Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-5410 (GCVE-0-2017-5410)
Vulnerability from cvelistv5 – Published: 2018-06-11 21:00 – Updated: 2024-08-05 14:55- Memory corruption during JavaScript garbage collection incremental sweeping
| Vendor | Product | Version | |
|---|---|---|---|
| Mozilla | Firefox |
Affected:
unspecified , < 52
(custom)
|
|
| Mozilla | Firefox ESR |
Affected:
unspecified , < 45.8
(custom)
|
|
| Mozilla | Thunderbird |
Affected:
unspecified , < 52
(custom)
Affected: unspecified , < 45.8 (custom) |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T14:55:35.815Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "96693",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/96693"
},
{
"name": "RHSA-2017:0459",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2017-0459.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2017-09/"
},
{
"name": "DSA-3832",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "https://www.debian.org/security/2017/dsa-3832"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2017-07/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1330687"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2017-05/"
},
{
"name": "1037966",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1037966"
},
{
"name": "GLSA-201705-06",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/201705-06"
},
{
"name": "RHSA-2017:0461",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2017-0461.html"
},
{
"name": "DSA-3805",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "https://www.debian.org/security/2017/dsa-3805"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2017-06/"
},
{
"name": "RHSA-2017:0498",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2017-0498.html"
},
{
"name": "GLSA-201705-07",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/201705-07"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Firefox",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "52",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Firefox ESR",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "45.8",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "52",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"lessThan": "45.8",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"datePublic": "2017-03-07T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Memory corruption resulting in a potentially exploitable crash during garbage collection of JavaScript due errors in how incremental sweeping is managed for memory cleanup. This vulnerability affects Firefox \u003c 52, Firefox ESR \u003c 45.8, Thunderbird \u003c 52, and Thunderbird \u003c 45.8."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Memory corruption during JavaScript garbage collection incremental sweeping",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-06-12T09:57:01.000Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"name": "96693",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/96693"
},
{
"name": "RHSA-2017:0459",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2017-0459.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2017-09/"
},
{
"name": "DSA-3832",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "https://www.debian.org/security/2017/dsa-3832"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2017-07/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1330687"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2017-05/"
},
{
"name": "1037966",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1037966"
},
{
"name": "GLSA-201705-06",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/201705-06"
},
{
"name": "RHSA-2017:0461",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2017-0461.html"
},
{
"name": "DSA-3805",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "https://www.debian.org/security/2017/dsa-3805"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2017-06/"
},
{
"name": "RHSA-2017:0498",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2017-0498.html"
},
{
"name": "GLSA-201705-07",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/201705-07"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2017-5410",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Firefox",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "52"
}
]
}
},
{
"product_name": "Firefox ESR",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "45.8"
}
]
}
},
{
"product_name": "Thunderbird",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "52"
},
{
"version_affected": "\u003c",
"version_value": "45.8"
}
]
}
}
]
},
"vendor_name": "Mozilla"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Memory corruption resulting in a potentially exploitable crash during garbage collection of JavaScript due errors in how incremental sweeping is managed for memory cleanup. This vulnerability affects Firefox \u003c 52, Firefox ESR \u003c 45.8, Thunderbird \u003c 52, and Thunderbird \u003c 45.8."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Memory corruption during JavaScript garbage collection incremental sweeping"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "96693",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96693"
},
{
"name": "RHSA-2017:0459",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0459.html"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2017-09/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2017-09/"
},
{
"name": "DSA-3832",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2017/dsa-3832"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2017-07/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2017-07/"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1330687",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1330687"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2017-05/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2017-05/"
},
{
"name": "1037966",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037966"
},
{
"name": "GLSA-201705-06",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201705-06"
},
{
"name": "RHSA-2017:0461",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0461.html"
},
{
"name": "DSA-3805",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2017/dsa-3805"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2017-06/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2017-06/"
},
{
"name": "RHSA-2017:0498",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0498.html"
},
{
"name": "GLSA-201705-07",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201705-07"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2017-5410",
"datePublished": "2018-06-11T21:00:00.000Z",
"dateReserved": "2017-01-13T00:00:00.000Z",
"dateUpdated": "2024-08-05T14:55:35.815Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2017-5410",
"date": "2026-05-19",
"epss": "0.01677",
"percentile": "0.82373"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1D8B549B-E57B-4DFE-8A13-CAB06B5356B3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"142AD0DD-4CF3-4D74-9442-459CE3347E3A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"133AAFA7-AF42-4D7B-8822-AA2E85611BF5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33C068A4-3780-4EAB-A937-6082DF847564\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"54D669D4-6D7E-449D-80C1-28FA44F06FFE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BBCD86A-E6C7-4444-9D74-F861084090F0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51EF4996-72F4-4FA4-814F-F5991E7A8318\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"98381E61-F082-4302-B51F-5648884F998B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D99A687E-EAE6-417E-A88E-D0082BC194CD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A8442C20-41F9-47FD-9A12-E724D3A31FD7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9EC0D196-F7B8-4BDD-9050-779F7A7FBEE4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D0AC5CD5-6E58-433C-9EB3-6DFE5656463E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E5ED5807-55B7-47C5-97A6-03233F4FBC3A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"52.0\", \"matchCriteriaId\": \"6239EC26-A3A1-4FD4-B96F-F47B09C0CA00\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"45.8.0\", \"matchCriteriaId\": \"55EF46FB-6727-4FAC-943E-E5CC4F8CCBF7\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"45.8.0\", \"matchCriteriaId\": \"B87A8A50-E690-4827-B3BE-75B35A14E1D6\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Memory corruption resulting in a potentially exploitable crash during garbage collection of JavaScript due errors in how incremental sweeping is managed for memory cleanup. This vulnerability affects Firefox \u003c 52, Firefox ESR \u003c 45.8, Thunderbird \u003c 52, and Thunderbird \u003c 45.8.\"}, {\"lang\": \"es\", \"value\": \"Corrupci\\u00f3n de memoria que resulta en un cierre inesperado potencialmente explotable durante la recolecci\\u00f3n de elementos JavaScript no utilizados debido a errores en la forma en la que se gestiona el rastreo incremental para la limpieza de memoria. La vulnerabilidad afecta a Firefox en versiones anteriores a la 52, Firefox ESR en versiones anteriores a la 45.8, Thunderbird en versiones anteriores a la 52 y Thunderbird en versiones anteriores a la 45.8.\"}]",
"id": "CVE-2017-5410",
"lastModified": "2024-11-21T03:27:34.150",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 7.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2018-06-11T21:29:04.593",
