{
  "threat_severity" : "Moderate",
  "public_date" : "2026-02-23T00:00:00Z",
  "bugzilla" : {
    "description" : "389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow",
    "id" : "2423624",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2423624"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.2",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-122",
  "details" : [ "A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).", "A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE)." ],
  "statement" : "This vulnerability is rated Moderate for Red Hat Directory Server. A heap buffer overflow in the `389-ds-base` component can lead to a denial of service or potential remote code execution. Exploitation requires high privileges on the Directory Server, limiting the attack surface to authenticated administrative users.",
  "acknowledgement" : "This issue was discovered by Red Hat Security Research Team (Red Hat Inc.).",
  "affected_release" : [ {
    "product_name" : "Red Hat Directory Server 11.5 E4S for RHEL 8",
    "release_date" : "2026-03-24T00:00:00Z",
    "advisory" : "RHSA-2026:5512",
    "cpe" : "cpe:/a:redhat:directory_server_e4s:11.5::el8",
    "package" : "redhat-ds:11-8060020260303152239.0ca98e7e"
  }, {
    "product_name" : "Red Hat Directory Server 11.7 E4S for RHEL 8",
    "release_date" : "2026-03-24T00:00:00Z",
    "advisory" : "RHSA-2026:5568",
    "cpe" : "cpe:/a:redhat:directory_server_e4s:11.7::el8",
    "package" : "redhat-ds:11-8080020260227193008.f969626e"
  }, {
    "product_name" : "Red Hat Directory Server 11.9 for RHEL 8",
    "release_date" : "2026-03-24T00:00:00Z",
    "advisory" : "RHSA-2026:5514",
    "cpe" : "cpe:/a:redhat:directory_server:11.9::el8",
    "package" : "redhat-ds:11-8100020260312105752.37ed7c03"
  }, {
    "product_name" : "Red Hat Directory Server 12.2 E4S for RHEL 9",
    "release_date" : "2026-03-24T00:00:00Z",
    "advisory" : "RHSA-2026:5569",
    "cpe" : "cpe:/a:redhat:directory_server_e4s:12.2::el9",
    "package" : "redhat-ds:12-9020020260304180546.1674d574"
  }, {
    "product_name" : "Red Hat Directory Server 12.4 EUS for RHEL 9",
    "release_date" : "2026-03-17T00:00:00Z",
    "advisory" : "RHSA-2026:4661",
    "cpe" : "cpe:/a:redhat:directory_server_eus:12.4::el9",
    "package" : "redhat-ds:12-9040020260225135630.1674d574"
  }, {
    "product_name" : "Red Hat Enterprise Linux 10",
    "release_date" : "2026-02-24T00:00:00Z",
    "advisory" : "RHSA-2026:3208",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10.1",
    "package" : "389-ds-base-0:3.1.3-7.el10_1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 10.0 Extended Update Support",
    "release_date" : "2026-03-02T00:00:00Z",
    "advisory" : "RHSA-2026:3504",
    "cpe" : "cpe:/o:redhat:enterprise_linux_eus:10.0",
    "package" : "389-ds-base-0:3.0.6-17.el10_0"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7 Extended Lifecycle Support",
    "release_date" : "2026-03-31T00:00:00Z",
    "advisory" : "RHSA-2026:6220",
    "cpe" : "cpe:/o:redhat:rhel_els:7",
    "package" : "389-ds-base-0:1.3.11.1-11.el7_9"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2026-03-24T00:00:00Z",
    "advisory" : "RHSA-2026:5513",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "389-ds:1.4-8100020260312103235.25e700aa"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.2 Advanced Update Support",
    "release_date" : "2026-03-23T00:00:00Z",
    "advisory" : "RHSA-2026:5196",
    "cpe" : "cpe:/a:redhat:rhel_aus:8.2",
    "package" : "389-ds:1.4-8020020260303204738.dbc46ba7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support",
    "release_date" : "2026-03-31T00:00:00Z",
    "advisory" : "RHSA-2026:6268",
    "cpe" : "cpe:/a:redhat:rhel_aus:8.4",
    "package" : "389-ds:1.4-8040020260303172348.96015a92"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On",
    "release_date" : "2026-03-31T00:00:00Z",
    "advisory" : "RHSA-2026:6268",
