PT-2026-40334 · Gnu+1 · Gnutls+1

Published

2026-05-12

·

Updated

2026-05-13

·

CVE-2026-45185

CVSS v3.1

9.8

Critical

VectorAV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions Exim versions 4.97 through 4.99.2
Description A use-after-free issue exists in Exim when compiled with GnuTLS, specifically within the BDAT body parsing path used during CHUNKING transfers. An unauthenticated network attacker can trigger this by establishing a TLS connection, starting a BDAT chunked transfer, sending a TLS close notify alert before the body is complete, and then sending a final cleartext byte (such as a newline character ) on the same TCP connection. This sequence causes Exim to free its TLS transfer buffer while the BDAT receive wrapper continues to process the trailing byte via the ungetc() function, writing into freed heap memory. This leads to heap corruption and can allow the attacker to execute arbitrary code. This issue does not affect builds using OpenSSL.
Recommendations Update Exim to version 4.99.3. As a temporary mitigation, consider limiting BDAT exposure or restricting SMTP access to minimize the risk of exploitation.

Fix

LPE

DoS

RCE

Use After Free

Weakness Enumeration

Related Identifiers

CVE-2026-45185

Affected Products

Exim
Gnutls