"references": "[{\"url\": \"http://rhn.redhat.com/errata/RHSA-2017-0459.html\", \"source\": \"security@mozilla.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2017-0461.html\", \"source\": \"security@mozilla.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2017-0498.html\", \"source\": \"security@mozilla.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/96693\", \"source\": \"security@mozilla.org\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1037966\", \"source\": \"security@mozilla.org\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=1330687\", \"source\": \"security@mozilla.org\", \"tags\": [\"Exploit\", \"Issue Tracking\", \"Vendor Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/201705-06\", \"source\": \"security@mozilla.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/201705-07\", \"source\": \"security@mozilla.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2017/dsa-3805\", \"source\": \"security@mozilla.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2017/dsa-3832\", \"source\": \"security@mozilla.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2017-05/\", \"source\": \"security@mozilla.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2017-06/\", \"source\": \"security@mozilla.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2017-07/\", \"source\": \"security@mozilla.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2017-09/\", \"source\": \"security@mozilla.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2017-0459.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2017-0461.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2017-0498.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/96693\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1037966\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=1330687\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Issue Tracking\", \"Vendor Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/201705-06\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/201705-07\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2017/dsa-3805\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2017/dsa-3832\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2017-05/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2017-06/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2017-07/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2017-09/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "security@mozilla.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-119\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2017-5410\",\"sourceIdentifier\":\"security@mozilla.org\",\"published\":\"2018-06-11T21:29:04.593\",\"lastModified\":\"2025-11-25T17:50:16.803\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Memory corruption resulting in a potentially exploitable crash during garbage collection of JavaScript due errors in how incremental sweeping is managed for memory cleanup. This vulnerability affects Firefox \u003c 52, Firefox ESR \u003c 45.8, Thunderbird \u003c 52, and Thunderbird \u003c 45.8.\"},{\"lang\":\"es\",\"value\":\"Corrupci\u00f3n de memoria que resulta en un cierre inesperado potencialmente explotable durante la recolecci\u00f3n de elementos JavaScript no utilizados debido a errores en la forma en la que se gestiona el rastreo incremental para la limpieza de memoria. La vulnerabilidad afecta a Firefox en versiones anteriores a la 52, Firefox ESR en versiones anteriores a la 45.8, Thunderbird en versiones anteriores a la 52 y Thunderbird en versiones anteriores a la 45.8.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D8B549B-E57B-4DFE-8A13-CAB06B5356B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142AD0DD-4CF3-4D74-9442-459CE3347E3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"133AAFA7-AF42-4D7B-8822-AA2E85611BF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C068A4-3780-4EAB-A937-6082DF847564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54D669D4-6D7E-449D-80C1-28FA44F06FFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BBCD86A-E6C7-4444-9D74-F861084090F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98381E61-F082-4302-B51F-5648884F998B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D99A687E-EAE6-417E-A88E-D0082BC194CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8442C20-41F9-47FD-9A12-E724D3A31FD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EC0D196-F7B8-4BDD-9050-779F7A7FBEE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0AC5CD5-6E58-433C-9EB3-6DFE5656463E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5ED5807-55B7-47C5-97A6-03233F4FBC3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"52.0\",\"matchCriteriaId\":\"6239EC26-A3A1-4FD4-B96F-F47B09C0CA00\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"45.8.0\",\"matchCriteriaId\":\"69A5372D-81B4-48BF-81DD-2C6604C253AB\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"45.8.0\",\"matchCriteriaId\":\"B87A8A50-E690-4827-B3BE-75B35A14E1D6\"}]}]}],\"references\":[{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-0459.html\",\"source\":\"security@mozilla.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-0461.html\",\"source\":\"security@mozilla.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-0498.html\",\"source\":\"security@mozilla.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/96693\",\"source\":\"security@mozilla.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1037966\",\"source\":\"security@mozilla.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=1330687\",\"source\":\"security@mozilla.org\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201705-06\",\"source\":\"security@mozilla.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201705-07\",\"source\":\"security@mozilla.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2017/dsa-3805\",\"source\":\"security@mozilla.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2017/dsa-3832\",\"source\":\"security@mozilla.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2017-05/\",\"source\":\"security@mozilla.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2017-06/\",\"source\":\"security@mozilla.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2017-07/\",\"source\":\"security@mozilla.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2017-09/\",\"source\":\"security@mozilla.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-0459.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-0461.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-0498.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/96693\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1037966\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=1330687\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201705-06\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201705-07\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2017/dsa-3805\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2017/dsa-3832\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2017-05/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2017-06/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2017-07/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2017-09/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
CERTFR-2017-AVI-068
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans Mozilla Thunderbird. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Thunderbird versions antérieures à 45.8
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eThunderbird versions ant\u00e9rieures \u00e0 45.8\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-5405",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5405"
},
{
"name": "CVE-2017-5398",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5398"
},
{
"name": "CVE-2017-5408",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5408"
},
{
"name": "CVE-2017-5410",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5410"
},
{
"name": "CVE-2017-5401",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5401"
},
{
"name": "CVE-2017-5400",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5400"
},
{
"name": "CVE-2017-5407",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5407"
},
{
"name": "CVE-2017-5402",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5402"
},
{
"name": "CVE-2017-5404",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5404"
}
],
"links": [],
"reference": "CERTFR-2017-AVI-068",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2017-03-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eMozilla Thunderbird\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et un contournement de la\npolitique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mozilla Thunderbird",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2017-07 du 07 mars 2017",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-07/"
}
]
}
CERTFR-2017-AVI-069
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans Mozilla Firefox. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Firefox versions ant\u00e9rieures \u00e0 52",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox ESR versions ant\u00e9rieures \u00e0 45.8",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-5405",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5405"
},
{
"name": "CVE-2017-5427",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5427"
},
{
"name": "CVE-2017-5398",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5398"
},
{
"name": "CVE-2017-5399",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5399"
},
{
"name": "CVE-2017-5409",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5409"
},
{
"name": "CVE-2017-5412",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5412"
},
{
"name": "CVE-2017-5420",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5420"
},
{
"name": "CVE-2017-5419",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5419"
},
{
"name": "CVE-2017-5403",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5403"
},
{
"name": "CVE-2017-5408",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5408"
},
{
"name": "CVE-2017-5410",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5410"
},
{
"name": "CVE-2017-5401",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5401"
},
{
"name": "CVE-2017-5418",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5418"
},
{
"name": "CVE-2017-5406",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5406"
},
{
"name": "CVE-2017-5426",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5426"
},
{
"name": "CVE-2017-5400",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5400"
},
{
"name": "CVE-2017-5422",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5422"
},
{
"name": "CVE-2017-5415",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5415"
},
{
"name": "CVE-2017-5417",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5417"
},
{
"name": "CVE-2017-5425",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5425"
},
{
"name": "CVE-2017-5407",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5407"
},
{
"name": "CVE-2017-5413",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5413"
},
{
"name": "CVE-2017-5411",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5411"
},
{
"name": "CVE-2017-5416",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5416"
},
{
"name": "CVE-2017-5402",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5402"
},
{
"name": "CVE-2017-5421",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5421"
},
{
"name": "CVE-2017-5404",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5404"
},
{
"name": "CVE-2017-5414",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5414"
}
],
"links": [],
"reference": "CERTFR-2017-AVI-069",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2017-03-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eMozilla Firefox\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et un contournement de la\npolitique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mozilla Firefox",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2017-06 du 07 mars 2017",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-06/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2017-05 du 07 mars 2017",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-05/"
}
]
}
CERTFR-2017-AVI-068
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans Mozilla Thunderbird. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Thunderbird versions antérieures à 45.8
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eThunderbird versions ant\u00e9rieures \u00e0 45.8\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-5405",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5405"
},
{
"name": "CVE-2017-5398",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5398"
},
{
"name": "CVE-2017-5408",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5408"
},
{
"name": "CVE-2017-5410",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5410"
},
{
"name": "CVE-2017-5401",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5401"
},
{
"name": "CVE-2017-5400",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5400"
},
{
"name": "CVE-2017-5407",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5407"
},
{
"name": "CVE-2017-5402",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5402"
},
{
"name": "CVE-2017-5404",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5404"
}
],
"links": [],
"reference": "CERTFR-2017-AVI-068",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2017-03-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eMozilla Thunderbird\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et un contournement de la\npolitique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mozilla Thunderbird",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2017-07 du 07 mars 2017",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-07/"
}
]
}
CERTFR-2017-AVI-069
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans Mozilla Firefox. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Firefox versions ant\u00e9rieures \u00e0 52",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox ESR versions ant\u00e9rieures \u00e0 45.8",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-5405",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5405"
},
{
"name": "CVE-2017-5427",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5427"
},
{
"name": "CVE-2017-5398",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5398"
},
{
"name": "CVE-2017-5399",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5399"
},
{
"name": "CVE-2017-5409",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5409"
},
{
"name": "CVE-2017-5412",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5412"
},
{
"name": "CVE-2017-5420",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5420"
},
{
"name": "CVE-2017-5419",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5419"
},
{
"name": "CVE-2017-5403",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5403"
},
{
"name": "CVE-2017-5408",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5408"
},
{
"name": "CVE-2017-5410",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5410"
},
{
"name": "CVE-2017-5401",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5401"
},
{
"name": "CVE-2017-5418",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5418"
},
{
"name": "CVE-2017-5406",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5406"
},
{
"name": "CVE-2017-5426",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5426"
},
{
"name": "CVE-2017-5400",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5400"
},
{
"name": "CVE-2017-5422",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5422"
},
{
"name": "CVE-2017-5415",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5415"
},
{
"name": "CVE-2017-5417",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5417"
},
{
"name": "CVE-2017-5425",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5425"
},
{
"name": "CVE-2017-5407",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5407"
},
{
"name": "CVE-2017-5413",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5413"
},
{
"name": "CVE-2017-5411",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5411"
},
{
"name": "CVE-2017-5416",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5416"
},
{
"name": "CVE-2017-5402",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5402"
},
{
"name": "CVE-2017-5421",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5421"
},
{
"name": "CVE-2017-5404",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5404"
},
{
"name": "CVE-2017-5414",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5414"
}
],
"links": [],
"reference": "CERTFR-2017-AVI-069",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2017-03-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eMozilla Firefox\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et un contournement de la\npolitique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mozilla Firefox",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2017-06 du 07 mars 2017",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-06/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2017-05 du 07 mars 2017",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-05/"
}
]
}
CNVD-2017-04251
Vulnerability from cnvd - Published: 2017-04-11厂商已发布了漏洞修复程序,请及时关注更新: https://www.mozilla.org/en-US/security/advisories/mfsa2017-05/
| Name | ['Mozilla Firefox <52', 'Mozilla Firefox ESR <45.8', 'Mozilla Thunderbird <45.8'] |
|---|
{
"bids": {
"bid": {
"bidNumber": "96693"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2017-5410"
}
},
"description": "Mozilla Firefox\u662f\u7f8e\u56fdMozilla\u57fa\u91d1\u4f1a\u5f00\u53d1\u7684\u4e00\u6b3e\u5f00\u6e90Web\u6d4f\u89c8\u5668\u3002Thunderbird\u662f\u7531Mozilla\u6d4f\u89c8\u5668\u7684\u90ae\u4ef6\u529f\u80fd\u90e8\u4ef6\u6240\u6539\u9020\u7684\u90ae\u4ef6\u5de5\u5177\u3002 \r\n\r\nMozilla Firefox/Thunderbird\u5b58\u5728\u591a\u4e2a\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u6f0f\u6d1e\u7ed5\u8fc7\u5b89\u5168\u9650\u5236\uff0c\u6267\u884c\u672a\u7ecf\u6388\u6743\u7684\u64cd\u4f5c\uff0c\u83b7\u53d6\u654f\u611f\u4fe1\u606f\u3002\u5931\u8d25\u7684\u5229\u7528\u5c1d\u8bd5\u53ef\u80fd\u4f1a\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u6761\u4ef6\u3002",
"discovererName": "Jerri Rice",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2017-05/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2017-04251",
"openTime": "2017-04-11",
"patchDescription": "Mozilla Firefox\u662f\u7f8e\u56fdMozilla\u57fa\u91d1\u4f1a\u5f00\u53d1\u7684\u4e00\u6b3e\u5f00\u6e90Web\u6d4f\u89c8\u5668\u3002Thunderbird\u662f\u7531Mozilla\u6d4f\u89c8\u5668\u7684\u90ae\u4ef6\u529f\u80fd\u90e8\u4ef6\u6240\u6539\u9020\u7684\u90ae\u4ef6\u5de5\u5177\u3002 \r\n\r\nMozilla Firefox/Thunderbird\u5b58\u5728\u591a\u4e2a\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u6f0f\u6d1e\u7ed5\u8fc7\u5b89\u5168\u9650\u5236\uff0c\u6267\u884c\u672a\u7ecf\u6388\u6743\u7684\u64cd\u4f5c\uff0c\u83b7\u53d6\u654f\u611f\u4fe1\u606f\u3002\u5931\u8d25\u7684\u5229\u7528\u5c1d\u8bd5\u53ef\u80fd\u4f1a\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u6761\u4ef6\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Mozilla Firefox/Thunderbird\u5b58\u5728\u591a\u4e2a\u6f0f\u6d1e\uff08CNVD-2017-04251\uff09\u7684\u8865\u4e01",
"products": {
"product": [
"Mozilla Firefox \u003c52",
"Mozilla Firefox ESR \u003c45.8",
"Mozilla Thunderbird \u003c45.8"
]
},
"referenceLink": "http://www.securityfocus.com/bid/96693",
"serverity": "\u9ad8",
"submitTime": "2017-03-16",
"title": "Mozilla Firefox/Thunderbird\u5b58\u5728\u591a\u4e2a\u6f0f\u6d1e\uff08CNVD-2017-04251\uff09"
}
FKIE_CVE-2017-5410
Vulnerability from fkie_nvd - Published: 2018-06-11 21:29 - Updated: 2025-11-25 17:50{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1D8B549B-E57B-4DFE-8A13-CAB06B5356B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "133AAFA7-AF42-4D7B-8822-AA2E85611BF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "54D669D4-6D7E-449D-80C1-28FA44F06FFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "98381E61-F082-4302-B51F-5648884F998B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D99A687E-EAE6-417E-A88E-D0082BC194CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A8442C20-41F9-47FD-9A12-E724D3A31FD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9EC0D196-F7B8-4BDD-9050-779F7A7FBEE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D0AC5CD5-6E58-433C-9EB3-6DFE5656463E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6239EC26-A3A1-4FD4-B96F-F47B09C0CA00",
"versionEndExcluding": "52.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"matchCriteriaId": "69A5372D-81B4-48BF-81DD-2C6604C253AB",
"versionEndExcluding": "45.8.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B87A8A50-E690-4827-B3BE-75B35A14E1D6",
"versionEndExcluding": "45.8.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption resulting in a potentially exploitable crash during garbage collection of JavaScript due errors in how incremental sweeping is managed for memory cleanup. This vulnerability affects Firefox \u003c 52, Firefox ESR \u003c 45.8, Thunderbird \u003c 52, and Thunderbird \u003c 45.8."
