<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for MozillaFirefox, mozilla-nss</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2015:0404-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2015-02-26T13:12:31Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2015-02-26T13:12:31Z</InitialReleaseDate>
    <CurrentReleaseDate>2015-02-26T13:12:31Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for MozillaFirefox, mozilla-nss</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">MozillaFirefox, mozilla-nss were updated to fix 18 security issues.

MozillaFirefox was updated to version 36.0. These security issues were fixed:
- CVE-2015-0835, CVE-2015-0836: Miscellaneous memory safety hazards
- CVE-2015-0832: Appended period to hostnames can bypass HPKP and HSTS protections
- CVE-2015-0830: Malicious WebGL content crash when writing strings
- CVE-2015-0834: TLS TURN and STUN connections silently fail to simple TCP connections
- CVE-2015-0831: Use-after-free in IndexedDB
- CVE-2015-0829: Buffer overflow in libstagefright during MP4 video playback
- CVE-2015-0828: Double-free when using non-default memory allocators with a zero-length XHR
- CVE-2015-0827: Out-of-bounds read and write while rendering SVG content
- CVE-2015-0826: Buffer overflow during CSS restyling
- CVE-2015-0825: Buffer underflow during MP3 playback
- CVE-2015-0824: Crash using DrawTarget in Cairo graphics library
- CVE-2015-0823: Use-after-free in Developer Console date with OpenType Sanitiser
- CVE-2015-0822: Reading of local files through manipulation of form autocomplete
- CVE-2015-0821: Local files or privileged URLs in pages can be opened into new tabs
- CVE-2015-0819: UI Tour whitelisted sites in background tab can spoof foreground tabs
- CVE-2015-0820: Caja Compiler JavaScript sandbox bypass

mozilla-nss was updated to version 3.17.4 to fix the following issues:
- CVE-2014-1569: QuickDER decoder length issue (bnc#910647).
- bmo#1084986: If an SSL/TLS connection fails, because client and server don't have any common protocol version enabled, NSS has been changed to report error code SSL_ERROR_UNSUPPORTED_VERSION (instead of reporting SSL_ERROR_NO_CYPHER_OVERLAP).
- bmo#1112461: libpkix was fixed to prefer the newest certificate, if multiple certificates match.
- bmo#1094492: fixed a memory corruption issue during failure of keypair generation.
- bmo#1113632: fixed a failure to reload a PKCS#11 module in FIPS mode.
- bmo#1119983: fixed interoperability of NSS server code with a LibreSSL client.
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html</URL>
      <Description>E-Mail link for openSUSE-SU-2015:0404-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Version" Name="MozillaFirefox-36.0-59.2">
      <FullProductName ProductID="MozillaFirefox-36.0-59.2">MozillaFirefox-36.0-59.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-branding-upstream-36.0-59.2">
      <FullProductName ProductID="MozillaFirefox-branding-upstream-36.0-59.2">MozillaFirefox-branding-upstream-36.0-59.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-buildsymbols-36.0-59.2">
      <FullProductName ProductID="MozillaFirefox-buildsymbols-36.0-59.2">MozillaFirefox-buildsymbols-36.0-59.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-devel-36.0-59.2">
      <FullProductName ProductID="MozillaFirefox-devel-36.0-59.2">MozillaFirefox-devel-36.0-59.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-common-36.0-59.2">
      <FullProductName ProductID="MozillaFirefox-translations-common-36.0-59.2">MozillaFirefox-translations-common-36.0-59.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-other-36.0-59.2">
      <FullProductName ProductID="MozillaFirefox-translations-other-36.0-59.2">MozillaFirefox-translations-other-36.0-59.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libfreebl3-3.17.4-52.1">
      <FullProductName ProductID="libfreebl3-3.17.4-52.1">libfreebl3-3.17.4-52.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libfreebl3-32bit-3.17.4-52.1">
      <FullProductName ProductID="libfreebl3-32bit-3.17.4-52.1">libfreebl3-32bit-3.17.4-52.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoftokn3-3.17.4-52.1">
      <FullProductName ProductID="libsoftokn3-3.17.4-52.1">libsoftokn3-3.17.4-52.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoftokn3-32bit-3.17.4-52.1">
      <FullProductName ProductID="libsoftokn3-32bit-3.17.4-52.1">libsoftokn3-32bit-3.17.4-52.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-3.17.4-52.1">
      <FullProductName ProductID="mozilla-nss-3.17.4-52.1">mozilla-nss-3.17.4-52.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-32bit-3.17.4-52.1">
      <FullProductName ProductID="mozilla-nss-32bit-3.17.4-52.1">mozilla-nss-32bit-3.17.4-52.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-certs-3.17.4-52.1">
      <FullProductName ProductID="mozilla-nss-certs-3.17.4-52.1">mozilla-nss-certs-3.17.4-52.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-certs-32bit-3.17.4-52.1">
      <FullProductName ProductID="mozilla-nss-certs-32bit-3.17.4-52.1">mozilla-nss-certs-32bit-3.17.4-52.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-devel-3.17.4-52.1">
      <FullProductName ProductID="mozilla-nss-devel-3.17.4-52.1">mozilla-nss-devel-3.17.4-52.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-sysinit-3.17.4-52.1">
      <FullProductName ProductID="mozilla-nss-sysinit-3.17.4-52.1">mozilla-nss-sysinit-3.17.4-52.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-sysinit-32bit-3.17.4-52.1">
      <FullProductName ProductID="mozilla-nss-sysinit-32bit-3.17.4-52.1">mozilla-nss-sysinit-32bit-3.17.4-52.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-tools-3.17.4-52.1">
      <FullProductName ProductID="mozilla-nss-tools-3.17.4-52.1">mozilla-nss-tools-3.17.4-52.1</FullProductName>
