Home

Description

A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).

PUBLISHED Reserved 2025-12-18 | Published 2026-02-23 | Updated 2026-02-24 | Assigner redhat




HIGH: 7.2CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Problem types

Heap-based Buffer Overflow

Product status

Default status
affected

0:3.1.3-7.el10_1 (rpm) before *
unaffected

Default status
affected

0:2.7.0-10.el9_7 (rpm) before *
unaffected

Default status
affected

Default status
affected

Default status
affected

Default status
unknown

Default status
affected

Default status
affected

Timeline

2025-12-18:Reported to Red Hat.
2026-02-23:Made public.

Credits

This issue was discovered by Red Hat Security Research Team (Red Hat Inc.).

References

access.redhat.com/errata/RHSA-2026:3189 (RHSA-2026:3189) vendor-advisory

access.redhat.com/errata/RHSA-2026:3208 (RHSA-2026:3208) vendor-advisory

access.redhat.com/security/cve/CVE-2025-14905 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2423624 (RHBZ#2423624) issue-tracking

cve.org (CVE-2025-14905)

nvd.nist.gov (CVE-2025-14905)

Download JSON