Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34451: CWE-121 Stack-based Buffer Overflow in rofl0r proxychains-ng

0
Medium
VulnerabilityCVE-2025-34451cvecve-2025-34451cwe-121
Published: Thu Dec 18 2025 (12/18/2025, 21:16:18 UTC)
Source: CVE Database V5
Vendor/Project: rofl0r
Product: proxychains-ng

Description

rofl0r/proxychains-ng versions up to and including 4.17 and prior to commit cc005b7 contain a stack-based buffer overflow vulnerability in the function proxy_from_string() located in src/libproxychains.c. When parsing crafted proxy configuration entries containing overly long username or password fields, the application may write beyond the bounds of fixed-size stack buffers, leading to memory corruption or crashes. This vulnerability may allow denial of service and, under certain conditions, could be leveraged for further exploitation depending on the execution environment and applied mitigations.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 00:30:55 UTC

Technical Analysis

CVE-2025-34451 is a stack-based buffer overflow vulnerability identified in the open-source tool proxychains-ng, specifically in versions up to 4.17 and prior to commit cc005b7. The vulnerability resides in the proxy_from_string() function within src/libproxychains.c, which is responsible for parsing proxy configuration strings. When processing crafted proxy entries containing overly long username or password fields, the function writes beyond the bounds of fixed-size stack buffers. This buffer overflow leads to memory corruption, which can cause application crashes or denial of service. Depending on the execution environment, such as the presence or absence of stack canaries, ASLR, and other memory protections, an attacker might exploit this overflow to execute arbitrary code or escalate privileges. However, exploitation requires the attacker to supply malicious proxy configuration entries, implying local or controlled access to configuration files. The vulnerability does not require user interaction, authentication, or network access, limiting remote exploitation. The CVSS 4.0 vector (AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N) reflects local attack vector with low complexity and no privileges or user interaction needed, but with high impact on availability. No public exploits have been reported yet, and no official patches are linked, though the vulnerability is fixed in commits after cc005b7. This vulnerability is categorized under CWE-121, a common and critical class of stack-based buffer overflows.

Potential Impact

The primary impact of CVE-2025-34451 is denial of service due to application crashes caused by memory corruption. For organizations relying on proxychains-ng for routing network traffic through proxies, this can disrupt operations, especially in environments where proxychains-ng is integrated into automated workflows or security tools. In certain environments lacking robust memory protections, attackers with local access might escalate the impact to remote code execution or privilege escalation, posing a significant security risk. The vulnerability could be exploited by malicious insiders or attackers who have gained limited access to systems to manipulate proxy configuration files. While no remote exploitation vector exists, the disruption of proxy services can affect confidentiality and integrity indirectly by interrupting secure communications or anonymization services. The scope is limited to systems running vulnerable versions of proxychains-ng, which is popular among penetration testers, security researchers, and privacy-conscious users. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as the vulnerability is publicly disclosed.

Mitigation Recommendations

Organizations should immediately audit their use of proxychains-ng and identify any instances running versions up to 4.17 or prior to commit cc005b7. Until official patches are released, users should avoid using untrusted proxy configuration files and implement strict validation and sanitization of proxy usernames and passwords. Employing runtime memory protection mechanisms such as stack canaries, ASLR, and DEP can reduce exploitation risk. Restrict file system permissions on proxy configuration files to prevent unauthorized modification. Consider using alternative proxy tools with active maintenance if patching is delayed. Monitor system logs for crashes or unusual behavior related to proxychains-ng. Once patches or updated versions are available, apply them promptly. Additionally, incorporate input length checks in any custom scripts or wrappers that generate proxy configuration entries to prevent buffer overflow conditions.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.602Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694471834eb3efac36abad29

Added to database: 12/18/2025, 9:26:27 PM

Last enriched: 3/24/2026, 12:30:55 AM

Last updated: 3/26/2026, 4:24:40 AM

Views: 81

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses