Search criteria
8 vulnerabilities found for DB2 High Performance Unload by IBM
CVE-2025-33133 (GCVE-0-2025-33133)
Vulnerability from cvelistv5 – Published: 2025-10-27 23:57 – Updated: 2025-10-28 13:51
VLAI?
Summary
IBM DB2 High Performance Unload 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, and 5.1 could allow an authenticated user to cause the program to crash due an out of bounds write.
Severity ?
6.5 (Medium)
CWE
- CWE-787 - Out-of-bounds Write
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| IBM | DB2 High Performance Unload |
Affected:
6.1.0.3
Affected: 5.1.0.1 Affected: 6.1.0.2 Affected: 6.5 Affected: 6.5.0.0 IF1 Affected: 6.1.0.1 Affected: 6.1 Affected: 5.1 cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.3:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:5.1.0.1:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.2:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.5:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0.0:interm_fix1:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0.0:if1:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.1:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.1:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:5.1:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:5.1.0:*:*:*:*:*:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-33133",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-28T13:50:38.496591Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-28T13:51:03.512Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:5.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0.0:interm_fix1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0.0:if1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:5.1.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "DB2 High Performance Unload",
"vendor": "IBM",
"versions": [
{
"status": "affected",
"version": "6.1.0.3"
},
{
"status": "affected",
"version": "5.1.0.1"
},
{
"status": "affected",
"version": "6.1.0.2"
},
{
"status": "affected",
"version": "6.5"
},
{
"status": "affected",
"version": "6.5.0.0 IF1"
},
{
"status": "affected",
"version": "6.1.0.1"
},
{
"status": "affected",
"version": "6.1"
},
{
"status": "affected",
"version": "5.1"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eIBM DB2 High Performance Unload 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, and 5.1 could allow an authenticated user to cause the program to crash due an out of bounds write.\u003c/p\u003e"
}
],
"value": "IBM DB2 High Performance Unload 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, and 5.1 could allow an authenticated user to cause the program to crash due an out of bounds write."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787 Out-of-bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-27T23:57:31.927Z",
"orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"shortName": "ibm"
},
"references": [
{
"tags": [
"vendor-advisory",
"patch"
],
"url": "https://www.ibm.com/support/pages/node/7249336"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eRemediation/Fixes Please download and install Interim Fix 12.1.0.0.1 from Fix Central\u003c/p\u003e"
}
],
"value": "Remediation/Fixes Please download and install Interim Fix 12.1.0.0.1 from Fix Central"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Fixes to common vulnerabilities found in IBM Db2 High Performance Unload",
"x_generator": {
"engine": "ibm-cvegen"
}
}
},
"cveMetadata": {
"assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"assignerShortName": "ibm",
"cveId": "CVE-2025-33133",
"datePublished": "2025-10-27T23:57:31.927Z",
"dateReserved": "2025-04-15T17:51:11.506Z",
"dateUpdated": "2025-10-28T13:51:03.512Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-33132 (GCVE-0-2025-33132)
Vulnerability from cvelistv5 – Published: 2025-10-27 23:57 – Updated: 2025-10-28 13:53
VLAI?
Summary
IBM DB2 High Performance Unload 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, and 5.1 could allow an authenticated user to cause the program to crash due to the incorrect calculation of the size of the data that is being pointed to.
Severity ?