    </Branch>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The definite_length_decoder function in lib/util/quickder.c in Mozilla Network Security Services (NSS) before 3.16.2.4 and 3.17.x before 3.17.3 does not ensure that the DER encoding of an ASN.1 length is properly formed, which allows remote attackers to conduct data-smuggling attacks by using a long byte sequence for an encoding, as demonstrated by the SEC_QuickDERDecodeItem function's improper handling of an arbitrary-length encoding of 0x00.</Note>
    </Notes>
    <CVE>CVE-2014-1569</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-1569.html</URL>
        <Description>CVE-2014-1569</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/910647</URL>
        <Description>SUSE Bug 910647</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/913096</URL>
        <Description>SUSE Bug 913096</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/917597</URL>
        <Description>SUSE Bug 917597</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The UITour::onPageEvent function in Mozilla Firefox before 36.0 does not ensure that an API call originates from a foreground tab, which allows remote attackers to conduct spoofing and clickjacking attacks by leveraging access to a UI Tour web site.</Note>
    </Notes>
    <CVE>CVE-2015-0819</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0819.html</URL>
        <Description>CVE-2015-0819</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/917597</URL>
        <Description>SUSE Bug 917597</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before 36.0 does not properly restrict transitions of JavaScript objects from a non-extensible state to an extensible state, which allows remote attackers to bypass a Caja Compiler sandbox protection mechanism or a Secure EcmaScript sandbox protection mechanism via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2015-0820</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0820.html</URL>
        <Description>CVE-2015-0820</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/917597</URL>
        <Description>SUSE Bug 917597</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before 36.0 allows user-assisted remote attackers to read arbitrary files or execute arbitrary JavaScript code with chrome privileges via a crafted web site that is accessed with unspecified mouse and keyboard actions.</Note>
    </Notes>
    <CVE>CVE-2015-0821</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0821.html</URL>
        <Description>CVE-2015-0821</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/917597</URL>
        <Description>SUSE Bug 917597</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Form Autocompletion feature in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allows remote attackers to read arbitrary files via crafted JavaScript code.</Note>
    </Notes>
    <CVE>CVE-2015-0822</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0822.html</URL>
        <Description>CVE-2015-0822</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/910669</URL>
        <Description>SUSE Bug 910669</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/917597</URL>
        <Description>SUSE Bug 917597</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/923534</URL>
        <Description>SUSE Bug 923534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/924515</URL>
        <Description>SUSE Bug 924515</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple use-after-free vulnerabilities in OpenType Sanitiser, as used in Mozilla Firefox before 36.0, might allow remote attackers to trigger problematic Developer Console information or possibly have unspecified other impact by leveraging incorrect macro expansion, related to the ots::ots_gasp_parse function.</Note>
    </Notes>
    <CVE>CVE-2015-0823</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0823.html</URL>
        <Description>CVE-2015-0823</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/917597</URL>
        <Description>SUSE Bug 917597</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mozilla::layers::BufferTextureClient::AllocateForSurface function in Mozilla Firefox before 36.0 allows remote attackers to cause a denial of service (out-of-bounds write of zero values, and application crash) via vectors that trigger use of DrawTarget and the Cairo library for image drawing.</Note>
    </Notes>
    <CVE>CVE-2015-0824</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0824.html</URL>
        <Description>CVE-2015-0824</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/917597</URL>
        <Description>SUSE Bug 917597</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack-based buffer underflow in the mozilla::MP3FrameParser::ParseBuffer function in Mozilla Firefox before 36.0 allows remote attackers to obtain sensitive information from process memory via a malformed MP3 file that improperly interacts with memory allocation during playback.</Note>
    </Notes>
    <CVE>CVE-2015-0825</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0825.html</URL>
        <Description>CVE-2015-0825</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/917597</URL>
        <Description>SUSE Bug 917597</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The nsTransformedTextRun::SetCapitalization function in Mozilla Firefox before 36.0 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read of heap memory) via a crafted Cascading Style Sheets (CSS) token sequence that triggers a restyle or reflow operation.</Note>
    </Notes>
    <CVE>CVE-2015-0826</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0826.html</URL>
        <Description>CVE-2015-0826</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/917597</URL>
