In Exim before 4.99.2, on systems using musl libc (not glibc), an attacker can crash the connection instance when malformed DNS data is present in PTR records. This is caused by a dn_expand oddity in octal printing.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 30 Apr 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Exim before 4.99.2, on systems using musl libc (not glibc), an attacker can crash the connection instance when malformed DNS data is present in PTR records. This is caused by a dn_expand oddity in octal printing. | |
| First Time appeared |
Exim
Exim exim |
|
| Weaknesses | CWE-684 | |
| CPEs | cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Exim
Exim exim |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-30T21:23:47.370Z
Reserved: 2026-04-14T00:00:00.000Z
Link: CVE-2026-40684
No data.
Status : Received
Published: 2026-04-30T22:16:25.477
Modified: 2026-04-30T22:16:25.477
Link: CVE-2026-40684
No data.
OpenCVE Enrichment
No data.
Weaknesses