6.5 (Medium)
CWE
- CWE-467 - Use of sizeof() on a Pointer Type
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| IBM | DB2 High Performance Unload |
Affected:
6.1.0.3
Affected: 5.1.0.1 Affected: 6.1.0.2 Affected: 6.5 Affected: 6.5.0.0 IF1 Affected: 6.1.0.1 Affected: 6.1 Affected: 5.1 cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.3:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:5.1.0.1:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.2:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.5:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0.0:interm_fix1:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0.0:if1:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.1:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.1:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:5.1:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:5.1.0:*:*:*:*:*:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-33132",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-28T13:53:17.971219Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-28T13:53:31.618Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:5.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0.0:interm_fix1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0.0:if1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:5.1.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "DB2 High Performance Unload",
"vendor": "IBM",
"versions": [
{
"status": "affected",
"version": "6.1.0.3"
},
{
"status": "affected",
"version": "5.1.0.1"
},
{
"status": "affected",
"version": "6.1.0.2"
},
{
"status": "affected",
"version": "6.5"
},
{
"status": "affected",
"version": "6.5.0.0 IF1"
},
{
"status": "affected",
"version": "6.1.0.1"
},
{
"status": "affected",
"version": "6.1"
},
{
"status": "affected",
"version": "5.1"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eIBM DB2 High Performance Unload 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, and 5.1 could allow an authenticated user to cause the program to crash due to the incorrect calculation of the size of the data that is being pointed to.\u003c/p\u003e"
}
],
"value": "IBM DB2 High Performance Unload 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, and 5.1 could allow an authenticated user to cause the program to crash due to the incorrect calculation of the size of the data that is being pointed to."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-467",
"description": "CWE-467 Use of sizeof() on a Pointer Type",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-27T23:57:12.201Z",
"orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"shortName": "ibm"
},
"references": [
{
"tags": [
"vendor-advisory",
"patch"
],
"url": "https://www.ibm.com/support/pages/node/7249336"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eRemediation/Fixes Please download and install Interim Fix 12.1.0.0.1 from Fix Central\u003c/p\u003e"
}
],
"value": "Remediation/Fixes Please download and install Interim Fix 12.1.0.0.1 from Fix Central"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Fixes to common vulnerabilities found in IBM Db2 High Performance Unload",
"x_generator": {
"engine": "ibm-cvegen"
}
}
},
"cveMetadata": {
"assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"assignerShortName": "ibm",
"cveId": "CVE-2025-33132",
"datePublished": "2025-10-27T23:57:12.201Z",
"dateReserved": "2025-04-15T17:51:11.506Z",
"dateUpdated": "2025-10-28T13:53:31.618Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-33131 (GCVE-0-2025-33131)
Vulnerability from cvelistv5 – Published: 2025-10-27 23:56 – Updated: 2025-10-28 13:57
VLAI?
Summary
IBM DB2 High Performance Unload 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, and 5.1 could allow an authenticated user to cause the program to crash due to a buffer being overwritten when it is allocated on the stack.
Severity ?
6.5 (Medium)
CWE
- CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| IBM | DB2 High Performance Unload |
Affected:
6.1.0.3
Affected: 5.1.0.1 Affected: 6.1.0.2 Affected: 6.5 Affected: 6.5.0.0 IF1 Affected: 6.1.0.1 Affected: 6.1 Affected: 5.1 cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.3:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:5.1.0.1:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.2:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.5:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0.0:interm_fix1:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0.0:if1:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.1:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.1:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:5.1:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:5.1.0:*:*:*:*:*:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-33131",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-28T13:57:29.073195Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-28T13:57:38.628Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:5.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0.0:interm_fix1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0.0:if1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:5.1.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "DB2 High Performance Unload",
"vendor": "IBM",
"versions": [
{
"status": "affected",
"version": "6.1.0.3"
},
{
"status": "affected",
"version": "5.1.0.1"
},
{
"status": "affected",
"version": "6.1.0.2"
},
{
"status": "affected",
"version": "6.5"
},
{
"status": "affected",
"version": "6.5.0.0 IF1"
},
{
"status": "affected",
"version": "6.1.0.1"
},
{
"status": "affected",
"version": "6.1"
},
{
"status": "affected",
"version": "5.1"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eIBM DB2 High Performance Unload 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, and 5.1 could allow an authenticated user to cause the program to crash due to a buffer being overwritten when it is allocated on the stack.\u003c/p\u003e"
}
],
"value": "IBM DB2 High Performance Unload 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, and 5.1 could allow an authenticated user to cause the program to crash due to a buffer being overwritten when it is allocated on the stack."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-120",
"description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-27T23:56:34.181Z",
"orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"shortName": "ibm"
},
"references": [
{
"tags": [
"vendor-advisory",
"patch"
],
"url": "https://www.ibm.com/support/pages/node/7249336"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eRemediation/Fixes Please download and install Interim Fix 12.1.0.0.1 from Fix Central\u003c/p\u003e"
}
],
"value": "Remediation/Fixes Please download and install Interim Fix 12.1.0.0.1 from Fix Central"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Fixes to common vulnerabilities found in IBM Db2 High Performance Unload",
"x_generator": {
"engine": "ibm-cvegen"
}
}
},
"cveMetadata": {
"assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"assignerShortName": "ibm",
"cveId": "CVE-2025-33131",
"datePublished": "2025-10-27T23:56:34.181Z",
"dateReserved": "2025-04-15T17:51:11.506Z",
"dateUpdated": "2025-10-28T13:57:38.628Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-33126 (GCVE-0-2025-33126)
Vulnerability from cvelistv5 – Published: 2025-10-27 23:56 – Updated: 2025-10-28 14:02
VLAI?
Summary
IBM DB2 High Performance Unload 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, 5.1, 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, 5.1, 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, 5.1, 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, and 5.1 could allow an authenticated user to cause the program to crash due to the incorrect calculation of a buffer size.
