Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34451: CWE-121 Stack-based Buffer Overflow in rofl0r proxychains-ng

0
Medium
VulnerabilityCVE-2025-34451cvecve-2025-34451cwe-121
Published: Thu Dec 18 2025 (12/18/2025, 21:16:18 UTC)
Source: CVE Database V5
Vendor/Project: rofl0r
Product: proxychains-ng

Description

rofl0r/proxychains-ng versions up to and including 4.17 and prior to commit cc005b7 contain a stack-based buffer overflow vulnerability in the function proxy_from_string() located in src/libproxychains.c. When parsing crafted proxy configuration entries containing overly long username or password fields, the application may write beyond the bounds of fixed-size stack buffers, leading to memory corruption or crashes. This vulnerability may allow denial of service and, under certain conditions, could be leveraged for further exploitation depending on the execution environment and applied mitigations.

AI-Powered Analysis

AILast updated: 12/18/2025, 21:41:53 UTC

Technical Analysis

CVE-2025-34451 is a stack-based buffer overflow vulnerability classified under CWE-121, affecting the proxychains-ng tool developed by rofl0r. Proxychains-ng is a popular open-source utility used to force network connections of applications through proxy servers, commonly used in penetration testing, privacy-focused environments, and network debugging. The vulnerability resides in the proxy_from_string() function within src/libproxychains.c, which parses proxy configuration strings. Specifically, when processing proxy entries with excessively long username or password fields, the function writes beyond the allocated fixed-size stack buffers. This buffer overflow leads to memory corruption, which can cause application crashes (denial of service) or, under certain conditions, enable further exploitation such as arbitrary code execution depending on the runtime environment, compiler protections (e.g., stack canaries, ASLR), and privilege levels. The vulnerability affects versions up to and including 4.17 and prior to commit cc005b7, with no patch links currently provided. The CVSS 4.0 vector indicates local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on availability (VA:H), resulting in a medium severity score of 6.9. No known exploits have been reported in the wild, but the potential for denial of service and further exploitation warrants attention. Since proxychains-ng is often used on Linux systems by security professionals and privacy-conscious users, the vulnerability could impact environments relying on proxychains-ng for secure or anonymized network traffic routing.

Potential Impact

For European organizations, the primary impact of CVE-2025-34451 is the potential for denial of service in systems utilizing proxychains-ng, which could disrupt network operations or security testing workflows. In environments where proxychains-ng is integrated into automated security tools or privacy solutions, exploitation could lead to application crashes, interrupting critical processes. Although no known remote exploitation exists and local access is required, the vulnerability could be leveraged by attackers who have gained limited access to escalate their control or cause service outages. This is particularly relevant for organizations in sectors with high reliance on penetration testing, secure communications, or anonymization tools, such as cybersecurity firms, research institutions, and privacy-focused enterprises. Additionally, if mitigations are weak or absent, there is a risk of further exploitation beyond denial of service, potentially compromising confidentiality or integrity. The medium severity rating reflects these considerations, emphasizing the need for timely remediation to maintain operational stability and security posture.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Immediately audit the use of proxychains-ng within their environments to identify affected versions (up to 4.17 and prior to commit cc005b7). 2) Monitor the official rofl0r proxychains-ng repository and security advisories for patches or updates addressing CVE-2025-34451 and apply them promptly once available. 3) Until patches are released, restrict local access to systems running proxychains-ng to trusted users only, minimizing the risk of local exploitation. 4) Employ compiler and OS-level security features such as stack canaries, Address Space Layout Randomization (ASLR), and non-executable stack protections to reduce exploitation feasibility. 5) Implement runtime monitoring and anomaly detection to identify crashes or unusual behavior in proxychains-ng processes that could indicate exploitation attempts. 6) Educate security teams about the vulnerability to ensure awareness during penetration testing or network operations. 7) Consider alternative proxying tools with active maintenance if proxychains-ng usage is critical and patching is delayed. These targeted actions go beyond generic advice by focusing on access control, monitoring, and proactive patch management tailored to this specific vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.602Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694471834eb3efac36abad29

Added to database: 12/18/2025, 9:26:27 PM

Last enriched: 12/18/2025, 9:41:53 PM

Last updated: 12/19/2025, 5:46:27 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats