CVE-2025-14905
Plain English Summary
AI-powered analysis for quick understanding
An attacker can exploit a flaw in the 389-ds-base server to potentially take control of the system or crash it, especially when processing a large number of alias strings. This happens because the server miscalculates memory size, leading to a situation where it can be tricked into running harmful code or becoming unresponsive.
Technical Description
A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 23, 2026
about 1 month ago
Last Modified
Feb 25, 2026
about 1 month ago