vproxy is an HTTP/HTTPS/SOCKS5 proxy server. In versions 2.3.3 and below, untrusted data is extracted from the user-controlled HTTP Proxy-Authorization header and passed to Extension::try_from and flows into parse_ttl_extension where it is parsed as a TTL value. If an attacker supplies a TTL of zero (e.g. by using a username such as 'configuredUser-ttl-0'), the modulo operation 'timestamp % ttl' will cause a division by zero panic, causing the server to crash causing a denial-of-service. This is fixed in version 2.4.0.
                
            References
                    Configurations
                    No configuration.
History
                    31 Jul 2025, 18:42
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | 
30 Jul 2025, 20:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-07-30 20:15
Updated : 2025-07-31 18:42
NVD link : CVE-2025-54581
Mitre link : CVE-2025-54581
CVE.ORG link : CVE-2025-54581
JSON object : View
Products Affected
                No product.
CWE
                
                    
                        
                        CWE-369
                        
            Divide By Zero
