Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 13 May 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 13 May 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Wed, 13 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 12 May 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Use‑After‑Free Leading to Remote Code Execution in BDAT Parsing of Exim |
Tue, 12 May 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Exim
Exim exim |
|
| Weaknesses | CWE-416 | |
| CPEs | cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Exim
Exim exim |
|
| Metrics |
cvssV3_1
|
Tue, 12 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Exim before 4.99.3, in certain GnuTLS configurations, has a remotely reachable use-after-free in the BDAT body parsing path. It is triggered when a client sends a TLS close_notify mid-body during a CHUNKING transfer, followed by a final cleartext byte on the same TCP connection. This can lead to heap corruption. An unauthenticated network attacker exploiting this vulnerability could execute arbitrary code. | |
| References |
|
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-14T03:55:55.967Z
Reserved: 2026-05-10T00:00:00.000Z
Link: CVE-2026-45185
Updated: 2026-05-13T01:36:58.116Z
Status : Awaiting Analysis
Published: 2026-05-12T20:16:46.137
Modified: 2026-05-13T15:52:25.637
Link: CVE-2026-45185
No data.
OpenCVE Enrichment
Updated: 2026-05-13T00:15:27Z