May 12, 2026
Mail server meltdown, comment section chaos
Dead.letter (CVE-2026-45185) Humans vs. LLM for Unauthenticated RCE Race on Exim
A tiny bug sparked big panic, snark, and a fresh round of “not Exim again”
TLDR: XBOW found a dangerous Exim mail-server flaw that could let outsiders seize control, then turned the fix window into a humans-vs-AI exploit race. Commenters mostly responded with snark, rollout confusion, and weary “not this again” energy, with side-eye aimed at both Exim and GNU tooling.
Security researchers at XBOW dropped a seriously scary finding: a flaw in Exim, a widely used mail server, that could let strangers take over a machine from afar with no login needed. Even spicier, they used the disclosure period to stage a humans vs. AI showdown, testing whether a seasoned exploit writer or an autonomous large language model could get farther, faster. That alone was enough to light up the comments, but the crowd quickly turned the whole thing into a mix of dread, eye-rolling, and gallows humor.
The strongest vibe? Exasperation. One commenter basically summed up the room with, “Ok now do postfix,” turning a major security report into a deadpan sequel request. Others were less amused by the article’s dramatic prose than by the bug itself, with one reader instantly recoiling at the “this is a story” intro: “Gag.” And then there was the classic blame game. Because the issue shows up when Exim is using GnuTLS, one commenter pulled out the old “GNU and security problems” trope and acted like this was the least shocking twist imaginable.
Meanwhile, the practical crowd was annoyed for a totally different reason: the release process sounded messy. One person complained that security notices were landing without matching details, which made the supposedly coordinated rollout feel anything but coordinated. Add in commenters linking older Exim disasters from 2023 and 2020, and the mood became clear: part panic, part meme, part “here we go again.”
Key Points
- •XBOW disclosed CVE-2026-45185 as a critical unauthenticated remote code execution vulnerability in Exim.
- •The bug is a use-after-free in Exim's TLS handling path when connections use GnuTLS.
- •During TLS shutdown, a nested BDAT receive wrapper can still process input and call `ungetc()`, writing a newline into freed memory.
- •The article says that one-byte write corrupts Exim allocator metadata and can be developed into a full remote code execution exploit.
- •The technical walkthrough uses Exim 4.97 as shipped by default in Debian-based distributions including Ubuntu 24.04 LTS and begins from the STARTTLS handling path in `src/smtp_in.c`.