CVE-2021-43527
📋 TL;DR
CVE-2021-43527 is a critical heap overflow vulnerability in NSS (Network Security Services) that allows remote code execution when processing malicious DER-encoded DSA or RSA-PSS signatures. It affects applications using NSS for signature verification in formats like CMS, S/MIME, PKCS #7, or PKCS #12, including email clients and PDF viewers, but not Mozilla Firefox.
💻 Affected Systems
- Thunderbird
- LibreOffice
- Evolution
- Evince
- Other applications using NSS for signature verification
📦 What is this software?
Communications Cloud Native Core Binding Support Function by Oracle
View all CVEs affecting Communications Cloud Native Core Binding Support Function →
Communications Cloud Native Core Network Repository Function by Oracle
View all CVEs affecting Communications Cloud Native Core Network Repository Function →
Communications Cloud Native Core Network Repository Function by Oracle
View all CVEs affecting Communications Cloud Native Core Network Repository Function →
Communications Cloud Native Core Network Slice Selection Function by Oracle
View all CVEs affecting Communications Cloud Native Core Network Slice Selection Function →
Communications Policy Management by Oracle
E Series Santricity Os Controller by Netapp
Nss by Mozilla
Nss Esr by Mozilla
Starwind San \& Nas by Starwindsoftware
Starwind Virtual San by Starwindsoftware
⚠️ Risk & Real-World Impact
Worst Case
Remote attackers can execute arbitrary code with the privileges of the vulnerable application, potentially leading to full system compromise.
Likely Case
Attackers could crash applications or execute code by sending specially crafted signed documents or certificates.
If Mitigated
With proper patching, the vulnerability is eliminated; network segmentation and application whitelisting reduce attack surface.
🎯 Exploit Status
Exploitation requires crafting malicious signatures, but no public proof-of-concept has been disclosed; CVSS 9.8 indicates high severity and ease of attack.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: NSS 3.73 or NSS 3.68.1 ESR
Vendor Advisory: https://bugzilla.mozilla.org/show_bug.cgi?id=1737470
Restart Required: Yes
Instructions:
1. Update NSS library to version 3.73 or 3.68.1 ESR. 2. For Linux, use package manager (e.g., 'sudo apt update && sudo apt upgrade libnss3'). 3. For Windows/macOS, update affected applications (e.g., Thunderbird, LibreOffice). 4. Restart applications and systems to apply changes.
🔧 Temporary Workarounds
Disable signature verification in applications
allTemporarily disable processing of signed documents or certificates in vulnerable applications to block exploitation vectors.
Block malicious file types at network perimeter
allUse email gateways or firewalls to filter or block suspicious signed documents (e.g., .p7s, .p12 files) from untrusted sources.
🧯 If You Can't Patch
- Isolate affected systems from untrusted networks and limit user access to reduce attack surface.
- Implement application whitelisting to prevent execution of unauthorized processes from exploited applications.
🔍 How to Verify
Check if Vulnerable:
Check NSS version with 'strings /usr/lib/libnss3.so | grep Version' on Linux or verify application versions (e.g., Thunderbird > 91.4.0).
Check Version:
On Linux: 'dpkg -l | grep libnss3' or 'rpm -qa | grep nss'; on Windows, check application help/about menus.
Verify Fix Applied:
Confirm NSS version is >= 3.73 or >= 3.68.1 ESR using the same command, and test signature handling in applications.
📡 Detection & Monitoring
Log Indicators:
- Application crashes or errors related to NSS, certificate parsing, or signature validation in system/application logs.
Network Indicators:
- Unusual inbound traffic with signed documents or certificates from suspicious sources.
SIEM Query:
Example: 'event.source="application_log" AND (message CONTAINS "NSS" OR message CONTAINS "heap overflow" OR message CONTAINS "signature error")'
🔗 References
- https://bugzilla.mozilla.org/show_bug.cgi?id=1737470
- https://cert-portal.siemens.com/productcert/pdf/ssa-594438.pdf
- https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_68_1_RTM/
- https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_73_RTM/
- https://security.gentoo.org/glsa/202212-05
- https://security.netapp.com/advisory/ntap-20211229-0002/
- https://www.mozilla.org/security/advisories/mfsa2021-51/
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.starwindsoftware.com/security/sw-20220802-0001/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1737470
- https://cert-portal.siemens.com/productcert/pdf/ssa-594438.pdf
- https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_68_1_RTM/
- https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_73_RTM/
- https://security.gentoo.org/glsa/202212-05
- https://security.netapp.com/advisory/ntap-20211229-0002/
- https://www.mozilla.org/security/advisories/mfsa2021-51/
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.starwindsoftware.com/security/sw-20220802-0001/