Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Exim Vulnerability Puts GnuTLS Builds at Risk

Critical Exim Vulnerability Puts GnuTLS Builds at Risk

Posted on May 12, 2026 By CWS

Exim, an open-source Mail Transfer Agent (MTA) for Unix-like systems, has issued security patches addressing a critical vulnerability that could lead to memory corruption and potential code execution. The flaw, identified as CVE-2026-45185, affects Exim versions 4.97 to 4.99.2 when configured with GnuTLS.

Understanding the Vulnerability

The vulnerability, named Dead.Letter, is a use-after-free issue in Exim’s handling of binary data transmission (BDAT) message bodies during TLS sessions managed by GnuTLS. This flaw is triggered when a client sends a TLS close_notify alert prior to completing the body transfer, followed by a final byte in cleartext on the same connection.

Such a sequence can result in Exim writing to a memory buffer that has already been released, leading to heap corruption. Attackers exploiting this weakness merely need to establish a TLS connection using the CHUNKING (BDAT) SMTP extension.

Affected Versions and Discovery

This vulnerability impacts all Exim builds from version 4.97 up to 4.99.2, specifically those using the USE_GNUTLS=yes configuration. Builds using other TLS libraries like OpenSSL remain unaffected.

Federico Kirschbaum from XBOW, a cybersecurity testing platform, discovered and reported the issue on May 1, 2026. Kirschbaum noted that during TLS shutdown, Exim releases its TLS transfer buffer, yet a nested BDAT receive wrapper might still process incoming bytes, leading to buffer corruption.

Mitigation and Future Outlook

Exim has addressed this vulnerability in its latest release, version 4.99.3, advising all users to update immediately as no mitigations exist to resolve the issue. The update ensures the input processing stack is reset when a TLS close notification is received during BDAT transfers, preventing the use of obsolete pointers.

This is not the first time Exim has encountered critical use-after-free vulnerabilities. In 2017, a similar flaw was patched that could have allowed attackers to execute remote code through crafted BDAT commands. Such incidents highlight the ongoing need for vigilance and timely updates in software security.

As this vulnerability underscores the potential risks in email server configurations, organizations are urged to prioritize the updating of their Exim installations to safeguard against exploitation.

The Hacker News Tags:CVE-2026-45185, Cybersecurity, email security, email servers, Exim, Exim patch, Exim update, GnuTLS, heap corruption, open-source MTA, security update, Software Security, TLS connection, use-after-free, Vulnerability

Post navigation

Previous Post: Critical Open WebUI Flaw Enables Easy RCE Attacks
Next Post: Microsoft Addresses 137 Security Vulnerabilities

Related Posts

Apple Tests Encrypted RCS Messaging in iOS Beta Apple Tests Encrypted RCS Messaging in iOS Beta The Hacker News
Researchers Uncover Malware in Fake Discord PyPI Package Downloaded 11,500+ Times Researchers Uncover Malware in Fake Discord PyPI Package Downloaded 11,500+ Times The Hacker News
GitHub Vulnerability in Codespaces Exposes GITHUB_TOKEN GitHub Vulnerability in Codespaces Exposes GITHUB_TOKEN The Hacker News
New ZuRu Malware Variant Targeting Developers via Trojanized Termius macOS App New ZuRu Malware Variant Targeting Developers via Trojanized Termius macOS App The Hacker News
Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android The Hacker News
Cybercriminals Exploit Remote Monitoring Tools to Infiltrate Logistics and Freight Networks Cybercriminals Exploit Remote Monitoring Tools to Infiltrate Logistics and Freight Networks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Addresses 137 Security Vulnerabilities
  • Critical Exim Vulnerability Puts GnuTLS Builds at Risk
  • Critical Open WebUI Flaw Enables Easy RCE Attacks
  • Adobe Releases Urgent Security Updates for 52 Vulnerabilities
  • RubyGems Halts New Accounts Amid Malicious Package Surge

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Addresses 137 Security Vulnerabilities
  • Critical Exim Vulnerability Puts GnuTLS Builds at Risk
  • Critical Open WebUI Flaw Enables Easy RCE Attacks
  • Adobe Releases Urgent Security Updates for 52 Vulnerabilities
  • RubyGems Halts New Accounts Amid Malicious Package Surge

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark