Your submission was sent successfully! Close

CVE-2021-43527

Published: 1 December 2021

NSS (Network Security Services) versions prior to 3.73 or 3.68.1 ESR are vulnerable to a heap overflow when handling DER-encoded DSA or RSA-PSS signatures. Applications using NSS for handling signatures encoded within CMS, S/MIME, PKCS \#7, or PKCS \#12 are likely to be impacted. Applications using NSS for certificate validation or other TLS, X.509, OCSP or CRL functionality may be impacted, depending on how they configure NSS. *Note: This vulnerability does NOT impact Mozilla Firefox.* However, email clients and PDF viewers that use NSS for signature verification, such as Thunderbird, LibreOffice, Evolution and Evince are believed to be impacted. This vulnerability affects NSS < 3.73 and NSS < 3.68.1.

Notes

AuthorNote
mdeslaur
thunderbird 91.3.0 already shipped a work-around for this issue,
which is now known as CVE-2021-43529, but thunderbird 91.4.0
will also fix the nss issue to prevent secondary attack vectors.
Priority

High

CVSS 3 base score: 9.8

Status

Package Release Status
nss
Launchpad, Ubuntu, Debian
bionic
Released (2:3.35-2ubuntu2.13)
focal
Released (2:3.49.1-1ubuntu1.6)
hirsute
Released (2:3.61-1ubuntu2.1)
impish
Released (2:3.68-1ubuntu1.1)
jammy
Released (2:3.68-1ubuntu2)
trusty
Released (2:3.28.4-0ubuntu0.14.04.5+esm10)
upstream Needs triage

xenial
Released (2:3.28.4-0ubuntu0.16.04.14+esm2)
thunderbird
Launchpad, Ubuntu, Debian
bionic
Released (1:78.14.0+build1-0ubuntu0.18.04.2)
focal
Released (1:78.14.0+build1-0ubuntu0.20.04.2)
hirsute
Released (1:78.14.0+build1-0ubuntu0.21.04.2)
impish
Released (1:91.3.1+build1-0ubuntu0.21.10.2)
jammy
Released (1:91.4.0+build1.1-0ubuntu1)
trusty Does not exist

upstream
Released (91.4.0)
xenial Needed