<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update to Firefox 46.0</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2016:1251-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-05-06T10:13:35Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-05-06T10:13:35Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-05-06T10:13:35Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update to Firefox 46.0</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update to Mozilla Firefox 46.0 fixes several security issues and bugs (boo#977333).

   The following vulnerabilities were fixed:

   - CVE-2016-2804: Miscellaneous memory safety hazards - MFSA 2016-39
     (boo#977373)
   - CVE-2016-2806: Miscellaneous memory safety hazards - MFSA 2016-39
     (boo#977375)
   - CVE-2016-2807: Miscellaneous memory safety hazards - MFSA 2016-39
     (boo#977376)
   - CVE-2016-2808: Write to invalid HashMap entry through JavaScript.watch()
     - MFSA 2016-47 (boo#977386)
   - CVE-2016-2811: Use-after-free in Service Worker - MFSA 2016-42
     (boo#977379)
   - CVE-2016-2812: Buffer overflow in Service Worker - MFSA 2016-42
     (boo#977379)
   - CVE-2016-2814: Buffer overflow in libstagefright with CENC offsets -
     MFSA 2016-44 (boo#977381)
   - CVE-2016-2816: CSP not applied to pages sent with
     multipart/x-mixed-replace - MFSA 2016-45 (boo#977382)
   - CVE-2016-2817: Elevation of privilege with chrome.tabs.update API in web
     extensions - MFSA 2016-46 (boo#977384)
   - CVE-2016-2820: Firefox Health Reports could accept events from untrusted
     domains - MFSA 2016-48 (boo#977388)

   The following miscellaneous changes are included:

   - Improved security of the JavaScript Just In Time (JIT) Compiler
   - WebRTC fixes to improve performance and stability
   - Added support for document.elementsFromPoint
   - Added HKDF support for Web Crypto API

The minimum requirements increased to NSPR 4.12 and NSS 3.22.3.

Mozilla NSS was updated to 3.22.3 as a dependency for Mozilla Firefox 46.0, with the following changes:

