CVE-2021-43537

8.8 HIGH

📋 TL;DR

This vulnerability involves an incorrect type conversion from 64-bit to 32-bit integers in Mozilla products, allowing memory corruption that could lead to exploitable crashes. It affects Thunderbird, Firefox ESR, and Firefox users running outdated versions. Attackers could potentially execute arbitrary code or cause denial of service.

💻 Affected Systems

Products:
  • Mozilla Thunderbird
  • Mozilla Firefox ESR
  • Mozilla Firefox
Versions: Thunderbird < 91.4.0, Firefox ESR < 91.4.0, Firefox < 95
Operating Systems: Windows, Linux, macOS, Other Unix-like systems
Default Config Vulnerable: ⚠️ Yes
Notes: All standard installations are vulnerable; no special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, or malware installation.

🟠

Likely Case

Application crash (denial of service) or limited memory corruption that could be leveraged for further exploitation.

🟢

If Mitigated

Minimal impact if patched promptly; crashes may occur but without code execution.

🌐 Internet-Facing: HIGH - Web browsers and email clients are directly exposed to internet content.
🏢 Internal Only: MEDIUM - Internal users accessing malicious content could still be affected.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires triggering the type conversion bug through crafted content; no public exploits known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Thunderbird 91.4.0, Firefox ESR 91.4.0, Firefox 95

Vendor Advisory: https://bugzilla.mozilla.org/show_bug.cgi?id=1738237

Restart Required: Yes

Instructions:

1. Open the affected application. 2. Go to Help > About (or equivalent). 3. Allow automatic update to latest version. 4. Restart the application when prompted.

🔧 Temporary Workarounds

Disable JavaScript

all

Reduces attack surface by preventing execution of malicious scripts that might trigger the vulnerability.

Use Content Security Policy

all

Restrict content sources to trusted domains only.

🧯 If You Can't Patch

  • Restrict user access to untrusted websites and email content.
  • Implement network segmentation to limit potential lateral movement.

🔍 How to Verify

Check if Vulnerable:

Check the application version in Help > About (or equivalent) and compare to affected versions.

Check Version:

On Linux: thunderbird --version, firefox --version; On Windows: Check via Help > About.

Verify Fix Applied:

Confirm version is Thunderbird ≥ 91.4.0, Firefox ESR ≥ 91.4.0, or Firefox ≥ 95.

📡 Detection & Monitoring

Log Indicators:

  • Application crash logs with memory corruption errors
  • Unexpected process termination

Network Indicators:

  • Unusual outbound connections post-crash
  • Traffic to known malicious domains

SIEM Query:

source="application_logs" AND (event="crash" OR event="segfault") AND app IN ("thunderbird", "firefox")

🔗 References

📤 Share & Export