vproxy is an HTTP/HTTPS/SOCKS5 proxy server. In versions 2.3.3 and below, untrusted data is extracted from the user-controlled HTTP Proxy-Authorization header and passed to Extension::try_from and flows into parse_ttl_extension where it is parsed as a TTL value. If an attacker supplies a TTL of zero (e.g. by using a username such as 'configuredUser-ttl-0'), the modulo operation 'timestamp % ttl' will cause a division by zero panic, causing the server to crash causing a denial-of-service. This is fixed in version 2.4.0.
References
Configurations
No configuration.
History
31 Jul 2025, 18:42
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
30 Jul 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-30 20:15
Updated : 2025-07-31 18:42
NVD link : CVE-2025-54581
Mitre link : CVE-2025-54581
CVE.ORG link : CVE-2025-54581
JSON object : View
Products Affected
No product.
CWE
CWE-369
Divide By Zero