Skip to main content
Mallory
Critical3 public exploits

Dead.Letter: Remote UAF RCE in Exim BDAT/GnuTLS handling

CVE-2026-45185 is a remotely reachable use-after-free vulnerability in Exim’s BDAT body parsing path affecting Exim versions before 4.99.3 when built with GnuTLS. The flaw is triggered during SMTP CHUNKING/BDAT processing if a client sends a TLS close_notify in the middle of a BDAT body transfer and then sends a final cleartext byte on the same TCP connection. In the vulnerable state transition, Exim tears down the TLS session and frees the TLS transfer buffer, but nested BDAT receive wrappers can still reference the stale TLS callbacks and invoke ungetc()-style logic against the freed buffer. This results in a write into freed heap memory and consequent heap corruption. Public reporting indicates the issue affects Exim 4.97 through 4.99.2 with USE_GNUTLS=yes; OpenSSL-backed builds are not affected. The vulnerability is unauthenticated and network-reachable, and available reporting states it can be developed into arbitrary code execution.

Share:
Stay ahead

Get ahead of vulnerabilities like this

Mallory continuously monitors global threat intelligence and correlates it with your attack surface — so you know if you’re exposed before adversaries strike.

ANALYST BRIEF

Impact, mitigation & remediation

What it means. What to do now. For analysts and engineers who need to decide and keep moving.

Impact

What an attacker gets — and what they’ve been doing with it.

Successful exploitation can corrupt heap memory and may lead to unauthenticated remote code execution in the Exim process. Depending on the deployment and Exim’s runtime privileges, an attacker could execute commands on the mail server, access or tamper with email data handled by Exim, disrupt mail services, and potentially use the compromised host as a foothold for further movement within the environment. Reporting also characterizes the issue as remotely reachable and high severity, with CVSS 9.8.

Mitigation

If you can’t patch tonight, do this now.

The Exim advisory states there is no known complete mitigation other than upgrading. Where immediate patching is not possible, reducing exposure may be possible by disabling advertisement of the SMTP CHUNKING capability, e.g. via chunking_advertise_hosts, and by avoiding affected GnuTLS-based builds in favor of unaffected OpenSSL-backed builds where operationally feasible. These measures should be treated as temporary risk reduction, not a substitute for upgrading.

Remediation

Patch, then assume compromise.

Upgrade Exim to version 4.99.3 or later. The published Exim security release for 4.99.3 fixes the TLS teardown/BDAT interaction by resetting the input-processing state so stale pointers are not used after receipt of TLS close_notify during an active BDAT transfer. Systems running affected packaged builds should apply the vendor or distribution-provided Exim 4.99.3 update as soon as it is available.
PUBLIC EXPLOITS

Exploits

No valid public exploits — Mallory filtered out 3 candidates as fakes, detection scripts, or README-only repos.

VALID 0 / 3 TOTALView all

All candidate exploits were filtered out by Mallory's validation.

EXPOSURE SURFACE

Affected products & vendors

Products and vendors Mallory has correlated with this vulnerability. Open in Mallory to drill down to specific CPE configurations and version ranges.

VendorProductType
EximEximapplication

Vendor-confirmed product mapping. Mallory continuously reconciles against your asset inventory in the product.

ACTIVITY FEED

Recent activity

84 sources tracked across advisories, community write-ups, and news. Mallory keeps watching after this page renders.

84 SOURCESView all
The operational view lives in Mallory

See the full picture, correlated to your attack surface.

This page covers what’s public. Mallory adds the parts that aren’t — which of your assets are affected, which threat actors are using it right now, which detections to deploy, and what to do next.
Exposure mapping

Query your assets running an affected version, and investigate the blast radius.

Threat actor evidence

Every observed campaign linking this CVE to a named adversary.

Associated malware

Malware families riding this exploit, with evidence and IOCs.

Detection signatures

YARA, Sigma, Snort, and vendor rules — auto-deployed to your SIEM.

Vendor-by-vendor mapping

Cross-references every affected SKU, including bundled OEM variants.

Social activity73

Community discussion across Reddit, Mastodon, and other social sources.