Exim before 4.99.3, in certain GnuTLS configurations, has a remotely reachable use-after-free in the BDAT body parsing path. It is triggered when a client sends a TLS close_notify mid-body during a CHUNKING transfer, followed by a final cleartext byte on the same TCP connection. This can lead to heap corruption. An unauthenticated network attacker exploiting this vulnerability could execute arbitrary code.
Metrics
Affected Vendors & Products
References
History
Tue, 12 May 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Use‑After‑Free Leading to Remote Code Execution in BDAT Parsing of Exim |
Tue, 12 May 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Exim
Exim exim |
|
| Weaknesses | CWE-416 | |
| CPEs | cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Exim
Exim exim |
|
| Metrics |
cvssV3_1
|
Tue, 12 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Exim before 4.99.3, in certain GnuTLS configurations, has a remotely reachable use-after-free in the BDAT body parsing path. It is triggered when a client sends a TLS close_notify mid-body during a CHUNKING transfer, followed by a final cleartext byte on the same TCP connection. This can lead to heap corruption. An unauthenticated network attacker exploiting this vulnerability could execute arbitrary code. | |
| References |
|
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-13T01:36:58.116Z
Reserved: 2026-05-10T00:00:00.000Z
Link: CVE-2026-45185
No data.
Status : Received
Published: 2026-05-12T20:16:46.137
Modified: 2026-05-12T21:16:16.807
Link: CVE-2026-45185
No data.
OpenCVE Enrichment
Updated: 2026-05-13T00:15:27Z