Critical Alert: Exim with GnuTLS exposed to remote execution by failure use-after-free in BDAT (CVE-2026-45185)

Published 4 min de lectura 59 reading

Exim has published a critical update that corrects a post-memory-release vulnerability (use-after-free) in the analysis of the BDAT message body when the TLS battery is implemented with GnuTLS. Identified as CVE-2026-45185 (Dead.Letter), the failure allows a client who can establish a TLS connection to cause heap corruption and potentially run remote code without authentication, taking advantage of the CHUNKING (BDAT) extension of the SMTP protocol.

From the technical point of view, the error appears during the TLS closing sequence: if a client sends a close _ notify alert before completing the BDAT transfer and then injects a clear text byte on the same TCP connection, Exim can end up writing on an already released buffer. That only byte overwrites memory assignment metadata, which opens the way to exploitation techniques that scale corruption into useful primitives for an attacker. The discovery was reported by Federico Kirschbaum of XBOW on May 1, 2026 and the correction has been included in the version 4.99.3.

Critical Alert: Exim with GnuTLS exposed to remote execution by failure use-after-free in BDAT (CVE-2026-45185)
Image generated with IA.

Vulnerability affects Exim series from 4.97 to 4.99.2, but with a significant exception: only impacts binaries compiled with USE _ GNUTLS = yes. The deployments using other TLS libraries such as OpenSSL are not affected by this particular failure. This forces administrators to verify not only the package version, but also how their Exim was compiled.

The operation of the failure requires no prior privileges or authentication, and is based only on the ability to negotiate a TLS session and use BDAT. In practice this means that exposed mail servers that announce CHUNKING in their EHLO response and that have been compiled with GnuTLS can be attacked from the network. Since the necessary sequence is relatively simple and the failure alters internal structures of the locator, researchers call it a very high risk.

The immediate recommendations are clear: update Exim to version 4.99.3 as soon as possible. There are no complete mitigation to replace the patch as per the project's notice, so remaining in previous versions leaves the infrastructure at risk. If you cannot apply the update immediately, consider temporary mitigation measures until it is possible to park: restrict the access of unreliable customers to the SMTP service through control lists and firewalls, temporarily remove TLS support based on GnuTLS or add up Exim using another TLS library (e.g. OpenSSL) if that is feasible in your environment.

To quickly check the TLS version and configuration of your installation you can run Exim commands to view the installed version and, in many systems, review whether Exim was compiled with GnuTLS. A practical approach is to consult the exim -bV output or system packaging documentation, and check if your server announces CHUNKING in the EHLO negotiation. In addition, monitor Ads by unexpected reboot, core s or BDAT patterns combined with TLS closures, as attempts to operate may leave traces in connection records and process failures.

In the medium-term operational plane, it is appropriate to incorporate these actions: implement inventory management that distinguishes not only software versions but compilation options, automate tests in staging environments before deploying critical updates, and review the SMTP service exposure surface (which ports and which customers are authorized). It is also recommended to have signature-based detection and TLS / SMTP traffic analysis to identify unusual sequences related to BDAT and close _ notify.

Critical Alert: Exim with GnuTLS exposed to remote execution by failure use-after-free in BDAT (CVE-2026-45185)
Image generated with IA.

This episode recalls dangerous precedents: Exim had already patched an extremely critical after-free use in 2017 (CVE-2017-16943), which allowed remote exploitation by BDAT. The recurrence of BDAT management failures underlines the complexity of implementing protocol extensions that interact with TLS session closures and buffer management. Maintaining up-to-date TLS and MTA libraries is an essential preventive measure.

You can find the release and resources of the Exim project on your official website https: / / www.exim.org / and consult the vulnerability register in the national vulnerability database in https: / / nvd.nist.gov / vuln / detail / CVE-2026-45185. For information on the above TLS libraries, see https: / / www.gnutls.org / and https: / / www.openssl.org /.

In short: identify which hosts run Exim compiled with GnuTLS, prioritize the update to Exim 4.99.3, monitor signs of exploitation in the records and, if you cannot park immediately, apply access controls and consider temporary compilation alternatives to reduce exposure. The gravity and simplicity of the exploitable sequence make this vulnerability a priority for mail managers in production.

Coverage

Related

More news on the same subject.