CVE-2021-43537
Mozilla: Heap buffer overflow when using structured clone
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
An incorrect type conversion of sizes from 64bit to 32bit integers allowed an attacker to corrupt memory leading to a potentially exploitable crash. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.
Una conversión de tipo incorrecta de los tamaños de enteros de 64 bits a 32 bits permitía a un atacante corromper la memoria, conllevando a un bloqueo potencialmente explotable. Esta vulnerabilidad afecta a Thunderbird versiones anteriores a 91.4.0, Firefox ESR versiones anteriores a 91.4.0, y Firefox versiones anteriores a 95
The Mozilla Foundation Security Advisory describes this flaw as:
An incorrect type conversion of sizes from 64bit to 32bit integers allowed an attacker to corrupt memory leading to a potentially exploitable crash.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-11-08 CVE Reserved
- 2021-12-08 CVE Published
- 2024-08-04 CVE Updated
- 2024-08-23 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
- CWE-704: Incorrect Type Conversion or Cast
CAPEC
References (12)
URL | Tag | Source |
---|---|---|
https://lists.debian.org/debian-lts-announce/2021/12/msg00030.html | Mailing List | |
https://lists.debian.org/debian-lts-announce/2022/01/msg00001.html | Mailing List |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1738237 | 2024-02-02 | |
https://security.gentoo.org/glsa/202202-03 | 2024-02-02 | |
https://security.gentoo.org/glsa/202208-14 | 2024-02-02 | |
https://www.debian.org/security/2021/dsa-5026 | 2024-02-02 | |
https://www.debian.org/security/2022/dsa-5034 | 2024-02-02 | |
https://www.mozilla.org/security/advisories/mfsa2021-52 | 2024-02-02 | |
https://www.mozilla.org/security/advisories/mfsa2021-53 | 2024-02-02 | |
https://www.mozilla.org/security/advisories/mfsa2021-54 | 2024-02-02 | |
https://access.redhat.com/security/cve/CVE-2021-43537 | 2021-12-09 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2030106 | 2021-12-09 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Mozilla Search vendor "Mozilla" | Firefox Search vendor "Mozilla" for product "Firefox" | < 95.0 Search vendor "Mozilla" for product "Firefox" and version " < 95.0" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Esr Search vendor "Mozilla" for product "Firefox Esr" | < 91.4.0 Search vendor "Mozilla" for product "Firefox Esr" and version " < 91.4.0" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Thunderbird Search vendor "Mozilla" for product "Thunderbird" | < 91.4.0 Search vendor "Mozilla" for product "Thunderbird" and version " < 91.4.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 10.0 Search vendor "Debian" for product "Debian Linux" and version "10.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 11.0 Search vendor "Debian" for product "Debian Linux" and version "11.0" | - |
Affected
|