Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Exim Vulnerability Puts GnuTLS Builds at Risk

Critical Exim Vulnerability Puts GnuTLS Builds at Risk

Posted on May 12, 2026 By CWS

Exim, an open-source Mail Transfer Agent (MTA) for Unix-like systems, has issued security patches addressing a critical vulnerability that could lead to memory corruption and potential code execution. The flaw, identified as CVE-2026-45185, affects Exim versions 4.97 to 4.99.2 when configured with GnuTLS.

Understanding the Vulnerability

The vulnerability, named Dead.Letter, is a use-after-free issue in Exim’s handling of binary data transmission (BDAT) message bodies during TLS sessions managed by GnuTLS. This flaw is triggered when a client sends a TLS close_notify alert prior to completing the body transfer, followed by a final byte in cleartext on the same connection.

Such a sequence can result in Exim writing to a memory buffer that has already been released, leading to heap corruption. Attackers exploiting this weakness merely need to establish a TLS connection using the CHUNKING (BDAT) SMTP extension.

Affected Versions and Discovery

This vulnerability impacts all Exim builds from version 4.97 up to 4.99.2, specifically those using the USE_GNUTLS=yes configuration. Builds using other TLS libraries like OpenSSL remain unaffected.

Federico Kirschbaum from XBOW, a cybersecurity testing platform, discovered and reported the issue on May 1, 2026. Kirschbaum noted that during TLS shutdown, Exim releases its TLS transfer buffer, yet a nested BDAT receive wrapper might still process incoming bytes, leading to buffer corruption.

Mitigation and Future Outlook

Exim has addressed this vulnerability in its latest release, version 4.99.3, advising all users to update immediately as no mitigations exist to resolve the issue. The update ensures the input processing stack is reset when a TLS close notification is received during BDAT transfers, preventing the use of obsolete pointers.

This is not the first time Exim has encountered critical use-after-free vulnerabilities. In 2017, a similar flaw was patched that could have allowed attackers to execute remote code through crafted BDAT commands. Such incidents highlight the ongoing need for vigilance and timely updates in software security.

As this vulnerability underscores the potential risks in email server configurations, organizations are urged to prioritize the updating of their Exim installations to safeguard against exploitation.

The Hacker News Tags:CVE-2026-45185, Cybersecurity, email security, email servers, Exim, Exim patch, Exim update, GnuTLS, heap corruption, open-source MTA, security update, Software Security, TLS connection, use-after-free, Vulnerability

Post navigation

Previous Post: Critical Open WebUI Flaw Enables Easy RCE Attacks
Next Post: Microsoft Addresses 137 Security Vulnerabilities

Related Posts

Android Malware Operations Merge Droppers, SMS Theft, and RAT Capabilities at Scale Android Malware Operations Merge Droppers, SMS Theft, and RAT Capabilities at Scale The Hacker News
PhantomCore Exploits Russian Video Conferencing Software PhantomCore Exploits Russian Video Conferencing Software The Hacker News
FBI Alerts: Russian Hackers Phish WhatsApp, Signal Users FBI Alerts: Russian Hackers Phish WhatsApp, Signal Users The Hacker News
China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems The Hacker News
USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More The Hacker News
Linux-Based Lenovo Webcams’ Flaw Can Be Remotely Exploited for BadUSB Attacks Linux-Based Lenovo Webcams’ Flaw Can Be Remotely Exploited for BadUSB Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Exaforce Secures $125M to Advance AI-Driven SOC Platform
  • May 2026 Microsoft Patch Tuesday Fixes 120 Vulnerabilities
  • Microsoft Addresses 137 Security Vulnerabilities
  • Critical Exim Vulnerability Puts GnuTLS Builds at Risk
  • Critical Open WebUI Flaw Enables Easy RCE Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Exaforce Secures $125M to Advance AI-Driven SOC Platform
  • May 2026 Microsoft Patch Tuesday Fixes 120 Vulnerabilities
  • Microsoft Addresses 137 Security Vulnerabilities
  • Critical Exim Vulnerability Puts GnuTLS Builds at Risk
  • Critical Open WebUI Flaw Enables Easy RCE Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark