In Exim before 4.99.2, on systems using musl libc (not glibc), an attacker can crash the connection instance when malformed DNS data is present in PTR records. This is caused by a dn_expand oddity in octal printing.
References
| Link | Resource |
|---|---|
| https://code.exim.org/exim/exim/commit/628bbaca7672748d941a12e7cd5f0122a4e18c81 | Patch |
| https://exim.org/static/doc/security/CVE-2026-40684.txt | Broken Link |
| https://exim.org/static/doc/security/cve-2026-04.1/CVE2026-40684.assessment | Vendor Advisory |
| https://www.openwall.com/lists/oss-security/2026/04/30/21 | Mailing List Third Party Advisory |
| http://www.openwall.com/lists/oss-security/2026/05/01/11 |
Configurations
History
01 May 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
01 May 2026, 17:51
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:* | |
| First Time |
Exim
Exim exim |
|
| References | () https://code.exim.org/exim/exim/commit/628bbaca7672748d941a12e7cd5f0122a4e18c81 - Patch | |
| References | () https://exim.org/static/doc/security/CVE-2026-40684.txt - Broken Link | |
| References | () https://exim.org/static/doc/security/cve-2026-04.1/CVE2026-40684.assessment - Vendor Advisory | |
| References | () https://www.openwall.com/lists/oss-security/2026/04/30/21 - Mailing List, Third Party Advisory |
01 May 2026, 02:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
30 Apr 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-30 22:16
Updated : 2026-05-01 18:16
NVD link : CVE-2026-40684
Mitre link : CVE-2026-40684
CVE.ORG link : CVE-2026-40684
JSON object : View
Products Affected
exim
- exim
CWE
CWE-684
Incorrect Provision of Specified Functionality
