Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-14905

Опубликовано: 23 фев. 2026
Источник: redhat
CVSS3: 7.2
EPSS Низкий

Описание

A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the schema_attr_enum_callback function within the schema.c file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).

Отчет

This vulnerability is rated Moderate for Red Hat Directory Server. A heap buffer overflow in the 389-ds-base component can lead to a denial of service or potential remote code execution. Exploitation requires high privileges on the Directory Server, limiting the attack surface to authenticated administrative users.

Меры по смягчению последствий

Restrict network access to the 389-ds-base server to only trusted hosts and networks using firewall rules. Additionally, ensure that administrative access to the server is strictly limited to authorized personnel with strong authentication, as exploitation requires high privileges. This reduces the attack surface and the likelihood of an attacker gaining the necessary privileges to trigger the heap overflow.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Directory Server 12redhat-ds:12/389-ds-baseAffected
Red Hat Directory Server 13389-ds-baseWill not fix
Red Hat Enterprise Linux 6389-ds-baseOut of support scope
Red Hat Directory Server 11.5 E4S for RHEL 8redhat-dsFixedRHSA-2026:551224.03.2026
Red Hat Directory Server 11.7 E4S for RHEL 8redhat-dsFixedRHSA-2026:556824.03.2026
Red Hat Directory Server 11.9 for RHEL 8redhat-dsFixedRHSA-2026:551424.03.2026
Red Hat Directory Server 12.2 E4S for RHEL 9redhat-dsFixedRHSA-2026:556924.03.2026
Red Hat Directory Server 12.4 EUS for RHEL 9redhat-dsFixedRHSA-2026:466117.03.2026
Red Hat Enterprise Linux 10389-ds-baseFixedRHSA-2026:320824.02.2026
Red Hat Enterprise Linux 10.0 Extended Update Support389-ds-baseFixedRHSA-2026:350402.03.2026

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-122
https://bugzilla.redhat.com/show_bug.cgi?id=2423624389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow

EPSS

Процентиль: 64%
0.00466
Низкий

7.2 High

CVSS3

Связанные уязвимости

CVSS3: 7.2
ubuntu
около 1 месяца назад

A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).

CVSS3: 7.2
nvd
около 1 месяца назад

A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).

CVSS3: 7.2
debian
около 1 месяца назад

A flaw was found in the 389-ds-base server. A heap buffer overflow vul ...

suse-cvrf
14 дней назад

Security update for 389-ds

suse-cvrf
20 дней назад

Security update for 389-ds

EPSS

Процентиль: 64%
0.00466
Низкий

7.2 High

CVSS3