A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).
References
Configurations
No configuration.
History
10 Mar 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
02 Mar 2026, 07:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
25 Feb 2026, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
25 Feb 2026, 00:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Summary |
|
24 Feb 2026, 12:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
23 Feb 2026, 16:29
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-23 16:29
Updated : 2026-03-10 22:16
NVD link : CVE-2025-14905
Mitre link : CVE-2025-14905
CVE.ORG link : CVE-2025-14905
JSON object : View
Products Affected
No product.
CWE
CWE-122
Heap-based Buffer Overflow
