CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Exim BDAT Memory Corruption Flaw in GnuTLS Builds Enables Code Execution

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

A severe use-after-free vulnerability in Exim's BDAT message body parsing under GnuTLS configurations allows unauthenticated attackers to trigger memory corruption and achieve code execution. Exim versions 4.97 through 4.99.2 using USE_GNUTLS=yes are affected. Attackers need only establish a TLS connection and leverage the CHUNKING (BDAT) SMTP extension to exploit the flaw. The issue arises when a TLS close_notify alert is sent before BDAT body transfer completes, followed by a residual cleartext byte that writes to a freed memory buffer during session teardown, corrupting the allocator metadata. Exploitation grants further primitives for code execution.

Timeline

  1. 12.05.2026 19:44 1 articles · 3h ago

    Exim BDAT Use-After-Free Vulnerability (CVE-2026-45185) in GnuTLS Builds Patched

    Exim released version 4.99.3 on May 12, 2026, to address CVE-2026-45185, a use-after-free flaw in BDAT parsing when GnuTLS is used. The vulnerability allows unauthenticated attackers to achieve code execution via a crafted TLS close_notify sequence. All Exim builds using GnuTLS from versions 4.97 to 4.99.2 are affected. Exploitation requires a TLS connection and BDAT support; no mitigations exist beyond upgrading to 4.99.3.

    Show sources

Information Snippets