   - Increase compatibility of TLS extended master secret, don't send an
     empty TLS extension last in the handshake (bmo#1243641)
   - RSA-PSS signatures are now supported
   - Pseudorandom functions based on hashes other than SHA-1 are now supported
   - Enforce an External Policy on NSS from a config file
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html</URL>
      <Description>E-Mail link for openSUSE-SU-2016:1251-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Version" Name="MozillaFirefox-46.0-113.2">
      <FullProductName ProductID="MozillaFirefox-46.0-113.2">MozillaFirefox-46.0-113.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-branding-upstream-46.0-113.2">
      <FullProductName ProductID="MozillaFirefox-branding-upstream-46.0-113.2">MozillaFirefox-branding-upstream-46.0-113.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-buildsymbols-46.0-113.2">
      <FullProductName ProductID="MozillaFirefox-buildsymbols-46.0-113.2">MozillaFirefox-buildsymbols-46.0-113.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-devel-46.0-113.2">
      <FullProductName ProductID="MozillaFirefox-devel-46.0-113.2">MozillaFirefox-devel-46.0-113.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-common-46.0-113.2">
      <FullProductName ProductID="MozillaFirefox-translations-common-46.0-113.2">MozillaFirefox-translations-common-46.0-113.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-other-46.0-113.2">
      <FullProductName ProductID="MozillaFirefox-translations-other-46.0-113.2">MozillaFirefox-translations-other-46.0-113.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libfreebl3-3.22.3-77.1">
      <FullProductName ProductID="libfreebl3-3.22.3-77.1">libfreebl3-3.22.3-77.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libfreebl3-32bit-3.22.3-77.1">
      <FullProductName ProductID="libfreebl3-32bit-3.22.3-77.1">libfreebl3-32bit-3.22.3-77.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoftokn3-3.22.3-77.1">
      <FullProductName ProductID="libsoftokn3-3.22.3-77.1">libsoftokn3-3.22.3-77.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoftokn3-32bit-3.22.3-77.1">
      <FullProductName ProductID="libsoftokn3-32bit-3.22.3-77.1">libsoftokn3-32bit-3.22.3-77.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-3.22.3-77.1">
      <FullProductName ProductID="mozilla-nss-3.22.3-77.1">mozilla-nss-3.22.3-77.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-32bit-3.22.3-77.1">
      <FullProductName ProductID="mozilla-nss-32bit-3.22.3-77.1">mozilla-nss-32bit-3.22.3-77.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-certs-3.22.3-77.1">
      <FullProductName ProductID="mozilla-nss-certs-3.22.3-77.1">mozilla-nss-certs-3.22.3-77.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-certs-32bit-3.22.3-77.1">
      <FullProductName ProductID="mozilla-nss-certs-32bit-3.22.3-77.1">mozilla-nss-certs-32bit-3.22.3-77.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-devel-3.22.3-77.1">
      <FullProductName ProductID="mozilla-nss-devel-3.22.3-77.1">mozilla-nss-devel-3.22.3-77.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-sysinit-3.22.3-77.1">
      <FullProductName ProductID="mozilla-nss-sysinit-3.22.3-77.1">mozilla-nss-sysinit-3.22.3-77.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-sysinit-32bit-3.22.3-77.1">
      <FullProductName ProductID="mozilla-nss-sysinit-32bit-3.22.3-77.1">mozilla-nss-sysinit-32bit-3.22.3-77.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-tools-3.22.3-77.1">
      <FullProductName ProductID="mozilla-nss-tools-3.22.3-77.1">mozilla-nss-tools-3.22.3-77.1</FullProductName>
    </Branch>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 46.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.</Note>
    </Notes>
    <CVE>CVE-2016-2804</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2804.html</URL>
        <Description>CVE-2016-2804</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977373</URL>
        <Description>SUSE Bug 977373</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 46.0 and Firefox ESR 45.x before 45.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.</Note>
    </Notes>
    <CVE>CVE-2016-2806</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2806.html</URL>
        <Description>CVE-2016-2806</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977375</URL>
        <Description>SUSE Bug 977375</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.</Note>
    </Notes>
    <CVE>CVE-2016-2807</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2807.html</URL>
        <Description>CVE-2016-2807</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977333</URL>
        <Description>SUSE Bug 977333</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977376</URL>
        <Description>SUSE Bug 977376</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The watch implementation in the JavaScript engine in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allows remote attackers to execute arbitrary code or cause a denial of service (generation-count overflow, out-of-bounds HashMap write access, and application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2016-2808</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2808.html</URL>
        <Description>CVE-2016-2808</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977333</URL>
        <Description>SUSE Bug 977333</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977386</URL>
        <Description>SUSE Bug 977386</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Mozilla Maintenance Service updater in Mozilla Firefox before 46.0 on Windows allows user-assisted remote attackers to delete arbitrary files by leveraging certain local file execution.</Note>
    </Notes>
    <CVE>CVE-2016-2809</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:N/I:P/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2809.html</URL>
        <Description>CVE-2016-2809</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977333</URL>
        <Description>SUSE Bug 977333</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977377</URL>
        <Description>SUSE Bug 977377</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before 46.0 on Android before 5.0 allows attackers to bypass intended Signature access requirements via a crafted application that leverages content-provider permissions, as demonstrated by reading the browser history or a saved password.</Note>
    </Notes>
    <CVE>CVE-2016-2810</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2810.html</URL>
        <Description>CVE-2016-2810</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977333</URL>
        <Description>SUSE Bug 977333</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977378</URL>
        <Description>SUSE Bug 977378</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the ServiceWorkerInfo class in the Service Worker subsystem in Mozilla Firefox before 46.0 allows remote attackers to execute arbitrary code via vectors related to the BeginReading method.</Note>
    </Notes>
    <CVE>CVE-2016-2811</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2811.html</URL>
        <Description>CVE-2016-2811</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977379</URL>
        <Description>SUSE Bug 977379</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in the get implementation in the ServiceWorkerManager class in the Service Worker subsystem in Mozilla Firefox before 46.0 allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2016-2812</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2812.html</URL>
        <Description>CVE-2016-2812</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977379</URL>
        <Description>SUSE Bug 977379</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before 46.0 on Android does not properly restrict JavaScript access to orientation and motion data, which allows remote attackers to obtain sensitive information about a device's physical environment, and possibly discover PIN values, via a crafted web site, a similar issue to CVE-2016-1780.</Note>
    </Notes>
    <CVE>CVE-2016-2813</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2813.html</URL>
        <Description>CVE-2016-2813</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977333</URL>
        <Description>SUSE Bug 977333</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977380</URL>
        <Description>SUSE Bug 977380</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the stagefright::SampleTable::parseSampleCencInfo function in libstagefright in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allows remote attackers to execute arbitrary code via crafted CENC offsets that lead to mismanagement of the sizes table.</Note>
    </Notes>
    <CVE>CVE-2016-2814</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.4</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2814.html</URL>
        <Description>CVE-2016-2814</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977333</URL>
        <Description>SUSE Bug 977333</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977381</URL>
        <Description>SUSE Bug 977381</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before 46.0 allows remote attackers to bypass the Content Security Policy (CSP) protection mechanism via the multipart/x-mixed-replace content type.</Note>
    </Notes>
    <CVE>CVE-2016-2816</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2816.html</URL>
        <Description>CVE-2016-2816</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977382</URL>
        <Description>SUSE Bug 977382</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The WebExtension sandbox feature in browser/components/extensions/ext-tabs.js in Mozilla Firefox before 46.0 does not properly restrict principal inheritance during chrome.tabs.create and chrome.tabs.update API calls, which allows remote attackers to conduct Universal XSS (UXSS) attacks via a crafted extension that accesses a (1) javascript: or (2) data: URL.</Note>
    </Notes>
    <CVE>CVE-2016-2817</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2817.html</URL>
        <Description>CVE-2016-2817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977384</URL>
        <Description>SUSE Bug 977384</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Firefox Health Reports (aka FHR or about:healthreport) feature in Mozilla Firefox before 46.0 does not properly restrict the origin of events, which makes it easier for remote attackers to modify sharing preferences by leveraging access to the remote-report IFRAME element.</Note>
    </Notes>
    <CVE>CVE-2016-2820</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2820.html</URL>
        <Description>CVE-2016-2820</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977388</URL>
        <Description>SUSE Bug 977388</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
