</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LLKQ5EZXADDPRD2AIRRG5BLXWO4VGDSF/#LLKQ5EZXADDPRD2AIRRG5BLXWO4VGDSF</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-11708.html</URL>
        <Description>CVE-2019-11708</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1138872</URL>
        <Description>SUSE Bug 1138872</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
