CVE-2025-34451: CWE-121 Stack-based Buffer Overflow in rofl0r proxychains-ng
rofl0r/proxychains-ng versions up to and including 4.17 and prior to commit cc005b7 contain a stack-based buffer overflow vulnerability in the function proxy_from_string() located in src/libproxychains.c. When parsing crafted proxy configuration entries containing overly long username or password fields, the application may write beyond the bounds of fixed-size stack buffers, leading to memory corruption or crashes. This vulnerability may allow denial of service and, under certain conditions, could be leveraged for further exploitation depending on the execution environment and applied mitigations.
AI Analysis
Technical Summary
CVE-2025-34451 is a stack-based buffer overflow vulnerability identified in the open-source tool proxychains-ng, specifically in versions up to 4.17 and prior to commit cc005b7. The vulnerability resides in the proxy_from_string() function within src/libproxychains.c, which is responsible for parsing proxy configuration strings. When processing crafted proxy entries containing overly long username or password fields, the function writes beyond the bounds of fixed-size stack buffers. This buffer overflow leads to memory corruption, which can cause application crashes or denial of service. Depending on the execution environment, such as the presence or absence of stack canaries, ASLR, and other memory protections, an attacker might exploit this overflow to execute arbitrary code or escalate privileges. However, exploitation requires the attacker to supply malicious proxy configuration entries, implying local or controlled access to configuration files. The vulnerability does not require user interaction, authentication, or network access, limiting remote exploitation. The CVSS 4.0 vector (AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N) reflects local attack vector with low complexity and no privileges or user interaction needed, but with high impact on availability. No public exploits have been reported yet, and no official patches are linked, though the vulnerability is fixed in commits after cc005b7. This vulnerability is categorized under CWE-121, a common and critical class of stack-based buffer overflows.
Potential Impact
The primary impact of CVE-2025-34451 is denial of service due to application crashes caused by memory corruption. For organizations relying on proxychains-ng for routing network traffic through proxies, this can disrupt operations, especially in environments where proxychains-ng is integrated into automated workflows or security tools. In certain environments lacking robust memory protections, attackers with local access might escalate the impact to remote code execution or privilege escalation, posing a significant security risk. The vulnerability could be exploited by malicious insiders or attackers who have gained limited access to systems to manipulate proxy configuration files. While no remote exploitation vector exists, the disruption of proxy services can affect confidentiality and integrity indirectly by interrupting secure communications or anonymization services. The scope is limited to systems running vulnerable versions of proxychains-ng, which is popular among penetration testers, security researchers, and privacy-conscious users. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as the vulnerability is publicly disclosed.
Mitigation Recommendations
Organizations should immediately audit their use of proxychains-ng and identify any instances running versions up to 4.17 or prior to commit cc005b7. Until official patches are released, users should avoid using untrusted proxy configuration files and implement strict validation and sanitization of proxy usernames and passwords. Employing runtime memory protection mechanisms such as stack canaries, ASLR, and DEP can reduce exploitation risk. Restrict file system permissions on proxy configuration files to prevent unauthorized modification. Consider using alternative proxy tools with active maintenance if patching is delayed. Monitor system logs for crashes or unusual behavior related to proxychains-ng. Once patches or updated versions are available, apply them promptly. Additionally, incorporate input length checks in any custom scripts or wrappers that generate proxy configuration entries to prevent buffer overflow conditions.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, Netherlands, Japan, South Korea, India, Brazil
CVE-2025-34451: CWE-121 Stack-based Buffer Overflow in rofl0r proxychains-ng
Description
rofl0r/proxychains-ng versions up to and including 4.17 and prior to commit cc005b7 contain a stack-based buffer overflow vulnerability in the function proxy_from_string() located in src/libproxychains.c. When parsing crafted proxy configuration entries containing overly long username or password fields, the application may write beyond the bounds of fixed-size stack buffers, leading to memory corruption or crashes. This vulnerability may allow denial of service and, under certain conditions, could be leveraged for further exploitation depending on the execution environment and applied mitigations.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-34451 is a stack-based buffer overflow vulnerability identified in the open-source tool proxychains-ng, specifically in versions up to 4.17 and prior to commit cc005b7. The vulnerability resides in the proxy_from_string() function within src/libproxychains.c, which is responsible for parsing proxy configuration strings. When processing crafted proxy entries containing overly long username or password fields, the function writes beyond the bounds of fixed-size stack buffers. This buffer overflow leads to memory corruption, which can cause application crashes or denial of service. Depending on the execution environment, such as the presence or absence of stack canaries, ASLR, and other memory protections, an attacker might exploit this overflow to execute arbitrary code or escalate privileges. However, exploitation requires the attacker to supply malicious proxy configuration entries, implying local or controlled access to configuration files. The vulnerability does not require user interaction, authentication, or network access, limiting remote exploitation. The CVSS 4.0 vector (AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N) reflects local attack vector with low complexity and no privileges or user interaction needed, but with high impact on availability. No public exploits have been reported yet, and no official patches are linked, though the vulnerability is fixed in commits after cc005b7. This vulnerability is categorized under CWE-121, a common and critical class of stack-based buffer overflows.
Potential Impact
The primary impact of CVE-2025-34451 is denial of service due to application crashes caused by memory corruption. For organizations relying on proxychains-ng for routing network traffic through proxies, this can disrupt operations, especially in environments where proxychains-ng is integrated into automated workflows or security tools. In certain environments lacking robust memory protections, attackers with local access might escalate the impact to remote code execution or privilege escalation, posing a significant security risk. The vulnerability could be exploited by malicious insiders or attackers who have gained limited access to systems to manipulate proxy configuration files. While no remote exploitation vector exists, the disruption of proxy services can affect confidentiality and integrity indirectly by interrupting secure communications or anonymization services. The scope is limited to systems running vulnerable versions of proxychains-ng, which is popular among penetration testers, security researchers, and privacy-conscious users. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as the vulnerability is publicly disclosed.
Mitigation Recommendations
Organizations should immediately audit their use of proxychains-ng and identify any instances running versions up to 4.17 or prior to commit cc005b7. Until official patches are released, users should avoid using untrusted proxy configuration files and implement strict validation and sanitization of proxy usernames and passwords. Employing runtime memory protection mechanisms such as stack canaries, ASLR, and DEP can reduce exploitation risk. Restrict file system permissions on proxy configuration files to prevent unauthorized modification. Consider using alternative proxy tools with active maintenance if patching is delayed. Monitor system logs for crashes or unusual behavior related to proxychains-ng. Once patches or updated versions are available, apply them promptly. Additionally, incorporate input length checks in any custom scripts or wrappers that generate proxy configuration entries to prevent buffer overflow conditions.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.602Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 694471834eb3efac36abad29
Added to database: 12/18/2025, 9:26:27 PM
Last enriched: 3/24/2026, 12:30:55 AM
Last updated: 3/26/2026, 4:24:40 AM
Views: 81
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.