ctipilot.ch

Exim Dead.Letter — BDAT/CHUNKING UAF on GnuTLS builds, pre-auth RCE (CVSS 9.8, ENISA critical); fixed in Exim 4.99.3

cve · CVE-2026-45185

Coverage timeline
2
first 2026-05-13 → last 2026-05-13
Briefs
1
1 distinct
Sources cited
7
7 hosts
Sections touched
2
action_items, trending_vulns
Co-occurring entities
0
no co-occurrence

Story timeline

  1. 2026-05-13CTI Daily Brief — 2026-05-13
    trending_vulnsNew XBOW disclosure 2026-05-12; ENISA EUVD-2026-29824 critical; default Debian/Ubuntu MTA affected.
  2. 2026-05-13CTI Daily Brief — 2026-05-13
    action_itemsAction item referencing in-brief detail.

Where this entity is cited

  • trending_vulns1
  • action_items1

Source distribution

  • openwall.com1 (14%)
  • thehackernews.com1 (14%)
  • xbow.com1 (14%)
  • anwalt.de1 (14%)
  • heise.de1 (14%)
  • therecord.media1 (14%)
  • theregister.com1 (14%)

Items in briefs about Exim Dead.Letter — BDAT/CHUNKING UAF on GnuTLS builds, pre-auth RCE (CVSS 9.8, ENISA critical); fixed in Exim 4.99.3 (1)

CVE-2026-45185 — Exim "Dead.Letter" use-after-free in BDAT/CHUNKING on GnuTLS builds

From CTI Daily Brief — 2026-05-13 · published 2026-05-13 · view item permalink →

XBOW disclosed CVE-2026-45185 on 2026-05-12 after a coordinated-disclosure window with Exim maintainers, Linux distros and CVE authorities that began 2026-05-01 (XBOW research, 2026-05-12; oss-security, 2026-05-12; The Hacker News, 2026-05-12). The bug is a use-after-free (CWE-416) in Exim's BDAT (RFC 3030 CHUNKING) body-parser when the binary was built with GnuTLS (USE_GNUTLS=yes) — the default on Debian and Ubuntu packages. OpenSSL builds are unaffected. The trigger: an SMTP client sends a TLS close_notify mid-BDAT body, then one final cleartext byte on the same TCP connection. Exim's xfer_buffer has already been freed in tls_close(), but the BDAT lwr_receive_* function pointers remain live and tls_ungetc() writes a single \n byte into the freed region. XBOW's AI-driven exploitation (within the seven-day disclosure window) produced two working chains under ASLR: a largebin-corruption → FILE struct hijack chain on No-PIE builds, and a storeblock length-inflation → bump-pointer corruption → ${run} ACL execution chain on PIE builds. No authentication is required; the CHUNKING extension is default-on. Fixed in Exim 4.99.3. CVSS 9.8 per the XBOW disclosure. No public exploitation reported at disclosure, but exim.org is the dominant MTA on the public internet and the GnuTLS default on Debian / Ubuntu maps directly to the typical EU university, academic-research and small-government mail-relay estate. Detection / hunt concepts mapped to T1190 Exploit Public-Facing Application and T1499.004 Endpoint Denial of Service: Application or System Exploitation: monitor exim panic.log for tls_ungetc traces and segfaults under non-zero load; egress-monitor any outbound TCP from the MTA host that does not match the usual upstream-relay set; on Debian / Ubuntu, audit exim -bV | grep GnuTLS per host. Workaround pending patch: set CHUNKING_ADVERTISE_HOSTS = (empty) in exim4.conf to suppress the BDAT advertisement.