CVE-2021-43529

9.8 CRITICAL

📋 TL;DR

Thunderbird email client versions before 91.3.0 contain a heap overflow vulnerability when processing S/MIME messages with certificates containing DER-encoded DSA or RSA-PSS signatures. This allows remote attackers to potentially execute arbitrary code or cause denial of service. All Thunderbird users with vulnerable versions are affected.

💻 Affected Systems

Products:
  • Mozilla Thunderbird
Versions: All versions prior to 91.3.0
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggers when processing S/MIME messages with specific certificate signatures. Standard email clients are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, or persistent backdoor installation.

🟠

Likely Case

Application crash (denial of service) or limited memory corruption leading to information disclosure.

🟢

If Mitigated

No impact if patched version is used or vulnerable code path is avoided through configuration.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires sending specially crafted S/MIME messages. No public exploit code is known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 91.3.0 and later

Vendor Advisory: https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2021-43529

Restart Required: Yes

Instructions:

1. Open Thunderbird. 2. Go to Help > About Thunderbird. 3. If version is below 91.3.0, enable automatic updates or download latest version from mozilla.org. 4. Restart Thunderbird after update.

🔧 Temporary Workarounds

Disable S/MIME processing

all

Configure Thunderbird to not process S/MIME messages

Block S/MIME emails at gateway

all

Filter or block incoming S/MIME messages at email gateway

🧯 If You Can't Patch

  • Isolate Thunderbird systems from untrusted networks
  • Implement strict email filtering for S/MIME messages

🔍 How to Verify

Check if Vulnerable:

Check Thunderbird version in Help > About Thunderbird. If version is below 91.3.0, system is vulnerable.

Check Version:

thunderbird --version

Verify Fix Applied:

Verify Thunderbird version is 91.3.0 or higher in Help > About Thunderbird.

📡 Detection & Monitoring

Log Indicators:

  • Thunderbird crash logs
  • Memory access violation errors
  • Unexpected process termination

Network Indicators:

  • Incoming S/MIME messages with unusual certificate structures
  • Spike in email processing failures

SIEM Query:

source="thunderbird" AND (event_type="crash" OR error="heap" OR error="overflow")

🔗 References

📤 Share & Export