Dead.Letter (CVE-2026-45185) Unauthenticated RCE in Exim via...#2228
Open
carlospolop wants to merge 1 commit into
Open
Dead.Letter (CVE-2026-45185) Unauthenticated RCE in Exim via...#2228carlospolop wants to merge 1 commit into
carlospolop wants to merge 1 commit into
Conversation
Collaborator
Author
🔗 Additional ContextOriginal Blog Post: https://xbow.com/blog/dead-letter-cve-2026-45185-xbow-found-rce-exim Content Categories: Based on the analysis, this content was categorized under "Network Services Pentesting > 25,465,587 - Pentesting SMTP/s > Exim STARTTLS/BDAT GnuTLS UAF RCE, with possible cross-reference to Binary Exploitation > Use After Free". Repository Maintenance:
Review Notes:
Bot Version: HackTricks News Bot v1.0 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Dead.Letter / CVE-2026-45185 is a critical unauthenticated remote code execution vulnerability in Exim 4.97 as shipped in Debian-based default installations, including Ubuntu 24.04 LTS, when TLS is handled by GnuTLS. The bug is a use-after-free caused by an unsafe interaction between
STARTTLS,BDATchunking, TLS shutdown, Exim receive-callback stacking, and Exim/glibc allocation behavior. Triggering the bug requires almost no special s...🔧 Technical Details
Stale stacked-callback exploitation: Protocol parsers that implement modal sub-protocols by stacking callback tables can become vulnerable if teardown code only resets the top-level callbacks. In this case, BDAT saves the active TLS callbacks into
lwr_receive_*, then TLS shutdown resets onlyreceive_*to cleartext SMTP callbacks. The saved lower row still points totls_getc,tls_getbuf, andtls_ungetc, so later BDAT operations can invoke code belonging to a destroyed TLS layer.One-byte UAF through parser repair logic: A parser line-ending repair path can become a write primitive if it calls
ungetc()after the underlying buffer has been freed. Here, BDAT EOD handling repairs incomplete CR/LF state withbdat_ungetc('\n')orbdat_ungetc('\r'). Becausebdat_ungetc()delegates to stalelwr_receive_ungetc, it reachestls_ungetc()🤖 Agent ActionsDone.Updated:
src/network-services-pentesting/pentesting-smtp/README.mdWhat I added:
ungetc) becoming a 1-byte UAF writeWhy this location:
Validation:
mdbook buildcould not be run here becausemdbookis not installed in the environment.This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.