SB2026051365 - Remote code execution in Exim



SB2026051365 - Remote code execution in Exim

Published: May 13, 2026

Security Bulletin ID SB2026051365
CSH Severity
Critical
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Critical 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 vulnerability.


1) Use-after-free (CVE-ID: CVE-2026-45185)

The vulnerability allows a remote attacker to execute arbitrary code.

The vulnerability exists due to use-after-free in Exim's GnuTLS backend when handling BDAT message body transfers after a TLS close_notify alert is received before the transfer is complete. A remote attacker can send a TLS close_notify alert and then a final byte in cleartext on the same TCP connection to execute arbitrary code.

Only builds configured with USE_GNUTLS=yes are vulnerable, and exploitation requires use of the CHUNKING (BDAT) SMTP extension.


Remediation

Install update from vendor's website.