Bug 2423624 (CVE-2025-14905)

Summary: CVE-2025-14905 389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: bsmejkal, jachapma, progier, security-response-team, snegrini, spichugi, ssidhaye, tbordaz, teagle, tmihinto, vashirov
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2450264    
Bug Blocks:    
Deadline: 2026-02-20   

Description OSIDB Bzimport 2025-12-18 18:08:15 UTC
A vulnerability was found in the ds-389-base server, specifically in the schema.c file which was then verified as exploitable in the running server. There is a heap buffer overflow that can be exploited to execute a DoS and potential RCE. The vulnerability is possible through the function schema_attr_enum_callback, the code calculates size by summing the lengths of alias strings but fails to account for the formatting characters added during printing. It relies on a static "magic number" of 256 to absorb this overhead. When the number of aliases is large enough, the cumulative overhead of 3 bytes per alias exceeds the 256-byte margin, leading to a heap overflow.

Comment 3 errata-xmlrpc 2026-02-24 11:35:27 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:3189 https://access.redhat.com/errata/RHSA-2026:3189

Comment 4 errata-xmlrpc 2026-02-24 13:46:46 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2026:3208 https://access.redhat.com/errata/RHSA-2026:3208

Comment 5 errata-xmlrpc 2026-03-02 06:27:15 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10.0 Extended Update Support

Via RHSA-2026:3504 https://access.redhat.com/errata/RHSA-2026:3504

Comment 6 errata-xmlrpc 2026-03-10 22:00:30 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.6 Extended Update Support

Via RHSA-2026:4207 https://access.redhat.com/errata/RHSA-2026:4207

Comment 7 errata-xmlrpc 2026-03-17 00:15:27 UTC
This issue has been addressed in the following products:

  Red Hat Directory Server 12.4 EUS for RHEL 9

Via RHSA-2026:4661 https://access.redhat.com/errata/RHSA-2026:4661

Comment 8 errata-xmlrpc 2026-03-17 10:39:43 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2026:4720 https://access.redhat.com/errata/RHSA-2026:4720

Comment 9 errata-xmlrpc 2026-03-23 00:17:03 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support

Via RHSA-2026:5196 https://access.redhat.com/errata/RHSA-2026:5196

Comment 10 errata-xmlrpc 2026-03-24 00:15:03 UTC
This issue has been addressed in the following products:

  Red Hat Directory Server 11.5 E4S for RHEL 8

Via RHSA-2026:5512 https://access.redhat.com/errata/RHSA-2026:5512

Comment 11 errata-xmlrpc 2026-03-24 00:15:38 UTC
This issue has been addressed in the following products:

  Red Hat Directory Server 11.9 for RHEL 8

Via RHSA-2026:5514 https://access.redhat.com/errata/RHSA-2026:5514

Comment 12 errata-xmlrpc 2026-03-24 00:30:22 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2026:5511 https://access.redhat.com/errata/RHSA-2026:5511

Comment 13 errata-xmlrpc 2026-03-24 00:47:01 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2026:5513 https://access.redhat.com/errata/RHSA-2026:5513

Comment 14 errata-xmlrpc 2026-03-24 08:46:07 UTC
This issue has been addressed in the following products:

  Red Hat Directory Server 11.7 E4S for RHEL 8

Via RHSA-2026:5568 https://access.redhat.com/errata/RHSA-2026:5568

Comment 15 errata-xmlrpc 2026-03-24 08:46:59 UTC
This issue has been addressed in the following products:

  Red Hat Directory Server 12.2 E4S for RHEL 9

Via RHSA-2026:5569 https://access.redhat.com/errata/RHSA-2026:5569

Comment 16 errata-xmlrpc 2026-03-24 09:45:44 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.8 Telecommunications Update Service

Via RHSA-2026:5576 https://access.redhat.com/errata/RHSA-2026:5576

Comment 17 errata-xmlrpc 2026-03-24 10:00:06 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2026:5597 https://access.redhat.com/errata/RHSA-2026:5597

Comment 18 errata-xmlrpc 2026-03-24 10:13:18 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions

Via RHSA-2026:5598 https://access.redhat.com/errata/RHSA-2026:5598

Comment 19 errata-xmlrpc 2026-03-31 00:26:02 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7 Extended Lifecycle Support

Via RHSA-2026:6220 https://access.redhat.com/errata/RHSA-2026:6220

Comment 20 errata-xmlrpc 2026-03-31 15:34:52 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On

Via RHSA-2026:6268 https://access.redhat.com/errata/RHSA-2026:6268