},
{
"lang": "es",
"value": "Corrupci\u00f3n de memoria que resulta en un cierre inesperado potencialmente explotable durante la recolecci\u00f3n de elementos JavaScript no utilizados debido a errores en la forma en la que se gestiona el rastreo incremental para la limpieza de memoria. La vulnerabilidad afecta a Firefox en versiones anteriores a la 52, Firefox ESR en versiones anteriores a la 45.8, Thunderbird en versiones anteriores a la 52 y Thunderbird en versiones anteriores a la 45.8."
}
],
"id": "CVE-2017-5410",
"lastModified": "2025-11-25T17:50:16.803",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-06-11T21:29:04.593",
"references": [
{
"source": "security@mozilla.org",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2017-0459.html"
},
{
"source": "security@mozilla.org",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2017-0461.html"
},
{
"source": "security@mozilla.org",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2017-0498.html"
},
{
"source": "security@mozilla.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/96693"
},
{
"source": "security@mozilla.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1037966"
},
{
"source": "security@mozilla.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1330687"
},
{
"source": "security@mozilla.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201705-06"
},
{
"source": "security@mozilla.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201705-07"
},
{
"source": "security@mozilla.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2017/dsa-3805"
},
{
"source": "security@mozilla.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2017/dsa-3832"
},
{
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2017-05/"
},
{
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2017-06/"
},
{
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2017-07/"
},
{
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2017-09/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2017-0459.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2017-0461.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2017-0498.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/96693"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1037966"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1330687"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201705-06"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201705-07"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2017/dsa-3805"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2017/dsa-3832"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2017-05/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2017-06/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2017-07/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2017-09/"
}
],
"sourceIdentifier": "security@mozilla.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-RCWJ-H3FP-5W66
Vulnerability from github – Published: 2022-05-14 03:09 – Updated: 2025-11-25 18:32Memory corruption resulting in a potentially exploitable crash during garbage collection of JavaScript due errors in how incremental sweeping is managed for memory cleanup. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8.
{
"affected": [],
"aliases": [
"CVE-2017-5410"
],
"database_specific": {
"cwe_ids": [
"CWE-119"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2018-06-11T21:29:00Z",
"severity": "CRITICAL"
},
"details": "Memory corruption resulting in a potentially exploitable crash during garbage collection of JavaScript due errors in how incremental sweeping is managed for memory cleanup. This vulnerability affects Firefox \u003c 52, Firefox ESR \u003c 45.8, Thunderbird \u003c 52, and Thunderbird \u003c 45.8.",
"id": "GHSA-rcwj-h3fp-5w66",
"modified": "2025-11-25T18:32:07Z",
"published": "2022-05-14T03:09:40Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5410"
},
{
"type": "WEB",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1330687"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/201705-06"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/201705-07"
},
{
"type": "WEB",
"url": "https://www.debian.org/security/2017/dsa-3805"
},
{
"type": "WEB",
"url": "https://www.debian.org/security/2017/dsa-3832"
},
{
"type": "WEB",
"url": "https://www.mozilla.org/security/advisories/mfsa2017-05"
},
{
"type": "WEB",
"url": "https://www.mozilla.org/security/advisories/mfsa2017-06"
},
{
"type": "WEB",
"url": "https://www.mozilla.org/security/advisories/mfsa2017-07"
},
{
"type": "WEB",
"url": "https://www.mozilla.org/security/advisories/mfsa2017-09"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0459.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0461.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0498.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/96693"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id/1037966"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
GSD-2017-5410
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2017-5410",
"description": "Memory corruption resulting in a potentially exploitable crash during garbage collection of JavaScript due errors in how incremental sweeping is managed for memory cleanup. This vulnerability affects Firefox \u003c 52, Firefox ESR \u003c 45.8, Thunderbird \u003c 52, and Thunderbird \u003c 45.8.",
"id": "GSD-2017-5410",
"references": [
"https://www.suse.com/security/cve/CVE-2017-5410.html",
"https://www.debian.org/security/2017/dsa-3832",
"https://www.debian.org/security/2017/dsa-3805",
"https://access.redhat.com/errata/RHSA-2017:0498",
"https://access.redhat.com/errata/RHSA-2017:0461",
"https://access.redhat.com/errata/RHSA-2017:0459",
"https://ubuntu.com/security/CVE-2017-5410",
"https://advisories.mageia.org/CVE-2017-5410.html",
"https://security.archlinux.org/CVE-2017-5410",
"https://linux.oracle.com/cve/CVE-2017-5410.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2017-5410"
],
"details": "Memory corruption resulting in a potentially exploitable crash during garbage collection of JavaScript due errors in how incremental sweeping is managed for memory cleanup. This vulnerability affects Firefox \u003c 52, Firefox ESR \u003c 45.8, Thunderbird \u003c 52, and Thunderbird \u003c 45.8.",
"id": "GSD-2017-5410",
"modified": "2023-12-13T01:21:13.371930Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2017-5410",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Firefox",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "52"
}
]
}
},
{
"product_name": "Firefox ESR",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "45.8"
}
]
}
},
{
"product_name": "Thunderbird",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "52"
},
{
"version_affected": "\u003c",
"version_value": "45.8"
}
]
}
}
]
},
"vendor_name": "Mozilla"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Memory corruption resulting in a potentially exploitable crash during garbage collection of JavaScript due errors in how incremental sweeping is managed for memory cleanup. This vulnerability affects Firefox \u003c 52, Firefox ESR \u003c 45.8, Thunderbird \u003c 52, and Thunderbird \u003c 45.8."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Memory corruption during JavaScript garbage collection incremental sweeping"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "96693",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96693"
},
{
"name": "RHSA-2017:0459",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0459.html"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2017-09/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2017-09/"
},
{
"name": "DSA-3832",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2017/dsa-3832"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2017-07/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2017-07/"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1330687",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1330687"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2017-05/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2017-05/"
},
{
"name": "1037966",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037966"
},
{
"name": "GLSA-201705-06",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201705-06"
},
{
"name": "RHSA-2017:0461",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0461.html"
},
{
"name": "DSA-3805",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2017/dsa-3805"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2017-06/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2017-06/"
},
{
"name": "RHSA-2017:0498",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0498.html"
},
{
"name": "GLSA-201705-07",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201705-07"
}
]
}
},
"mozilla.org": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2017-5410"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Thunderbird",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "45.8"
},
{
"version_affected": "\u003c",
"version_value": "52"
}
]
}
},
{