    "cpe" : "cpe:/a:redhat:rhel_eus_long_life:8.4",
    "package" : "389-ds:1.4-8040020260303172348.96015a92"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support",
    "release_date" : "2026-03-24T00:00:00Z",
    "advisory" : "RHSA-2026:5511",
    "cpe" : "cpe:/a:redhat:rhel_aus:8.6",
    "package" : "389-ds:1.4-8060020260303144613.824efc52"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Telecommunications Update Service",
    "release_date" : "2026-03-24T00:00:00Z",
    "advisory" : "RHSA-2026:5511",
    "cpe" : "cpe:/a:redhat:rhel_tus:8.6",
    "package" : "389-ds:1.4-8060020260303144613.824efc52"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions",
    "release_date" : "2026-03-24T00:00:00Z",
    "advisory" : "RHSA-2026:5511",
    "cpe" : "cpe:/a:redhat:rhel_e4s:8.6",
    "package" : "389-ds:1.4-8060020260303144613.824efc52"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.8 Telecommunications Update Service",
    "release_date" : "2026-03-24T00:00:00Z",
    "advisory" : "RHSA-2026:5576",
    "cpe" : "cpe:/a:redhat:rhel_tus:8.8",
    "package" : "389-ds:1.4-8080020260227183930.6dbb3803"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions",
    "release_date" : "2026-03-24T00:00:00Z",
    "advisory" : "RHSA-2026:5576",
    "cpe" : "cpe:/a:redhat:rhel_e4s:8.8",
    "package" : "389-ds:1.4-8080020260227183930.6dbb3803"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2026-02-24T00:00:00Z",
    "advisory" : "RHSA-2026:3189",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "389-ds-base-0:2.7.0-10.el9_7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions",
    "release_date" : "2026-03-24T00:00:00Z",
    "advisory" : "RHSA-2026:5597",
    "cpe" : "cpe:/a:redhat:rhel_e4s:9.0",
    "package" : "389-ds-base-0:2.0.14-5.el9_0"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions",
    "release_date" : "2026-03-24T00:00:00Z",
    "advisory" : "RHSA-2026:5598",
    "cpe" : "cpe:/a:redhat:rhel_e4s:9.2",
    "package" : "389-ds-base-0:2.2.4-17.el9_2"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.4 Extended Update Support",
    "release_date" : "2026-03-17T00:00:00Z",
    "advisory" : "RHSA-2026:4720",
    "cpe" : "cpe:/a:redhat:rhel_eus:9.4",
    "package" : "389-ds-base-0:2.4.5-24.el9_4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.6 Extended Update Support",
    "release_date" : "2026-03-10T00:00:00Z",
    "advisory" : "RHSA-2026:4207",
    "cpe" : "cpe:/a:redhat:rhel_eus:9.6",
    "package" : "389-ds-base-0:2.6.1-20.el9_6"
  }, {
    "product_name" : "Red Hat Directory Server 13.1",
    "release_date" : "2026-02-25T00:00:00Z",
    "advisory" : "RHSA-2026:3379",
    "cpe" : "cpe:/a:redhat:directory_server:13.1::el10",
    "package" : "dirsrv/dirsrv-container-rhel10:sha256:5e49efa2b8764403fad13b81c968b76c7b6400fabd83bf95e2f7667b90e93ab5"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Directory Server 12",
    "fix_state" : "Affected",
    "package_name" : "redhat-ds:12/389-ds-base",
    "cpe" : "cpe:/a:redhat:directory_server:12"
  }, {
    "product_name" : "Red Hat Directory Server 13",
    "fix_state" : "Will not fix",
    "package_name" : "389-ds-base",
    "cpe" : "cpe:/a:redhat:directory_server:13"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "389-ds-base",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2025-14905\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-14905" ],
  "name" : "CVE-2025-14905",
  "mitigation" : {
    "value" : "Restrict network access to the 389-ds-base server to only trusted hosts and networks using firewall rules. Additionally, ensure that administrative access to the server is strictly limited to authorized personnel with strong authentication, as exploitation requires high privileges. This reduces the attack surface and the likelihood of an attacker gaining the necessary privileges to trigger the heap overflow.",
    "lang" : "en:us"
  },
  "csaw" : false
}