Описание
A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the schema_attr_enum_callback function within the schema.c file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).
A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the schema_attr_enum_callback function within the schema.c file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2025-14905
- https://bugzilla.redhat.com/show_bug.cgi?id=2423624
- https://access.redhat.com/security/cve/CVE-2025-14905
- https://access.redhat.com/errata/RHSA-2026:6268
- https://access.redhat.com/errata/RHSA-2026:6220
- https://access.redhat.com/errata/RHSA-2026:5598
- https://access.redhat.com/errata/RHSA-2026:5597
- https://access.redhat.com/errata/RHSA-2026:5576
- https://access.redhat.com/errata/RHSA-2026:5569
- https://access.redhat.com/errata/RHSA-2026:5568
- https://access.redhat.com/errata/RHSA-2026:5514
- https://access.redhat.com/errata/RHSA-2026:5513
- https://access.redhat.com/errata/RHSA-2026:5512
- https://access.redhat.com/errata/RHSA-2026:5511
- https://access.redhat.com/errata/RHSA-2026:5196
- https://access.redhat.com/errata/RHSA-2026:4720
- https://access.redhat.com/errata/RHSA-2026:4661
- https://access.redhat.com/errata/RHSA-2026:4207
- https://access.redhat.com/errata/RHSA-2026:3504
- https://access.redhat.com/errata/RHSA-2026:3379
- https://access.redhat.com/errata/RHSA-2026:3208
- https://access.redhat.com/errata/RHSA-2026:3189
Связанные уязвимости
A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).
A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).
A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).
A flaw was found in the 389-ds-base server. A heap buffer overflow vul ...