Metrics
Affected Vendors & Products
Wed, 13 May 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 13 May 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Wed, 13 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 12 May 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Use‑After‑Free Leading to Remote Code Execution in BDAT Parsing of Exim |
Tue, 12 May 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Exim
Exim exim |
|
| Weaknesses | CWE-416 | |
| CPEs | cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Exim
Exim exim |
|
| Metrics |
cvssV3_1
|
Tue, 12 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Exim before 4.99.3, in certain GnuTLS configurations, has a remotely reachable use-after-free in the BDAT body parsing path. It is triggered when a client sends a TLS close_notify mid-body during a CHUNKING transfer, followed by a final cleartext byte on the same TCP connection. This can lead to heap corruption. An unauthenticated network attacker exploiting this vulnerability could execute arbitrary code. | |
| References |
|
|
Status: PUBLISHED
Assigner: mitre
Published: 2026-05-12T00:00:00.000Z
Updated: 2026-05-13T13:31:31.294Z
Reserved: 2026-05-10T00:00:00.000Z
Link: CVE-2026-45185
Updated: 2026-05-13T01:36:58.116Z
Status : Awaiting Analysis
Published: 2026-05-12T20:16:46.137
Modified: 2026-05-13T15:52:25.637
Link: CVE-2026-45185
No data.