CVE-2021-38495

8.8 HIGH

📋 TL;DR

This CVE describes memory safety bugs in Mozilla Thunderbird and Firefox ESR that could lead to memory corruption. With sufficient effort, attackers could exploit these vulnerabilities to execute arbitrary code on affected systems. Users running Thunderbird versions below 91.1 or Firefox ESR versions below 91.1 are vulnerable.

💻 Affected Systems

Products:
  • Mozilla Thunderbird
  • Mozilla Firefox ESR
Versions: Thunderbird < 91.1, Firefox ESR < 91.1
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. The vulnerability affects the email client and web browser directly.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Application crash or denial of service, with potential for limited code execution in targeted attacks.

🟢

If Mitigated

No impact if systems are patched or isolated from untrusted content.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: HIGH

Memory corruption vulnerabilities require sophisticated exploitation techniques. No public proof-of-concept has been released.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Thunderbird 91.1, Firefox ESR 91.1

Vendor Advisory: https://www.mozilla.org/security/advisories/mfsa2021-40/

Restart Required: Yes

Instructions:

1. Open Thunderbird or Firefox ESR. 2. Go to Help > About Thunderbird or Help > About Firefox. 3. Allow the application to check for and install updates. 4. Restart the application when prompted.

🔧 Temporary Workarounds

Disable JavaScript in Thunderbird

all

Reduces attack surface by disabling JavaScript execution in email content.

Edit > Preferences > Advanced > General > Config Editor > search for 'javascript.enabled' > set to false

Network Segmentation

all

Restrict network access to email clients from untrusted networks.

🧯 If You Can't Patch

  • Discontinue use of vulnerable versions and switch to alternative email clients or browsers.
  • Implement application whitelisting to prevent execution of malicious code.

🔍 How to Verify

Check if Vulnerable:

Check the version in Thunderbird: Help > About Thunderbird. If version is below 91.1, you are vulnerable. For Firefox ESR: Help > About Firefox.

Check Version:

thunderbird --version (Linux) or check via GUI on Windows/macOS

Verify Fix Applied:

After updating, verify the version shows 91.1 or higher in the About dialog.

📡 Detection & Monitoring

Log Indicators:

  • Application crash logs with memory access violations
  • Unexpected process termination of Thunderbird/Firefox

Network Indicators:

  • Unusual outbound connections from email client processes
  • Suspicious email attachments or links being accessed

SIEM Query:

source="thunderbird.log" OR source="firefox.log" AND (event="crash" OR event="segfault")

🔗 References

📤 Share & Export