Source: proxychains-ng
Version: 4.17-3
Severity: important
Tags: security upstream
Forwarded: https://github.com/rofl0r/proxychains-ng/issues/606
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for proxychains-ng.

CVE-2025-34451[0]:
| rofl0r/proxychains-ng versions up to and including 4.17 and prior to
| commit cc005b7 contain a stack-based buffer overflow vulnerability
| in the function proxy_from_string() located in src/libproxychains.c.
| When parsing crafted proxy configuration entries containing overly
| long username or password fields, the application may write beyond
| the bounds of fixed-size stack buffers, leading to memory corruption
| or crashes. This vulnerability may allow denial of service and,
| under certain conditions, could be leveraged for further
| exploitation depending on the execution environment and applied
| mitigations.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-34451
    https://www.cve.org/CVERecord?id=CVE-2025-34451
[1] https://github.com/rofl0r/proxychains-ng/issues/606
[2] 
https://github.com/rofl0r/proxychains-ng/commit/cc005b7132811c9149e77b5e33cff359fc95512e

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to