Stack-Based Buffer Overflow in Proxychains-ng by Rofl0r
CVE-2025-34451
Key Information:
- Vendor
Rofl0r
- Status
- Vendor
- CVE Published:
- 18 December 2025
Badges
What is CVE-2025-34451?
Proxychains-ng versions up to and including 4.17 are susceptible to a stack-based buffer overflow within the proxy_from_string() function. This vulnerability occurs when the application processes maliciously crafted proxy configuration entries that include excessively lengthy username or password fields. This flaw can result in memory corruption or application crashes, potentially leading to denial of service. Depending on the specific execution environment and implemented mitigations, attackers may exploit this vulnerability to execute further malicious actions.
Affected Version(s)
proxychains-ng 0 <= 4.17
proxychains-ng commit cc005b7
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
