CVE-2021-43527

9.8 CRITICAL

📋 TL;DR

CVE-2021-43527 is a critical heap overflow vulnerability in NSS (Network Security Services) that allows remote code execution when processing malicious DER-encoded DSA or RSA-PSS signatures. It affects applications using NSS for signature verification in formats like CMS, S/MIME, PKCS #7, or PKCS #12, including email clients and PDF viewers, but not Mozilla Firefox.

💻 Affected Systems

Products:
  • Thunderbird
  • LibreOffice
  • Evolution
  • Evince
  • Other applications using NSS for signature verification
Versions: NSS versions < 3.73 and NSS < 3.68.1 ESR
Operating Systems: Linux, Windows, macOS (if using affected NSS versions)
Default Config Vulnerable: ⚠️ Yes
Notes: Only impacts applications configured to use NSS for signature handling; Firefox is not affected due to different configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote attackers can execute arbitrary code with the privileges of the vulnerable application, potentially leading to full system compromise.

🟠

Likely Case

Attackers could crash applications or execute code by sending specially crafted signed documents or certificates.

🟢

If Mitigated

With proper patching, the vulnerability is eliminated; network segmentation and application whitelisting reduce attack surface.

🌐 Internet-Facing: HIGH, as malicious documents or certificates can be delivered via email or web downloads without authentication.
🏢 Internal Only: MEDIUM, as exploitation requires user interaction (e.g., opening a malicious file), but internal threats or phishing could still trigger it.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting malicious signatures, but no public proof-of-concept has been disclosed; CVSS 9.8 indicates high severity and ease of attack.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: NSS 3.73 or NSS 3.68.1 ESR

Vendor Advisory: https://bugzilla.mozilla.org/show_bug.cgi?id=1737470

Restart Required: Yes

Instructions:

1. Update NSS library to version 3.73 or 3.68.1 ESR. 2. For Linux, use package manager (e.g., 'sudo apt update && sudo apt upgrade libnss3'). 3. For Windows/macOS, update affected applications (e.g., Thunderbird, LibreOffice). 4. Restart applications and systems to apply changes.

🔧 Temporary Workarounds

Disable signature verification in applications

all

Temporarily disable processing of signed documents or certificates in vulnerable applications to block exploitation vectors.

Block malicious file types at network perimeter

all

Use email gateways or firewalls to filter or block suspicious signed documents (e.g., .p7s, .p12 files) from untrusted sources.

🧯 If You Can't Patch

  • Isolate affected systems from untrusted networks and limit user access to reduce attack surface.
  • Implement application whitelisting to prevent execution of unauthorized processes from exploited applications.

🔍 How to Verify

Check if Vulnerable:

Check NSS version with 'strings /usr/lib/libnss3.so | grep Version' on Linux or verify application versions (e.g., Thunderbird > 91.4.0).

Check Version:

On Linux: 'dpkg -l | grep libnss3' or 'rpm -qa | grep nss'; on Windows, check application help/about menus.

Verify Fix Applied:

Confirm NSS version is >= 3.73 or >= 3.68.1 ESR using the same command, and test signature handling in applications.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes or errors related to NSS, certificate parsing, or signature validation in system/application logs.

Network Indicators:

  • Unusual inbound traffic with signed documents or certificates from suspicious sources.

SIEM Query:

Example: 'event.source="application_log" AND (message CONTAINS "NSS" OR message CONTAINS "heap overflow" OR message CONTAINS "signature error")'

🔗 References

📤 Share & Export