"product_name": "Firefox",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "52"
}
]
}
},
{
"product_name": "Firefox ESR",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "45.8"
}
]
}
}
]
},
"vendor_name": "Mozilla"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Memory corruption resulting in a potentially exploitable crash during garbage collection of JavaScript due errors in how incremental sweeping is managed for memory cleanup. This vulnerability affects Thunderbird \u003c 45.8, Thunderbird \u003c 52, Firefox \u003c 52, and Firefox ESR \u003c 45.8."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Memory corruption during JavaScript garbage collection incremental sweeping"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.mozilla.org/security/advisories/mfsa2017-07/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2017-09/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2017-05/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2017-06/"
},
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1330687"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "52.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "45.8.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "45.8.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2017-5410"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Memory corruption resulting in a potentially exploitable crash during garbage collection of JavaScript due errors in how incremental sweeping is managed for memory cleanup. This vulnerability affects Firefox \u003c 52, Firefox ESR \u003c 45.8, Thunderbird \u003c 52, and Thunderbird \u003c 45.8."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.mozilla.org/security/advisories/mfsa2017-09/",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2017-09/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2017-07/",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2017-07/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2017-06/",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2017-06/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2017-05/",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2017-05/"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1330687",
"refsource": "CONFIRM",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1330687"
},
{
"name": "DSA-3832",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2017/dsa-3832"
},
{
"name": "DSA-3805",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2017/dsa-3805"
},
{
"name": "GLSA-201705-07",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201705-07"
},
{
"name": "GLSA-201705-06",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201705-06"
},
{
"name": "1037966",
"refsource": "SECTRACK",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1037966"
},
{
"name": "96693",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/96693"
},
{
"name": "RHSA-2017:0498",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2017-0498.html"
},
{
"name": "RHSA-2017:0461",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2017-0461.html"
},
{
"name": "RHSA-2017:0459",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2017-0459.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
},
"lastModifiedDate": "2018-08-07T13:20Z",
"publishedDate": "2018-06-11T21:29Z"
}
}
}
OPENSUSE-SU-2017:0687-1
Vulnerability from csaf_opensuse - Published: 2017-03-14 14:03 - Updated: 2017-03-14 14:03| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for MozillaThunderbird",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update to Mozilla Thunderbird 45.8.0 fixes security issues and bugs.\n\nThe following security issues from advisory MFSA 2017-07 were fixed. (boo#1028391)\nIn general, these flaws cannot be exploited through email in\nThunderbird because scripting is disabled when reading mail,\nbut are potentially risks in browser or browser-like contexts:\n\n- CVE-2017-5400: asm.js JIT-spray bypass of ASLR and DEP\n- CVE-2017-5401: Memory Corruption when handling ErrorResult\n- CVE-2017-5402: Use-after-free working with events in FontFace objects (bmo#1334876)\n- CVE-2017-5404: Use-after-free working with ranges in selections\n- CVE-2017-5407: Pixel and history stealing via floating-point timing side channel with SVG filters\n- CVE-2017-5410: Memory corruption during JavaScript garbage collection incremental sweeping\n- CVE-2017-5408: Cross-origin reading of video captions in violation of CORS\n- CVE-2017-5405: FTP response codes can cause use of uninitialized values for ports (bmo#1336699)\n- CVE-2017-5398: Memory safety bugs fixed in Thunderbird 45.8\n\nThe following non-security issues were fixed:\n\n- crash when viewing certain IMAP messages\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2017-345",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2017_0687-1.json"
},
{
"category": "self",
"summary": "SUSE Bug 1028391",
"url": "https://bugzilla.suse.com/1028391"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5398 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5398/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5400 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5400/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5401 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5401/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5402 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5402/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5404 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5404/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5405 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5405/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5407 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5407/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5408 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5408/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5410 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5410/"
}
],
"title": "Security update for MozillaThunderbird",
"tracking": {
"current_release_date": "2017-03-14T14:03:02Z",
"generator": {
"date": "2017-03-14T14:03:02Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2017:0687-1",
"initial_release_date": "2017-03-14T14:03:02Z",
"revision_history": [
{
"date": "2017-03-14T14:03:02Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "MozillaThunderbird-45.8.0-27.1.aarch64",
"product": {
"name": "MozillaThunderbird-45.8.0-27.1.aarch64",
"product_id": "MozillaThunderbird-45.8.0-27.1.aarch64"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"product": {
"name": "MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"product_id": "MozillaThunderbird-devel-45.8.0-27.1.aarch64"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"product": {
"name": "MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"product_id": "MozillaThunderbird-translations-common-45.8.0-27.1.aarch64"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"product": {
"name": "MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"product_id": "MozillaThunderbird-translations-other-45.8.0-27.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "MozillaThunderbird-45.8.0-27.1.s390x",
"product": {
"name": "MozillaThunderbird-45.8.0-27.1.s390x",
"product_id": "MozillaThunderbird-45.8.0-27.1.s390x"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-devel-45.8.0-27.1.s390x",
"product": {
"name": "MozillaThunderbird-devel-45.8.0-27.1.s390x",
"product_id": "MozillaThunderbird-devel-45.8.0-27.1.s390x"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"product": {
"name": "MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"product_id": "MozillaThunderbird-translations-common-45.8.0-27.1.s390x"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"product": {
"name": "MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"product_id": "MozillaThunderbird-translations-other-45.8.0-27.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "MozillaThunderbird-45.8.0-27.1.x86_64",
"product": {
"name": "MozillaThunderbird-45.8.0-27.1.x86_64",
"product_id": "MozillaThunderbird-45.8.0-27.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"product": {
"name": "MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"product_id": "MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"product": {
"name": "MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"product_id": "MozillaThunderbird-devel-45.8.0-27.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"product": {
"name": "MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"product_id": "MozillaThunderbird-translations-common-45.8.0-27.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-translations-other-45.8.0-27.1.x86_64",
"product": {
"name": "MozillaThunderbird-translations-other-45.8.0-27.1.x86_64",
"product_id": "MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Package Hub 12",
"product": {
"name": "SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:packagehub:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-45.8.0-27.1.aarch64 as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64"
