<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>User-After-Free — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/user-after-free/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 13 May 2026 20:24:53 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/user-after-free/feed.xml" rel="self" type="application/rss+xml"/><item><title>Exim Mail Transfer Agent User-After-Free Remote Code Execution Vulnerability (CVE-2026-45185)</title><link>https://feed.craftedsignal.io/briefs/2026-05-exim-rce/</link><pubDate>Wed, 13 May 2026 20:24:53 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-exim-rce/</guid><description>CVE-2026-45185, a user-after-free vulnerability in Exim versions 4.97 through 4.99.2, allows an unauthenticated remote attacker to execute arbitrary code by sending crafted SMTP traffic with BDAT chunking during TLS shutdown.</description><content:encoded><![CDATA[<p>A critical vulnerability, CVE-2026-45185, affects Exim mail transfer agent versions 4.97 through 4.99.2 when built with the default GNU Transport Layer Security (GnuTLS) library. This user-after-free (UAF) flaw is triggered during the TLS shutdown process while handling BDAT chunked SMTP traffic. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary code on the server. Exim is a widely deployed open-source mail transfer agent used on Linux and Unix servers, including shared hosting environments, enterprise mail systems, and Debian- and Ubuntu-based distributions where it has historically been the default mail server. The vulnerability impacts Exim versions 4.97 through 4.99.2 on builds compiled with GnuTLS that have STARTTLS and CHUNKING advertised. A fix is available in Exim version 4.99.3.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker establishes a connection to the Exim server over SMTP.</li>
<li>The attacker initiates a TLS handshake using the STARTTLS command, which is supported by the server.</li>
<li>The attacker sends SMTP traffic with BDAT chunking.</li>
<li>During the TLS shutdown process, Exim incorrectly frees a TLS transfer buffer due to the user-after-free vulnerability (CVE-2026-45185).</li>
<li>Exim continues to use stale callback references, attempting to write data into the freed memory region.</li>
<li>The attacker leverages this memory corruption to overwrite critical data structures, gaining control of program execution.</li>
<li>The attacker executes arbitrary commands on the server with the privileges of the Exim process.</li>
<li>The attacker can then access Exim data and emails, and potentially pivot further into the environment depending on server permissions and configuration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-45185 allows an unauthenticated remote attacker to execute arbitrary code on the Exim server. This could lead to complete system compromise, including unauthorized access to sensitive data such as emails, and the ability to pivot to other systems within the network. Given Exim&rsquo;s widespread deployment, a successful attack could impact numerous organizations, particularly those using Debian and Ubuntu-based Linux distributions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the available Exim updates (v4.99.3) through your package managers on Ubuntu and Debian-based Linux distributions to patch CVE-2026-45185.</li>
<li>Monitor network traffic for suspicious SMTP connections using STARTTLS and BDAT chunking to detect potential exploitation attempts. Use the &ldquo;Detect Exim CVE-2026-45185 Exploitation Attempt via SMTP BDAT&rdquo; Sigma rule.</li>
<li>Consider disabling STARTTLS or CHUNKING features in Exim if immediate patching is not feasible, but be aware of the potential impact on email functionality.</li>
<li>Enable process creation logging on Exim servers to assist in detecting potential attacker-initiated processes post-exploitation, as covered by the &ldquo;Detect Exim CVE-2026-45185 Exploitation - Process Creation&rdquo; Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>exim</category><category>rce</category><category>vulnerability</category><category>cve-2026-45185</category><category>user-after-free</category><category>gnutls</category></item></channel></rss>