Plattform
curl
Komponente
curl
Behoben in
8.18.1
8.18.1
8.18.1
8.18.1
8.18.1
8.14.1
8.18.1
CVE-2026-3805 describes a Use-After-Free vulnerability discovered in curl. This flaw can lead to memory corruption when curl handles subsequent SMB requests to the same host. The vulnerability affects versions 8.13.0 through 8.18.0, and a fix is available in version 8.18.1. Prompt patching is recommended to prevent potential exploitation.
The Use-After-Free vulnerability in curl allows an attacker to potentially trigger a denial-of-service (DoS) condition by crafting malicious SMB requests. More critically, it could lead to arbitrary code execution if the freed memory contains sensitive data or if the attacker can control the data written to the memory location after it's freed. Successful exploitation could allow an attacker to gain control of the system running curl, potentially leading to data breaches, system compromise, or further malicious activity. This vulnerability is particularly concerning given curl's widespread use in various applications and systems for transferring data over the network.
CVE-2026-3805 was publicly disclosed on 2026-03-11. There is currently no indication of active exploitation or a KEV listing. Public proof-of-concept (PoC) code is not yet available, but the Use-After-Free nature of the vulnerability suggests it could be relatively easy to exploit once a PoC is developed. Monitor security advisories and threat intelligence feeds for updates.
Systems utilizing curl versions 8.13.0 through 8.18.0 are at risk, particularly those involved in file transfer or network automation tasks that rely on SMB protocols. Environments with custom scripts or applications that integrate curl for SMB communication are also vulnerable.
• curl / server:
curl --version # Check curl version• linux / server:
journalctl -u curl | grep -i error # Look for curl-related errors• generic web:
curl -I <target_url> # Check for unusual headers related to SMBdisclosure
Exploit-Status
EPSS
0.04% (12% Perzentil)
The primary mitigation for CVE-2026-3805 is to upgrade to curl version 8.18.1 or later. If upgrading is not immediately feasible, consider implementing temporary workarounds such as restricting SMB traffic to trusted sources or implementing stricter input validation on SMB requests. Web application firewalls (WAFs) configured to inspect SMB traffic could potentially detect and block malicious requests. Monitor curl's memory usage for unusual patterns that might indicate exploitation attempts. After upgrading, confirm the fix by sending a series of SMB requests to the same host and verifying that no memory access errors occur.
Aktualisieren Sie die curl-Bibliothek auf Version 8.18.1 oder höher. Dieses Update behebt eine Use-After-Free-Schwachstelle, die die Ausführung von beliebigem Code ermöglichen könnte. Stellen Sie sicher, dass Sie alle Dienste neu starten, die die curl-Bibliothek nach dem Update verwenden.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2026-3805 is a Use-After-Free vulnerability affecting curl versions 8.13.0 through 8.18.0. It arises from improper memory handling when making subsequent SMB requests to the same host, potentially leading to crashes or code execution.
If you are using curl versions 8.13.0 through 8.18.0, you are potentially affected. Check your curl version using curl --version and upgrade if necessary.
Upgrade to curl version 8.18.1 or later to resolve the vulnerability. If immediate upgrade is not possible, consider temporary workarounds like restricting SMB connections.
As of now, there is no confirmed information about active exploitation of CVE-2026-3805. However, it's crucial to apply the patch promptly to mitigate potential risks.
Refer to the official curl security advisory for detailed information and updates regarding CVE-2026-3805: [https://curl.se/security/advisories](https://curl.se/security/advisories)
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.