A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the schema_attr_enum_callback function within the schema.c file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Red Hat Directory Server 12.4 EUS for RHEL 9 | RedHat | redhat-ds:12-9040020260225135630.1674d574 | * |
| Red Hat Enterprise Linux 10 | RedHat | 389-ds-base-0:3.1.3-7.el10_1 | * |
| Red Hat Enterprise Linux 10.0 Extended Update Support | RedHat | 389-ds-base-0:3.0.6-17.el10_0 | * |
| Red Hat Enterprise Linux 9 | RedHat | 389-ds-base-0:2.7.0-10.el9_7 | * |
| Red Hat Enterprise Linux 9.4 Extended Update Support | RedHat | 389-ds-base-0:2.4.5-24.el9_4 | * |
| Red Hat Enterprise Linux 9.6 Extended Update Support | RedHat | 389-ds-base-0:2.6.1-20.el9_6 | * |
| Red Hat Directory Server 13.1 | RedHat | dirsrv/dirsrv-container-rhel10:sha256:5e49efa2b8764403fad13b81c968b76c7b6400fabd83bf95e2f7667b90e93ab5 | * |