Exim has released security updates to fix a critical vulnerability that could lead to memory corruption and potential remote code execution on affected email servers. The flaw, tracked as CVE-2026-45185 and nicknamed Dead.Letter, affects Exim’s handling of binary data transmission (BDAT) message parsing when TLS connections are managed through GnuTLS. The vulnerability occurs when an attacker establishes a TLS connection, sends a BDAT message, and intentionally interrupts the transfer by issuing a TLS close_notify alert before completion. If the attacker then sends an additional byte of cleartext data on the same connection, Exim may attempt to write data to a memory buffer that has already been released. This can result in heap corruption and may allow attackers to execute malicious code on vulnerable systems. The issue impacts Exim versions 4.97 through 4.99.2 configured with USE_GNUTLS=yes. Systems using other TLS libraries such as OpenSSL are not affected. The flaw was discovered by XBOW Security Lab researcher Federico Kirschbaum. Security researchers described it as one of the most serious Exim vulnerabilities identified in recent years due to the low complexity required for exploitation. The issue has been resolved in Exim version 4.99.3, and users are strongly advised to upgrade immediately, as no alternative mitigations are currently available.
Cybersecurity researchers recently identified a renewed phishing operation connected to the Tycoon 2FA Phishing as a Service platform, demonstrating how attackers are changing tact...
Apple’s latest M5 silicon, promoted as one of the most secure processor architectures ever developed for macOS, has reportedly been compromised in the first public kernel memory ...
A recently disclosed vulnerability in Android 16 has sparked privacy concerns after security researchers discovered that malicious applications can bypass VPN protections and expos...