},
"product_reference": "MozillaThunderbird-45.8.0-27.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-45.8.0-27.1.s390x as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x"
},
"product_reference": "MozillaThunderbird-45.8.0-27.1.s390x",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-45.8.0-27.1.x86_64 as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64"
},
"product_reference": "MozillaThunderbird-45.8.0-27.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64 as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64"
},
"product_reference": "MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-devel-45.8.0-27.1.aarch64 as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64"
},
"product_reference": "MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-devel-45.8.0-27.1.s390x as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x"
},
"product_reference": "MozillaThunderbird-devel-45.8.0-27.1.s390x",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-devel-45.8.0-27.1.x86_64 as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64"
},
"product_reference": "MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-translations-common-45.8.0-27.1.aarch64 as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64"
},
"product_reference": "MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-translations-common-45.8.0-27.1.s390x as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x"
},
"product_reference": "MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-translations-common-45.8.0-27.1.x86_64 as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64"
},
"product_reference": "MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-translations-other-45.8.0-27.1.aarch64 as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64"
},
"product_reference": "MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-translations-other-45.8.0-27.1.s390x as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x"
},
"product_reference": "MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-translations-other-45.8.0-27.1.x86_64 as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
},
"product_reference": "MozillaThunderbird-translations-other-45.8.0-27.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5398",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5398"
}
],
"notes": [
{
"category": "general",
"text": "Memory safety bugs were reported in Thunderbird 45.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 52, Firefox ESR \u003c 45.8, Thunderbird \u003c 52, and Thunderbird \u003c 45.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5398",
"url": "https://www.suse.com/security/cve/CVE-2017-5398"
},
{
"category": "external",
"summary": "SUSE Bug 1028391 for CVE-2017-5398",
"url": "https://bugzilla.suse.com/1028391"
},
{
"category": "external",
"summary": "SUSE Bug 1028393 for CVE-2017-5398",
"url": "https://bugzilla.suse.com/1028393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-14T14:03:02Z",
"details": "moderate"
}
],
"title": "CVE-2017-5398"
},
{
"cve": "CVE-2017-5400",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5400"
}
],
"notes": [
{
"category": "general",
"text": "JIT-spray targeting asm.js combined with a heap spray allows for a bypass of ASLR and DEP protections leading to potential memory corruption attacks. This vulnerability affects Firefox \u003c 52, Firefox ESR \u003c 45.8, Thunderbird \u003c 52, and Thunderbird \u003c 45.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5400",
"url": "https://www.suse.com/security/cve/CVE-2017-5400"
},
{
"category": "external",
"summary": "SUSE Bug 1028391 for CVE-2017-5400",
"url": "https://bugzilla.suse.com/1028391"
},
{
"category": "external",
"summary": "SUSE Bug 1028393 for CVE-2017-5400",
"url": "https://bugzilla.suse.com/1028393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-14T14:03:02Z",
"details": "moderate"
}
],
"title": "CVE-2017-5400"
},
{
"cve": "CVE-2017-5401",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5401"
}
],
"notes": [
{
"category": "general",
"text": "A crash triggerable by web content in which an \"ErrorResult\" references unassigned memory due to a logic error. The resulting crash may be exploitable. This vulnerability affects Firefox \u003c 52, Firefox ESR \u003c 45.8, Thunderbird \u003c 52, and Thunderbird \u003c 45.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5401",
"url": "https://www.suse.com/security/cve/CVE-2017-5401"
},
{
"category": "external",
"summary": "SUSE Bug 1028391 for CVE-2017-5401",
"url": "https://bugzilla.suse.com/1028391"
},
{
"category": "external",
"summary": "SUSE Bug 1028393 for CVE-2017-5401",
"url": "https://bugzilla.suse.com/1028393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-14T14:03:02Z",
"details": "moderate"
}
],
"title": "CVE-2017-5401"
},
{
"cve": "CVE-2017-5402",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5402"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free can occur when events are fired for a \"FontFace\" object after the object has been already been destroyed while working with fonts. This results in a potentially exploitable crash. This vulnerability affects Firefox \u003c 52, Firefox ESR \u003c 45.8, Thunderbird \u003c 52, and Thunderbird \u003c 45.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5402",
"url": "https://www.suse.com/security/cve/CVE-2017-5402"
},
{
"category": "external",
"summary": "SUSE Bug 1028391 for CVE-2017-5402",
"url": "https://bugzilla.suse.com/1028391"
},
{
"category": "external",
"summary": "SUSE Bug 1028393 for CVE-2017-5402",
"url": "https://bugzilla.suse.com/1028393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-14T14:03:02Z",
"details": "moderate"
}
],
"title": "CVE-2017-5402"
},
{
"cve": "CVE-2017-5404",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5404"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free error can occur when manipulating ranges in selections with one node inside a native anonymous tree and one node outside of it. This results in a potentially exploitable crash. This vulnerability affects Firefox \u003c 52, Firefox ESR \u003c 45.8, Thunderbird \u003c 52, and Thunderbird \u003c 45.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5404",
"url": "https://www.suse.com/security/cve/CVE-2017-5404"
},
{
"category": "external",
"summary": "SUSE Bug 1028391 for CVE-2017-5404",
"url": "https://bugzilla.suse.com/1028391"
},
{
"category": "external",
"summary": "SUSE Bug 1028393 for CVE-2017-5404",
"url": "https://bugzilla.suse.com/1028393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-14T14:03:02Z",
"details": "moderate"
}
],
"title": "CVE-2017-5404"
},
{
"cve": "CVE-2017-5405",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5405"
}
],
"notes": [
{
"category": "general",
"text": "Certain response codes in FTP connections can result in the use of uninitialized values for ports in FTP operations. This vulnerability affects Firefox \u003c 52, Firefox ESR \u003c 45.8, Thunderbird \u003c 52, and Thunderbird \u003c 45.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5405",
"url": "https://www.suse.com/security/cve/CVE-2017-5405"
},
{
"category": "external",
"summary": "SUSE Bug 1028391 for CVE-2017-5405",
"url": "https://bugzilla.suse.com/1028391"
},
{
"category": "external",
"summary": "SUSE Bug 1028393 for CVE-2017-5405",
"url": "https://bugzilla.suse.com/1028393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-14T14:03:02Z",
"details": "moderate"
}
],
"title": "CVE-2017-5405"
},
{
"cve": "CVE-2017-5407",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5407"
}
],
"notes": [
{
"category": "general",
"text": "Using SVG filters that don\u0027t use the fixed point math implementation on a target iframe, a malicious page can extract pixel values from a targeted user. This can be used to extract history information and read text values across domains. This violates same-origin policy and leads to information disclosure. This vulnerability affects Firefox \u003c 52, Firefox ESR \u003c 45.8, Thunderbird \u003c 52, and Thunderbird \u003c 45.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5407",
"url": "https://www.suse.com/security/cve/CVE-2017-5407"
},
{
"category": "external",
"summary": "SUSE Bug 1028391 for CVE-2017-5407",
"url": "https://bugzilla.suse.com/1028391"
},
{
"category": "external",
"summary": "SUSE Bug 1028393 for CVE-2017-5407",
"url": "https://bugzilla.suse.com/1028393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-14T14:03:02Z",
"details": "moderate"
}
],
"title": "CVE-2017-5407"
},
{
"cve": "CVE-2017-5408",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5408"
}
],
"notes": [
{
"category": "general",
"text": "Video files loaded video captions cross-origin without checking for the presence of CORS headers permitting such cross-origin use, leading to potential information disclosure for video captions. This vulnerability affects Firefox \u003c 52, Firefox ESR \u003c 45.8, Thunderbird \u003c 52, and Thunderbird \u003c 45.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5408",
