radar

ONE Sentinel

securitySecurity/THREATS/CRIT

New Exim BDAT Vulnerability Exposes GnuTLS Builds to Potential Code Execution

sourceThe Hacker News
calendar_todayMay 12, 2026
schedule1 min read
lightbulb

EXECUTIVE SUMMARY

Exim BDAT Vulnerability Poses Critical Threat to GnuTLS Builds

Summary

Exim has issued security updates to mitigate a critical vulnerability in certain configurations of its Mail Transfer Agent (MTA) software. This flaw, identified as CVE-2026-45185, could lead to memory corruption and potential code execution.

Key Points

  • The vulnerability is tracked as CVE-2026-45185, also known as Dead.Letter.
  • It affects Exim, an open-source MTA for Unix-like systems.
  • The issue involves a use-after-free scenario that can result in memory corruption.
  • Successful exploitation could allow attackers to execute arbitrary code.
  • Exim has released patches to address this vulnerability.

Analysis

The CVE-2026-45185 vulnerability in Exim is significant due to its potential for remote code execution, which could allow attackers to gain control over affected systems. Given Exim's widespread use in Unix-like environments, this vulnerability poses a substantial risk to organizations relying on this MTA for email services. Timely application of the provided security patches is crucial to mitigate potential exploitation.

Conclusion

IT professionals should prioritize applying the latest security updates from Exim to protect against CVE-2026-45185. Regularly reviewing and updating software configurations can help prevent similar vulnerabilities from being exploited in the future.