CVE-2021-29988
📋 TL;DR
This vulnerability in Firefox and Thunderbird involves incorrect handling of inline list-item elements as block elements, leading to out-of-bounds memory reads or corruption. Attackers could exploit this to cause crashes or potentially execute arbitrary code. It affects Firefox versions before 91, Firefox ESR before 78.13, and Thunderbird before 78.13 or 91.
💻 Affected Systems
- Mozilla Firefox
- Mozilla Firefox ESR
- Mozilla Thunderbird
📦 What is this software?
Firefox by Mozilla
Firefox Esr by Mozilla
Thunderbird by Mozilla
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete system compromise, data theft, or malware installation.
Likely Case
Application crash (denial of service) or limited memory corruption that could be leveraged for further exploitation.
If Mitigated
No impact if patched versions are deployed or vulnerable browsers are not used.
🎯 Exploit Status
Exploitation requires user to visit a malicious website or open a crafted email (for Thunderbird). No authentication needed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Firefox 91, Firefox ESR 78.13, Thunderbird 78.13, Thunderbird 91
Vendor Advisory: https://www.mozilla.org/security/advisories/mfsa2021-33/
Restart Required: Yes
Instructions:
1. Open Firefox/Thunderbird. 2. Go to Menu > Help > About Firefox/Thunderbird. 3. Allow automatic update check and installation. 4. Restart the application when prompted.
🔧 Temporary Workarounds
Disable JavaScript
allPrevents execution of malicious scripts that could trigger the vulnerability.
about:config -> javascript.enabled = false
Use Content Security Policy
allRestrict inline styles and scripts via CSP headers on web servers.
Content-Security-Policy: default-src 'self'
🧯 If You Can't Patch
- Restrict browser usage to trusted websites only via network policies or proxy filtering.
- Deploy application whitelisting to prevent execution of unpatched browser versions.
🔍 How to Verify
Check if Vulnerable:
Check browser version in About Firefox/Thunderbird dialog. If version is below patched versions, system is vulnerable.
Check Version:
firefox --version or thunderbird --version on Linux/macOS; check About dialog on Windows.
Verify Fix Applied:
Confirm version is Firefox ≥91, Firefox ESR ≥78.13, Thunderbird ≥78.13 or ≥91 after update.
📡 Detection & Monitoring
Log Indicators:
- Browser crash reports with memory corruption signatures
- Unexpected process termination of firefox/thunderbird
Network Indicators:
- Requests to known malicious domains hosting exploit code
- Unusual outbound connections after browser crash
SIEM Query:
process_name IN ('firefox', 'thunderbird') AND event_type='crash'
🔗 References
- https://bugzilla.mozilla.org/show_bug.cgi?id=1717922
- https://security.gentoo.org/glsa/202202-03
- https://security.gentoo.org/glsa/202208-14
- https://www.mozilla.org/security/advisories/mfsa2021-33/
- https://www.mozilla.org/security/advisories/mfsa2021-34/
- https://www.mozilla.org/security/advisories/mfsa2021-35/
- https://www.mozilla.org/security/advisories/mfsa2021-36/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1717922
- https://security.gentoo.org/glsa/202202-03
- https://security.gentoo.org/glsa/202208-14
- https://www.mozilla.org/security/advisories/mfsa2021-33/
- https://www.mozilla.org/security/advisories/mfsa2021-34/
- https://www.mozilla.org/security/advisories/mfsa2021-35/
- https://www.mozilla.org/security/advisories/mfsa2021-36/