"url": "https://www.suse.com/security/cve/CVE-2017-5408"
},
{
"category": "external",
"summary": "SUSE Bug 1028391 for CVE-2017-5408",
"url": "https://bugzilla.suse.com/1028391"
},
{
"category": "external",
"summary": "SUSE Bug 1028393 for CVE-2017-5408",
"url": "https://bugzilla.suse.com/1028393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-14T14:03:02Z",
"details": "moderate"
}
],
"title": "CVE-2017-5408"
},
{
"cve": "CVE-2017-5410",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5410"
}
],
"notes": [
{
"category": "general",
"text": "Memory corruption resulting in a potentially exploitable crash during garbage collection of JavaScript due errors in how incremental sweeping is managed for memory cleanup. This vulnerability affects Firefox \u003c 52, Firefox ESR \u003c 45.8, Thunderbird \u003c 52, and Thunderbird \u003c 45.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5410",
"url": "https://www.suse.com/security/cve/CVE-2017-5410"
},
{
"category": "external",
"summary": "SUSE Bug 1028391 for CVE-2017-5410",
"url": "https://bugzilla.suse.com/1028391"
},
{
"category": "external",
"summary": "SUSE Bug 1028393 for CVE-2017-5410",
"url": "https://bugzilla.suse.com/1028393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-14T14:03:02Z",
"details": "moderate"
}
],
"title": "CVE-2017-5410"
}
]
}
OPENSUSE-SU-2017:0688-1
Vulnerability from csaf_opensuse - Published: 2017-03-14 14:03 - Updated: 2017-03-14 14:03| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for MozillaThunderbird",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update to Mozilla Thunderbird 45.8.0 fixes security issues and bugs.\n\nThe following security issues from advisory MFSA 2017-07 were fixed. (boo#1028391)\nIn general, these flaws cannot be exploited through email in\nThunderbird because scripting is disabled when reading mail,\nbut are potentially risks in browser or browser-like contexts:\n\n- CVE-2017-5400: asm.js JIT-spray bypass of ASLR and DEP\n- CVE-2017-5401: Memory Corruption when handling ErrorResult\n- CVE-2017-5402: Use-after-free working with events in FontFace objects (bmo#1334876)\n- CVE-2017-5404: Use-after-free working with ranges in selections\n- CVE-2017-5407: Pixel and history stealing via floating-point timing side channel with SVG filters\n- CVE-2017-5410: Memory corruption during JavaScript garbage collection incremental sweeping\n- CVE-2017-5408: Cross-origin reading of video captions in violation of CORS\n- CVE-2017-5405: FTP response codes can cause use of uninitialized values for ports (bmo#1336699)\n- CVE-2017-5398: Memory safety bugs fixed in Thunderbird 45.8\n\nThe following non-security issues were fixed:\n\n- crash when viewing certain IMAP messages\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2017-345",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2017_0688-1.json"
},
{
"category": "self",
"summary": "SUSE Bug 1028391",
"url": "https://bugzilla.suse.com/1028391"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5398 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5398/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5400 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5400/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5401 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5401/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5402 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5402/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5404 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5404/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5405 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5405/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5407 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5407/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5408 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5408/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5410 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5410/"
}
],
"title": "Security update for MozillaThunderbird",
"tracking": {
"current_release_date": "2017-03-14T14:03:02Z",
"generator": {
"date": "2017-03-14T14:03:02Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2017:0688-1",
"initial_release_date": "2017-03-14T14:03:02Z",
"revision_history": [
{
"date": "2017-03-14T14:03:02Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "MozillaThunderbird-45.8.0-27.1.aarch64",
"product": {
"name": "MozillaThunderbird-45.8.0-27.1.aarch64",
"product_id": "MozillaThunderbird-45.8.0-27.1.aarch64"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"product": {
"name": "MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"product_id": "MozillaThunderbird-devel-45.8.0-27.1.aarch64"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"product": {
"name": "MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"product_id": "MozillaThunderbird-translations-common-45.8.0-27.1.aarch64"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"product": {
"name": "MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"product_id": "MozillaThunderbird-translations-other-45.8.0-27.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "MozillaThunderbird-45.8.0-27.1.s390x",
"product": {
"name": "MozillaThunderbird-45.8.0-27.1.s390x",
"product_id": "MozillaThunderbird-45.8.0-27.1.s390x"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-devel-45.8.0-27.1.s390x",
"product": {
"name": "MozillaThunderbird-devel-45.8.0-27.1.s390x",
"product_id": "MozillaThunderbird-devel-45.8.0-27.1.s390x"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"product": {
"name": "MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"product_id": "MozillaThunderbird-translations-common-45.8.0-27.1.s390x"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"product": {
"name": "MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"product_id": "MozillaThunderbird-translations-other-45.8.0-27.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "MozillaThunderbird-45.8.0-27.1.x86_64",
"product": {
"name": "MozillaThunderbird-45.8.0-27.1.x86_64",
"product_id": "MozillaThunderbird-45.8.0-27.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"product": {
"name": "MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"product_id": "MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"product": {
"name": "MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"product_id": "MozillaThunderbird-devel-45.8.0-27.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"product": {
"name": "MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"product_id": "MozillaThunderbird-translations-common-45.8.0-27.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-translations-other-45.8.0-27.1.x86_64",
"product": {
"name": "MozillaThunderbird-translations-other-45.8.0-27.1.x86_64",
"product_id": "MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Package Hub 12",
"product": {
"name": "SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:packagehub:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-45.8.0-27.1.aarch64 as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64"
},
"product_reference": "MozillaThunderbird-45.8.0-27.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-45.8.0-27.1.s390x as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x"
},
"product_reference": "MozillaThunderbird-45.8.0-27.1.s390x",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-45.8.0-27.1.x86_64 as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64"
},
"product_reference": "MozillaThunderbird-45.8.0-27.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64 as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64"
},
"product_reference": "MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-devel-45.8.0-27.1.aarch64 as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64"
},
"product_reference": "MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-devel-45.8.0-27.1.s390x as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x"
},
"product_reference": "MozillaThunderbird-devel-45.8.0-27.1.s390x",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-devel-45.8.0-27.1.x86_64 as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64"
},
"product_reference": "MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-translations-common-45.8.0-27.1.aarch64 as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64"
},
"product_reference": "MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-translations-common-45.8.0-27.1.s390x as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x"
},
"product_reference": "MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-translations-common-45.8.0-27.1.x86_64 as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64"
},
"product_reference": "MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-translations-other-45.8.0-27.1.aarch64 as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64"
