Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Hackers Compromise 170 npm Packages to Steal GitHub
May 14, 2026
Dell SupportAssist Updates Force Windows to BSOD Loop
May 14, 2026
Critical Exim Mailer Flaw Allows Remote Code Execution
May 14, 2026
Home/CyberSecurity News/Critical Exim Mailer Flaw Allows Remote Code Execution
CyberSecurity News

Critical Exim Mailer Flaw Allows Remote Code Execution

A critical vulnerability has emerged in the widely deployed Exim mail server, enabling unauthenticated attackers to execute arbitrary code. This severe flaw can lead to the full compromise of exposed...

Marcus Rodriguez
Marcus Rodriguez
May 14, 2026 2 Min Read
2 0

A critical vulnerability has emerged in the widely deployed Exim mail server, enabling unauthenticated attackers to execute arbitrary code. This severe flaw can lead to the full compromise of exposed servers.

Federico Kirschbaum, head of the Security Lab at XBOW, discovered and reported the issue, which has been dubbed Dead.Letter.

The vulnerability carries a massive CVSS severity score of 9.8, making it one of the highest-caliber bugs ever identified in the Exim ecosystem.

Organizations relying on this open-source mail server must take immediate action, as the exploit requires no special configuration and can be triggered silently without any user interaction.

Exim RCE Flaw Disclosed

The technical foundation of this exploit lies in a severe use-after-free memory corruption flaw tracked as CVE-2026-45185.

According to security advisories from Exim and independent analysis by CyCognito, the vulnerability resides specifically in the binary data transmission message body parsing logic when the GnuTLS library handles a TLS connection.

Threat actors can trigger the flaw by manipulating the connection sequence during an active transfer.

When an attacker sends a standard Transport Layer Security close notification alert before the binary data transfer is complete, and then immediately follows up with a final cleartext byte on the same TCP connection, the mail server becomes confused.

This precise sequence of events forces Exim to write into an internal memory buffer that had already been freed during the standard session teardown process.

By intentionally misdirecting a single byte of data, attackers can corrupt the memory allocator’s internal structure.

As XBOW researchers highlighted in their technical disclosure, this single-byte heap corruption is entirely sufficient to escalate privileges and achieve unauthenticated remote code execution.

Security experts emphasize that the attack only requires the ability to establish a secure connection and to use the standard SMTP chunking extension, both of which are enabled by default on modern deployments.

Despite the critical nature of the Dead. Letter vulnerability, the exposure is relatively specific to certain underlying infrastructure choices.

The Hacker News reports that the issue affects only Exim versions 4.97 through 4.99.2 when compiled with the GnuTLS library.

Builds that rely on alternative libraries, such as OpenSSL, remain entirely unaffected by this attack vector.

Consequently, the threat is highly concentrated on Debian, Ubuntu, and Debian-derived Linux distributions that ship the vulnerable packages by default. At the same time, systems like Red Hat Enterprise Linux are generally safe.

System administrators cannot rely on simple workarounds to mitigate this threat. The Exim development team has officially addressed the memory handling flaw in version 4.99.3, and security platforms universally advise upgrading immediately.

Because there are no viable configuration changes that completely resolve the vulnerability without breaking functionality, patching remains the only definitive defense.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitHackerPatchSecurityThreatVulnerability

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

Amazon Bug Exposed AI Chat Agents Via Custom Permissions

Next Post

Dell SupportAssist Updates Force Windows to BSOD Loop

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical GitLab Flaws Allow XSS and Unauthenticated Do
May 14, 2026
Hackers Exploit HWMonitor to Load Malicious Abuse Legitimate
May 14, 2026
Palo Alto PAN-OS 0-Day Exploited to Execute Arbitrary Code With
May 14, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us