Exim before 4.99.3, in certain GnuTLS configurations, has a remotely reachable use-after-free in the BDAT body parsing path. It is triggered when a client sends a TLS close_notify mid-body during a CHUNKING transfer, followed by a final cleartext byte on the same TCP connection. This can lead to heap corruption. An unauthenticated network attacker exploiting this vulnerability could execute arbitrary code.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 12 May 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Use‑After‑Free Leading to Remote Code Execution in BDAT Parsing of Exim |
Tue, 12 May 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Exim
Exim exim |
|
| Weaknesses | CWE-416 | |
| CPEs | cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Exim
Exim exim |
|
| Metrics |
cvssV3_1
|
Tue, 12 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Exim before 4.99.3, in certain GnuTLS configurations, has a remotely reachable use-after-free in the BDAT body parsing path. It is triggered when a client sends a TLS close_notify mid-body during a CHUNKING transfer, followed by a final cleartext byte on the same TCP connection. This can lead to heap corruption. An unauthenticated network attacker exploiting this vulnerability could execute arbitrary code. | |
| References |
|
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-12T20:08:08.207Z
Reserved: 2026-05-10T00:00:00.000Z
Link: CVE-2026-45185
No data.
Status : Received
Published: 2026-05-12T20:16:46.137
Modified: 2026-05-12T21:16:16.807
Link: CVE-2026-45185
No data.
OpenCVE Enrichment
Updated: 2026-05-12T22:00:22Z
Weaknesses