Home

Description

rofl0r/proxychains-ng versions up to and including 4.17 and prior to commit cc005b7 contain a stack-based buffer overflow vulnerability in the function proxy_from_string() located in src/libproxychains.c. When parsing crafted proxy configuration entries containing overly long username or password fields, the application may write beyond the bounds of fixed-size stack buffers, leading to memory corruption or crashes. This vulnerability may allow denial of service and, under certain conditions, could be leveraged for further exploitation depending on the execution environment and applied mitigations.

PUBLISHED Reserved 2025-04-15 | Published 2025-12-18 | Updated 2025-12-20 | Assigner VulnCheck




MEDIUM: 6.9CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-121 Stack-based Buffer Overflow

Product status

Default status
unaffected

Any version
affected

commit cc005b7 (custom)
unaffected

Credits

Vlatko Kosturjak with Marlink Cyber finder

References

github.com/...-ng-stack-buffer-overflow-proxy_from_string.md exploit

github.com/...-ng-stack-buffer-overflow-proxy_from_string.md technical-description exploit

github.com/rofl0r/proxychains-ng/issues/606 issue-tracking

github.com/httpsgithu/proxychains-ng/commit/cc005b7 patch

www.vulncheck.com/...xychains-ng-stack-based-buffer-overflow third-party-advisory

cve.org (CVE-2025-34451)

nvd.nist.gov (CVE-2025-34451)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.