<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for seamonkey</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2015:0636-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2015-03-23T16:35:15Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2015-03-23T16:35:15Z</InitialReleaseDate>
    <CurrentReleaseDate>2015-03-23T16:35:15Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for seamonkey</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">SeaMonkey was updated to 2.33.1 to fix several vulnerabilities.

The following vulnerabilities were fixed:

* Privilege escalation through SVG navigation (CVE-2015-0818)
* Code execution through incorrect JavaScript bounds checking elimination (CVE-2015-0817)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-updates/2015-03/msg00096.html</URL>
      <Description>E-Mail link for openSUSE-SU-2015:0636-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Version" Name="seamonkey-2.33.1-53.1">
      <FullProductName ProductID="seamonkey-2.33.1-53.1">seamonkey-2.33.1-53.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="seamonkey-dom-inspector-2.33.1-53.1">
      <FullProductName ProductID="seamonkey-dom-inspector-2.33.1-53.1">seamonkey-dom-inspector-2.33.1-53.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="seamonkey-irc-2.33.1-53.1">
      <FullProductName ProductID="seamonkey-irc-2.33.1-53.1">seamonkey-irc-2.33.1-53.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="seamonkey-translations-common-2.33.1-53.1">
      <FullProductName ProductID="seamonkey-translations-common-2.33.1-53.1">seamonkey-translations-common-2.33.1-53.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="seamonkey-translations-other-2.33.1-53.1">
      <FullProductName ProductID="seamonkey-translations-other-2.33.1-53.1">seamonkey-translations-other-2.33.1-53.1</FullProductName>
    </Branch>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The asm.js implementation in Mozilla Firefox before 36.0.3, Firefox ESR 31.x before 31.5.2, and SeaMonkey before 2.33.1 does not properly determine the cases in which bounds checking may be safely skipped during JIT compilation and heap access, which allows remote attackers to read or write to unintended memory locations, and consequently execute arbitrary code, via crafted JavaScript.</Note>
    </Notes>
    <CVE>CVE-2015-0817</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2015-03/msg00096.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0817.html</URL>
        <Description>CVE-2015-0817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/923495</URL>
        <Description>SUSE Bug 923495</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/923534</URL>
        <Description>SUSE Bug 923534</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before 36.0.4, Firefox ESR 31.x before 31.5.3, and SeaMonkey before 2.33.1 allow remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code with chrome privileges via vectors involving SVG hash navigation.</Note>
    </Notes>
    <CVE>CVE-2015-0818</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2015-03/msg00096.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0818.html</URL>
        <Description>CVE-2015-0818</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/923495</URL>
        <Description>SUSE Bug 923495</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/923534</URL>
        <Description>SUSE Bug 923534</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
