CVE-2021-43539

8.8 HIGH

📋 TL;DR

A use-after-free vulnerability in Mozilla's WebAssembly (wasm) implementation could allow an attacker to cause memory corruption and potentially execute arbitrary code. This affects Thunderbird, Firefox ESR, and Firefox when processing malicious web content. Users of outdated versions are at risk.

💻 Affected Systems

Products:
  • Mozilla Thunderbird
  • Mozilla Firefox ESR
  • Mozilla Firefox
Versions: Thunderbird < 91.4.0, Firefox ESR < 91.4.0, Firefox < 95
Operating Systems: Windows, Linux, macOS, Other platforms running affected versions
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. WebAssembly must be enabled (default).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Application crash (denial of service) or limited memory corruption that could be leveraged for further exploitation.

🟢

If Mitigated

No impact if patched; unpatched systems with strict content filtering may still be vulnerable to targeted attacks.

🌐 Internet-Facing: HIGH - Web browsers and email clients regularly process untrusted content from the internet.
🏢 Internal Only: MEDIUM - Internal web applications using wasm could be leveraged, but attack surface is smaller.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting malicious wasm content, but no public proof-of-concept has been released.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Thunderbird 91.4.0, Firefox ESR 91.4.0, Firefox 95

Vendor Advisory: https://bugzilla.mozilla.org/show_bug.cgi?id=1739683

Restart Required: Yes

Instructions:

1. Open the application. 2. Go to Help > About. 3. Allow automatic update. 4. Restart when prompted.

🔧 Temporary Workarounds

Disable WebAssembly

all

Prevents execution of wasm content, mitigating the vulnerability but breaking functionality.

In Firefox/Thunderbird: Set javascript.options.wasm to false in about:config

🧯 If You Can't Patch

  • Restrict access to untrusted websites and email content.
  • Use application sandboxing or isolation techniques to limit potential damage.

🔍 How to Verify

Check if Vulnerable:

Check application version in Help > About. If version is below patched versions, system is vulnerable.

Check Version:

firefox --version or thunderbird --version on Linux/macOS; check About dialog on Windows.

Verify Fix Applied:

Confirm version is Thunderbird ≥ 91.4.0, Firefox ESR ≥ 91.4.0, or Firefox ≥ 95.

📡 Detection & Monitoring

Log Indicators:

  • Application crash logs referencing wasm or memory corruption
  • Unexpected process termination

Network Indicators:

  • Unusual wasm module downloads or execution patterns

SIEM Query:

source="*browser.log" AND ("crash" OR "segfault") AND "wasm"

🔗 References

📤 Share & Export