        <Description>SUSE Bug 917597</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the mozilla::gfx::CopyRect function in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allows remote attackers to obtain sensitive information from uninitialized process memory via a malformed SVG graphic.</Note>
    </Notes>
    <CVE>CVE-2015-0827</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0827.html</URL>
        <Description>CVE-2015-0827</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/910669</URL>
        <Description>SUSE Bug 910669</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/917597</URL>
        <Description>SUSE Bug 917597</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/923534</URL>
        <Description>SUSE Bug 923534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/924515</URL>
        <Description>SUSE Bug 924515</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Double free vulnerability in the nsXMLHttpRequest::GetResponse function in Mozilla Firefox before 36.0, when a nonstandard memory allocator is used, allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via crafted JavaScript code that makes an XMLHttpRequest call with zero bytes of data.</Note>
    </Notes>
    <CVE>CVE-2015-0828</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0828.html</URL>
        <Description>CVE-2015-0828</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/917597</URL>
        <Description>SUSE Bug 917597</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in libstagefright in Mozilla Firefox before 36.0 allows remote attackers to execute arbitrary code via a crafted MP4 video that is improperly handled during playback.</Note>
    </Notes>
    <CVE>CVE-2015-0829</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0829.html</URL>
        <Description>CVE-2015-0829</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/917597</URL>
        <Description>SUSE Bug 917597</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The WebGL implementation in Mozilla Firefox before 36.0 does not properly allocate memory for copying an unspecified string to a shader's compilation log, which allows remote attackers to cause a denial of service (application crash) via crafted WebGL content.</Note>
    </Notes>
    <CVE>CVE-2015-0830</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0830.html</URL>
        <Description>CVE-2015-0830</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/917597</URL>
        <Description>SUSE Bug 917597</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the mozilla::dom::IndexedDB::IDBObjectStore::CreateIndex function in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via crafted content that is improperly handled during IndexedDB index creation.</Note>
    </Notes>
    <CVE>CVE-2015-0831</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0831.html</URL>
        <Description>CVE-2015-0831</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/910669</URL>
        <Description>SUSE Bug 910669</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/917597</URL>
        <Description>SUSE Bug 917597</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/923534</URL>
        <Description>SUSE Bug 923534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/924515</URL>
        <Description>SUSE Bug 924515</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before 36.0 does not properly recognize the equivalence of domain names with and without a trailing . (dot) character, which allows man-in-the-middle attackers to bypass the HPKP and HSTS protection mechanisms by constructing a URL with this character and leveraging access to an X.509 certificate for a domain with this character.</Note>
    </Notes>
    <CVE>CVE-2015-0832</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0832.html</URL>
        <Description>CVE-2015-0832</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/917597</URL>
        <Description>SUSE Bug 917597</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The WebRTC subsystem in Mozilla Firefox before 36.0 recognizes turns: and stuns: URIs but accesses the TURN or STUN server without using TLS, which makes it easier for man-in-the-middle attackers to discover credentials by spoofing a server and completing a brute-force attack within a short time window.</Note>
    </Notes>
    <CVE>CVE-2015-0834</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0834.html</URL>
        <Description>CVE-2015-0834</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/917597</URL>
        <Description>SUSE Bug 917597</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 36.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.</Note>
    </Notes>
    <CVE>CVE-2015-0835</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0835.html</URL>
        <Description>CVE-2015-0835</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/910669</URL>
        <Description>SUSE Bug 910669</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/917597</URL>
        <Description>SUSE Bug 917597</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/924515</URL>
        <Description>SUSE Bug 924515</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.</Note>
    </Notes>
    <CVE>CVE-2015-0836</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0836.html</URL>
        <Description>CVE-2015-0836</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/910669</URL>
        <Description>SUSE Bug 910669</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/917597</URL>
        <Description>SUSE Bug 917597</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/923534</URL>
        <Description>SUSE Bug 923534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/924515</URL>
        <Description>SUSE Bug 924515</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
