First published: Wed Nov 03 2021(Updated: )
Thunderbird versions prior to 91.3.0 are vulnerable to the heap overflow described in CVE-2021-43527 when processing S/MIME messages. Thunderbird versions 91.3.0 and later will not call the vulnerable code when processing S/MIME messages that contain certificates with DER-encoded DSA or RSA-PSS signatures.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Thunderbird | <91.3 | 91.3 |
<91.3 | 91.3 | |
Mozilla Thunderbird | <91.3.0 | |
debian/thunderbird | 1:91.12.0-1~deb10u1 1:115.3.1-1~deb10u1 1:102.13.1-1~deb11u1 1:115.3.1-1~deb11u1 1:102.15.1-1~deb12u1 1:115.3.1-1~deb12u1 1:115.3.1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The severity of CVE-2021-43529 is critical.
Thunderbird versions prior to 91.3.0 and certain Debian Thunderbird versions are affected.
Update Thunderbird to version 91.3.0 or later, or apply the appropriate Debian package upgrades.
CVE-2021-43529 is a heap overflow vulnerability in Thunderbird when processing S/MIME messages.
More information about CVE-2021-43529 can be found in the references provided.