Description

A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).

INFO

Published Date :

2026-02-23T15:41:47.976Z

Last Modified :

2026-03-31T15:40:05.143Z

Source :

redhat
AFFECTED PRODUCTS

The following products are affected by CVE-2025-14905 vulnerability.

Vendors Products
Redhat
  • Directory Server
  • Directory Server E4s
  • Directory Server Eus
  • Enterprise Linux
  • Enterprise Linux Eus
  • Redhat Directory Server
  • Rhel Aus
  • Rhel E4s
  • Rhel Els
  • Rhel Eus
  • Rhel Eus Long Life
  • Rhel Tus

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact