← back

CVE-2026-45185

EPSS 0.1%
hype LIKELY HACK · 68 hack

Researcher PoC published, active scanning interest, but no KEV-listing or confirmed production impact yet.

What: Use-after-free in Exim <4.99.3 BDAT body parsing under GnuTLS, triggered by TLS close_notify mid-transfer; unauthenticated RCE via heap corruption.

Why it matters: Published 1 day ago; social chatter highlights active researcher interest (XBOW team publicizing discovery). No KEV-listing yet but NVD confirms unauthenticated RCE. Heavy FOFA scanning signal (6M+ instances tracked). Exim is widely deployed in mail infrastructure; patch availability status unclear from posts.

Where it's seen: FOFA threat-intel alerts, Dead Letter research blog posts, Hacker News discussion, security researcher commentary on RCE discovery mechanics. No confirmed in-the-wild exploitation or defender triage reports visible yet.

RISK: HIGH — Unauthenticated RCE in mail server affecting millions of exposed instances; patch unknown.

Generated by claude-haiku-4-5 from public posts and authoritative metadata. AI can make mistakes — verify against vendor advisories before acting. 5/13/2026, 4:14:35 AM

Description

Exim before 4.99.3, in certain GnuTLS configurations, has a remotely reachable use-after-free in the BDAT body parsing path. It is triggered when a client sends a TLS close_notify mid-body during a CHUNKING transfer, followed by a final cleartext byte on the same TCP connection. This can lead to heap corruption. An unauthenticated network attacker exploiting this vulnerability could execute arbitrary code.