CVE-2021-43539
📋 TL;DR
A use-after-free vulnerability in Mozilla's WebAssembly (wasm) implementation could allow an attacker to cause memory corruption and potentially execute arbitrary code. This affects Thunderbird, Firefox ESR, and Firefox when processing malicious web content. Users of outdated versions are at risk.
💻 Affected Systems
- Mozilla Thunderbird
- Mozilla Firefox ESR
- Mozilla Firefox
📦 What is this software?
Firefox by Mozilla
Firefox Esr by Mozilla
Thunderbird by Mozilla
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete system compromise, data theft, or ransomware deployment.
Likely Case
Application crash (denial of service) or limited memory corruption that could be leveraged for further exploitation.
If Mitigated
No impact if patched; unpatched systems with strict content filtering may still be vulnerable to targeted attacks.
🎯 Exploit Status
Exploitation requires crafting malicious wasm content, but no public proof-of-concept has been released.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Thunderbird 91.4.0, Firefox ESR 91.4.0, Firefox 95
Vendor Advisory: https://bugzilla.mozilla.org/show_bug.cgi?id=1739683
Restart Required: Yes
Instructions:
1. Open the application. 2. Go to Help > About. 3. Allow automatic update. 4. Restart when prompted.
🔧 Temporary Workarounds
Disable WebAssembly
allPrevents execution of wasm content, mitigating the vulnerability but breaking functionality.
In Firefox/Thunderbird: Set javascript.options.wasm to false in about:config
🧯 If You Can't Patch
- Restrict access to untrusted websites and email content.
- Use application sandboxing or isolation techniques to limit potential damage.
🔍 How to Verify
Check if Vulnerable:
Check application version in Help > About. If version is below patched versions, system is vulnerable.
Check Version:
firefox --version or thunderbird --version on Linux/macOS; check About dialog on Windows.
Verify Fix Applied:
Confirm version is Thunderbird ≥ 91.4.0, Firefox ESR ≥ 91.4.0, or Firefox ≥ 95.
📡 Detection & Monitoring
Log Indicators:
- Application crash logs referencing wasm or memory corruption
- Unexpected process termination
Network Indicators:
- Unusual wasm module downloads or execution patterns
SIEM Query:
source="*browser.log" AND ("crash" OR "segfault") AND "wasm"
🔗 References
- https://bugzilla.mozilla.org/show_bug.cgi?id=1739683
- https://lists.debian.org/debian-lts-announce/2021/12/msg00030.html
- https://lists.debian.org/debian-lts-announce/2022/01/msg00001.html
- https://security.gentoo.org/glsa/202202-03
- https://security.gentoo.org/glsa/202208-14
- https://www.debian.org/security/2021/dsa-5026
- https://www.debian.org/security/2022/dsa-5034
- https://www.mozilla.org/security/advisories/mfsa2021-52/
- https://www.mozilla.org/security/advisories/mfsa2021-53/
- https://www.mozilla.org/security/advisories/mfsa2021-54/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1739683
- https://lists.debian.org/debian-lts-announce/2021/12/msg00030.html
- https://lists.debian.org/debian-lts-announce/2022/01/msg00001.html
- https://security.gentoo.org/glsa/202202-03
- https://security.gentoo.org/glsa/202208-14
- https://www.debian.org/security/2021/dsa-5026
- https://www.debian.org/security/2022/dsa-5034
- https://www.mozilla.org/security/advisories/mfsa2021-52/
- https://www.mozilla.org/security/advisories/mfsa2021-53/
- https://www.mozilla.org/security/advisories/mfsa2021-54/