<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for MozillaFirefox</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2015:0593-2</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2015-03-23T23:58:05Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2015-03-23T23:58:05Z</InitialReleaseDate>
    <CurrentReleaseDate>2015-03-23T23:58:05Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for MozillaFirefox</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
MozillaFirefox was updated to the 31.5.3ESR release to fix two security 
vulnerabilities:

    * 

      MFSA 2015-29 / CVE-2015-0817: Security researcher ilxu1a reported,
      through HP Zero Day Initiative's Pwn2Own contest, a flaw in Mozilla's
      implementation of typed array bounds checking in JavaScript
      just-in-time compilation (JIT) and its management of bounds checking
      for heap access. This flaw can be leveraged into the reading and
      writing of memory allowing for arbitrary code execution on the local
      system.

    * 

      MFSA 2015-28 / CVE-2015-0818: Security researcher Mariusz Mlynski
      reported, through HP Zero Day Initiative's Pwn2Own contest, a method
      to run arbitrary scripts in a privileged context. This bypassed the
      same-origin policy protections by using a flaw in the processing of
      SVG format content navigation.

Security Issues:

    * CVE-2015-0817
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817&gt;
    * CVE-2015-0818
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0818&gt;

</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">slessp1-firefox-20150323,slessp2-firefox-20150323</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150593-2/</URL>
      <Description>Link for SUSE-SU-2015:0593-2</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2015-March/001319.html</URL>
      <Description>E-Mail link for SUSE-SU-2015:0593-2</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/923534</URL>
      <Description>SUSE Bug 923534</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-0817/</URL>
      <Description>SUSE CVE CVE-2015-0817 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-0818/</URL>
      <Description>SUSE CVE CVE-2015-0818 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP1-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP1-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP1-LTSS" CPE="cpe:/o:suse:suse_sles_ltss:11:sp1">SUSE Linux Enterprise Server 11 SP1-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP1-TERADATA">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP1-TERADATA">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP1-TERADATA" CPE="cpe:/o:suse:sles:11:sp1:teradata">SUSE Linux Enterprise Server 11 SP1-TERADATA</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP2-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS" CPE="cpe:/o:suse:suse_sles_ltss:11:sp2">SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-31.5.3esr-0.3.1">
      <FullProductName ProductID="MozillaFirefox-31.5.3esr-0.3.1">MozillaFirefox-31.5.3esr-0.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-31.5.3esr-0.3.1">
      <FullProductName ProductID="MozillaFirefox-translations-31.5.3esr-0.3.1">MozillaFirefox-translations-31.5.3esr-0.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaFirefox-31.5.3esr-0.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP1-LTSS:MozillaFirefox-31.5.3esr-0.3.1">MozillaFirefox-31.5.3esr-0.3.1 as a component of SUSE Linux Enterprise Server 11 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-31.5.3esr-0.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP1-LTSS:MozillaFirefox-translations-31.5.3esr-0.3.1">MozillaFirefox-translations-31.5.3esr-0.3.1 as a component of SUSE Linux Enterprise Server 11 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-31.5.3esr-0.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP1-TERADATA">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP1-TERADATA:MozillaFirefox-31.5.3esr-0.3.1">MozillaFirefox-31.5.3esr-0.3.1 as a component of SUSE Linux Enterprise Server 11 SP1-TERADATA</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-31.5.3esr-0.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP1-TERADATA">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP1-TERADATA:MozillaFirefox-translations-31.5.3esr-0.3.1">MozillaFirefox-translations-31.5.3esr-0.3.1 as a component of SUSE Linux Enterprise Server 11 SP1-TERADATA</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-31.5.3esr-0.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-31.5.3esr-0.3.1">MozillaFirefox-31.5.3esr-0.3.1 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-31.5.3esr-0.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-translations-31.5.3esr-0.3.1">MozillaFirefox-translations-31.5.3esr-0.3.1 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The asm.js implementation in Mozilla Firefox before 36.0.3, Firefox ESR 31.x before 31.5.2, and SeaMonkey before 2.33.1 does not properly determine the cases in which bounds checking may be safely skipped during JIT compilation and heap access, which allows remote attackers to read or write to unintended memory locations, and consequently execute arbitrary code, via crafted JavaScript.</Note>
    </Notes>
    <CVE>CVE-2015-0817</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP1-LTSS:MozillaFirefox-31.5.3esr-0.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP1-LTSS:MozillaFirefox-translations-31.5.3esr-0.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP1-TERADATA:MozillaFirefox-31.5.3esr-0.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP1-TERADATA:MozillaFirefox-translations-31.5.3esr-0.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-31.5.3esr-0.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-translations-31.5.3esr-0.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150593-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0817.html</URL>
        <Description>CVE-2015-0817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/923495</URL>
        <Description>SUSE Bug 923495</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/923534</URL>
        <Description>SUSE Bug 923534</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before 36.0.4, Firefox ESR 31.x before 31.5.3, and SeaMonkey before 2.33.1 allow remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code with chrome privileges via vectors involving SVG hash navigation.</Note>
    </Notes>
    <CVE>CVE-2015-0818</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP1-LTSS:MozillaFirefox-31.5.3esr-0.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP1-LTSS:MozillaFirefox-translations-31.5.3esr-0.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP1-TERADATA:MozillaFirefox-31.5.3esr-0.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP1-TERADATA:MozillaFirefox-translations-31.5.3esr-0.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-31.5.3esr-0.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-translations-31.5.3esr-0.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150593-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0818.html</URL>
        <Description>CVE-2015-0818</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/923495</URL>
        <Description>SUSE Bug 923495</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/923534</URL>
        <Description>SUSE Bug 923534</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
