A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).
History

Tue, 31 Mar 2026 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Redhat rhel Eus Long Life
CPEs cpe:/a:redhat:rhel_aus:8.4::appstream
cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
Vendors & Products Redhat rhel Eus Long Life
References

Tue, 31 Mar 2026 05:15:00 +0000

Type Values Removed Values Added
First Time appeared Redhat rhel Els
CPEs cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:rhel_els:7
Vendors & Products Redhat rhel Els
References

Tue, 24 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:rhel_e4s:9.2::appstream
References

Tue, 24 Mar 2026 10:30:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:rhel_e4s:9.0::appstream
References

Tue, 24 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:rhel_e4s:8.8::appstream
cpe:/a:redhat:rhel_tus:8.8::appstream
References

Tue, 24 Mar 2026 09:15:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:directory_server_e4s:11.7::el8
cpe:/a:redhat:directory_server_e4s:12.2::el9
References

Tue, 24 Mar 2026 02:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat directory Server E4s
Redhat rhel E4s
Redhat rhel Tus
CPEs cpe:/a:redhat:directory_server:11
cpe:/o:redhat:enterprise_linux:8
cpe:/a:redhat:directory_server:11.9::el8
cpe:/a:redhat:directory_server_e4s:11.5::el8
cpe:/a:redhat:enterprise_linux:8::appstream
cpe:/a:redhat:rhel_aus:8.6::appstream
cpe:/a:redhat:rhel_e4s:8.6::appstream
cpe:/a:redhat:rhel_tus:8.6::appstream
Vendors & Products Redhat directory Server E4s
Redhat rhel E4s
Redhat rhel Tus
References

Mon, 23 Mar 2026 01:45:00 +0000

Type Values Removed Values Added
First Time appeared Redhat rhel Aus
CPEs cpe:/a:redhat:rhel_aus:8.2::appstream
Vendors & Products Redhat rhel Aus
References

Tue, 17 Mar 2026 11:15:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:rhel_eus:9.4::appstream
cpe:/a:redhat:rhel_eus:9.4::crb
References

Tue, 17 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Redhat directory Server Eus
CPEs cpe:/a:redhat:directory_server_eus:12.4::el9
Vendors & Products Redhat directory Server Eus
References

Tue, 10 Mar 2026 22:15:00 +0000

Type Values Removed Values Added
First Time appeared Redhat rhel Eus
CPEs cpe:/a:redhat:rhel_eus:9.6::appstream
cpe:/a:redhat:rhel_eus:9.6::crb
Vendors & Products Redhat rhel Eus
References

Mon, 02 Mar 2026 07:00:00 +0000

Type Values Removed Values Added
First Time appeared Redhat enterprise Linux Eus
CPEs cpe:/o:redhat:enterprise_linux_eus:10.0
Vendors & Products Redhat enterprise Linux Eus
References

Wed, 25 Feb 2026 20:30:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:directory_server:13.1::el10
References

Tue, 24 Feb 2026 23:30:00 +0000

Type Values Removed Values Added
CPEs cpe:/o:redhat:enterprise_linux:10 cpe:/o:redhat:enterprise_linux:10.1
References

Tue, 24 Feb 2026 12:00:00 +0000

Type Values Removed Values Added
CPEs cpe:/o:redhat:enterprise_linux:9 cpe:/a:redhat:enterprise_linux:9::appstream
cpe:/a:redhat:enterprise_linux:9::crb
References

Tue, 24 Feb 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Redhat redhat Directory Server
Vendors & Products Redhat redhat Directory Server

Tue, 24 Feb 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Mon, 23 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Description A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).
Title 389-ds-base: 389-ds-base: remote code execution and denial of service via heap buffer overflow
First Time appeared Redhat
Redhat directory Server
Redhat enterprise Linux
Weaknesses CWE-122
CPEs cpe:/a:redhat:directory_server:11
cpe:/a:redhat:directory_server:12
cpe:/a:redhat:directory_server:13
cpe:/o:redhat:enterprise_linux:10
cpe:/o:redhat:enterprise_linux:6
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat directory Server
Redhat enterprise Linux
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-03-31T15:40:05.143Z

Reserved: 2025-12-18T18:06:35.400Z

Link: CVE-2025-14905

cve-icon Vulnrichment

Updated: 2026-02-23T18:54:18.796Z

cve-icon NVD

Status : Deferred

Published: 2026-02-23T16:29:35.620

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-14905

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-02-23T00:00:00Z

Links: CVE-2025-14905 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-02-24T09:55:35Z