},
"product_reference": "MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-translations-other-45.8.0-27.1.s390x as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x"
},
"product_reference": "MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-translations-other-45.8.0-27.1.x86_64 as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
},
"product_reference": "MozillaThunderbird-translations-other-45.8.0-27.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5398",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5398"
}
],
"notes": [
{
"category": "general",
"text": "Memory safety bugs were reported in Thunderbird 45.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 52, Firefox ESR \u003c 45.8, Thunderbird \u003c 52, and Thunderbird \u003c 45.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5398",
"url": "https://www.suse.com/security/cve/CVE-2017-5398"
},
{
"category": "external",
"summary": "SUSE Bug 1028391 for CVE-2017-5398",
"url": "https://bugzilla.suse.com/1028391"
},
{
"category": "external",
"summary": "SUSE Bug 1028393 for CVE-2017-5398",
"url": "https://bugzilla.suse.com/1028393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-14T14:03:02Z",
"details": "moderate"
}
],
"title": "CVE-2017-5398"
},
{
"cve": "CVE-2017-5400",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5400"
}
],
"notes": [
{
"category": "general",
"text": "JIT-spray targeting asm.js combined with a heap spray allows for a bypass of ASLR and DEP protections leading to potential memory corruption attacks. This vulnerability affects Firefox \u003c 52, Firefox ESR \u003c 45.8, Thunderbird \u003c 52, and Thunderbird \u003c 45.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5400",
"url": "https://www.suse.com/security/cve/CVE-2017-5400"
},
{
"category": "external",
"summary": "SUSE Bug 1028391 for CVE-2017-5400",
"url": "https://bugzilla.suse.com/1028391"
},
{
"category": "external",
"summary": "SUSE Bug 1028393 for CVE-2017-5400",
"url": "https://bugzilla.suse.com/1028393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-14T14:03:02Z",
"details": "moderate"
}
],
"title": "CVE-2017-5400"
},
{
"cve": "CVE-2017-5401",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5401"
}
],
"notes": [
{
"category": "general",
"text": "A crash triggerable by web content in which an \"ErrorResult\" references unassigned memory due to a logic error. The resulting crash may be exploitable. This vulnerability affects Firefox \u003c 52, Firefox ESR \u003c 45.8, Thunderbird \u003c 52, and Thunderbird \u003c 45.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5401",
"url": "https://www.suse.com/security/cve/CVE-2017-5401"
},
{
"category": "external",
"summary": "SUSE Bug 1028391 for CVE-2017-5401",
"url": "https://bugzilla.suse.com/1028391"
},
{
"category": "external",
"summary": "SUSE Bug 1028393 for CVE-2017-5401",
"url": "https://bugzilla.suse.com/1028393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-14T14:03:02Z",
"details": "moderate"
}
],
"title": "CVE-2017-5401"
},
{
"cve": "CVE-2017-5402",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5402"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free can occur when events are fired for a \"FontFace\" object after the object has been already been destroyed while working with fonts. This results in a potentially exploitable crash. This vulnerability affects Firefox \u003c 52, Firefox ESR \u003c 45.8, Thunderbird \u003c 52, and Thunderbird \u003c 45.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5402",
"url": "https://www.suse.com/security/cve/CVE-2017-5402"
},
{
"category": "external",
"summary": "SUSE Bug 1028391 for CVE-2017-5402",
"url": "https://bugzilla.suse.com/1028391"
},
{
"category": "external",
"summary": "SUSE Bug 1028393 for CVE-2017-5402",
"url": "https://bugzilla.suse.com/1028393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-14T14:03:02Z",
"details": "moderate"
}
],
"title": "CVE-2017-5402"
},
{
"cve": "CVE-2017-5404",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5404"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free error can occur when manipulating ranges in selections with one node inside a native anonymous tree and one node outside of it. This results in a potentially exploitable crash. This vulnerability affects Firefox \u003c 52, Firefox ESR \u003c 45.8, Thunderbird \u003c 52, and Thunderbird \u003c 45.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5404",
"url": "https://www.suse.com/security/cve/CVE-2017-5404"
},
{
"category": "external",
"summary": "SUSE Bug 1028391 for CVE-2017-5404",
"url": "https://bugzilla.suse.com/1028391"
},
{
"category": "external",
"summary": "SUSE Bug 1028393 for CVE-2017-5404",
"url": "https://bugzilla.suse.com/1028393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-14T14:03:02Z",
"details": "moderate"
}
],
"title": "CVE-2017-5404"
},
{
"cve": "CVE-2017-5405",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5405"
}
],
"notes": [
{
"category": "general",
"text": "Certain response codes in FTP connections can result in the use of uninitialized values for ports in FTP operations. This vulnerability affects Firefox \u003c 52, Firefox ESR \u003c 45.8, Thunderbird \u003c 52, and Thunderbird \u003c 45.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5405",
"url": "https://www.suse.com/security/cve/CVE-2017-5405"
},
{
"category": "external",
"summary": "SUSE Bug 1028391 for CVE-2017-5405",
"url": "https://bugzilla.suse.com/1028391"
},
{
"category": "external",
"summary": "SUSE Bug 1028393 for CVE-2017-5405",
"url": "https://bugzilla.suse.com/1028393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-14T14:03:02Z",
"details": "moderate"
}
],
"title": "CVE-2017-5405"
},
{
"cve": "CVE-2017-5407",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5407"
}
],
"notes": [
{
"category": "general",
"text": "Using SVG filters that don\u0027t use the fixed point math implementation on a target iframe, a malicious page can extract pixel values from a targeted user. This can be used to extract history information and read text values across domains. This violates same-origin policy and leads to information disclosure. This vulnerability affects Firefox \u003c 52, Firefox ESR \u003c 45.8, Thunderbird \u003c 52, and Thunderbird \u003c 45.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5407",
"url": "https://www.suse.com/security/cve/CVE-2017-5407"
},
{
"category": "external",
"summary": "SUSE Bug 1028391 for CVE-2017-5407",
"url": "https://bugzilla.suse.com/1028391"
},
{
"category": "external",
"summary": "SUSE Bug 1028393 for CVE-2017-5407",
"url": "https://bugzilla.suse.com/1028393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-14T14:03:02Z",
"details": "moderate"
}
],
"title": "CVE-2017-5407"
},
{
"cve": "CVE-2017-5408",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5408"
}
],
"notes": [
{
"category": "general",
"text": "Video files loaded video captions cross-origin without checking for the presence of CORS headers permitting such cross-origin use, leading to potential information disclosure for video captions. This vulnerability affects Firefox \u003c 52, Firefox ESR \u003c 45.8, Thunderbird \u003c 52, and Thunderbird \u003c 45.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5408",
"url": "https://www.suse.com/security/cve/CVE-2017-5408"
},
{
"category": "external",
"summary": "SUSE Bug 1028391 for CVE-2017-5408",
"url": "https://bugzilla.suse.com/1028391"
},
{
"category": "external",
"summary": "SUSE Bug 1028393 for CVE-2017-5408",
"url": "https://bugzilla.suse.com/1028393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-14T14:03:02Z",
"details": "moderate"
}
],
"title": "CVE-2017-5408"
},
{
"cve": "CVE-2017-5410",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5410"
}
],
"notes": [
{
"category": "general",
"text": "Memory corruption resulting in a potentially exploitable crash during garbage collection of JavaScript due errors in how incremental sweeping is managed for memory cleanup. This vulnerability affects Firefox \u003c 52, Firefox ESR \u003c 45.8, Thunderbird \u003c 52, and Thunderbird \u003c 45.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5410",
"url": "https://www.suse.com/security/cve/CVE-2017-5410"
},
{
"category": "external",
"summary": "SUSE Bug 1028391 for CVE-2017-5410",
"url": "https://bugzilla.suse.com/1028391"
},
{
"category": "external",
"summary": "SUSE Bug 1028393 for CVE-2017-5410",
"url": "https://bugzilla.suse.com/1028393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-devel-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-common-45.8.0-27.1.x86_64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.aarch64",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.s390x",
"SUSE Package Hub 12:MozillaThunderbird-translations-other-45.8.0-27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-03-14T14:03:02Z",
"details": "moderate"
}
],
"title": "CVE-2017-5410"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.