Severity ?
6.5 (Medium)
CWE
- CWE-131 - Incorrect Calculation of Buffer Size
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| IBM | DB2 High Performance Unload |
Affected:
6.1.0.3
Affected: 5.1.0.1 Affected: 6.1.0.2 Affected: 6.5 Affected: 6.5.0.0 IF1 Affected: 6.1.0.1 Affected: 6.1 Affected: 5.1 cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.3:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:5.1.0.1:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.2:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.5:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0.0:interm_fix1:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0.0:if1:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.1:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.1:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:5.1:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:5.1.0:*:*:*:*:*:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-33126",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-28T13:59:27.560019Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-28T14:02:57.632Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:5.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0.0:interm_fix1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0.0:if1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:5.1.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "DB2 High Performance Unload",
"vendor": "IBM",
"versions": [
{
"status": "affected",
"version": "6.1.0.3"
},
{
"status": "affected",
"version": "5.1.0.1"
},
{
"status": "affected",
"version": "6.1.0.2"
},
{
"status": "affected",
"version": "6.5"
},
{
"status": "affected",
"version": "6.5.0.0 IF1"
},
{
"status": "affected",
"version": "6.1.0.1"
},
{
"status": "affected",
"version": "6.1"
},
{
"status": "affected",
"version": "5.1"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eIBM DB2 High Performance Unload 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, 5.1, 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, 5.1, 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, 5.1, 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, and 5.1 could allow an authenticated user to cause the program to crash due to the incorrect calculation of a buffer size.\u003c/p\u003e"
}
],
"value": "IBM DB2 High Performance Unload 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, 5.1, 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, 5.1, 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, 5.1, 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, and 5.1 could allow an authenticated user to cause the program to crash due to the incorrect calculation of a buffer size."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-131",
"description": "CWE-131 Incorrect Calculation of Buffer Size",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-27T23:56:06.271Z",
"orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"shortName": "ibm"
},
"references": [
{
"tags": [
"vendor-advisory",
"patch"
],
"url": "https://www.ibm.com/support/pages/node/7249336"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eRemediation/Fixes Please download and install Interim Fix 12.1.0.0.1 from Fix Central\u003c/p\u003e"
}
],
"value": "Remediation/Fixes Please download and install Interim Fix 12.1.0.0.1 from Fix Central"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Fixes to common vulnerabilities found in IBM Db2 High Performance Unload",
"x_generator": {
"engine": "ibm-cvegen"
}
}
},
"cveMetadata": {
"assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"assignerShortName": "ibm",
"cveId": "CVE-2025-33126",
"datePublished": "2025-10-27T23:56:06.271Z",
"dateReserved": "2025-04-15T17:51:11.505Z",
"dateUpdated": "2025-10-28T14:02:57.632Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-33133 (GCVE-0-2025-33133)
Vulnerability from nvd – Published: 2025-10-27 23:57 – Updated: 2025-10-28 13:51
VLAI?
Summary
IBM DB2 High Performance Unload 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, and 5.1 could allow an authenticated user to cause the program to crash due an out of bounds write.
Severity ?
6.5 (Medium)
CWE
- CWE-787 - Out-of-bounds Write
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| IBM | DB2 High Performance Unload |
Affected:
6.1.0.3
Affected: 5.1.0.1 Affected: 6.1.0.2 Affected: 6.5 Affected: 6.5.0.0 IF1 Affected: 6.1.0.1 Affected: 6.1 Affected: 5.1 cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.3:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:5.1.0.1:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.2:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.5:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0.0:interm_fix1:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0.0:if1:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.1:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.1:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:5.1:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:5.1.0:*:*:*:*:*:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-33133",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-28T13:50:38.496591Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-28T13:51:03.512Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:5.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0.0:interm_fix1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0.0:if1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:5.1.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "DB2 High Performance Unload",
"vendor": "IBM",
"versions": [
{
"status": "affected",
"version": "6.1.0.3"
},
{
"status": "affected",
"version": "5.1.0.1"
},
{
"status": "affected",
"version": "6.1.0.2"
},
{
"status": "affected",
"version": "6.5"
},
{
"status": "affected",
"version": "6.5.0.0 IF1"
},
{
"status": "affected",
"version": "6.1.0.1"
},
{
"status": "affected",
"version": "6.1"
},
{
"status": "affected",
"version": "5.1"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eIBM DB2 High Performance Unload 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, and 5.1 could allow an authenticated user to cause the program to crash due an out of bounds write.\u003c/p\u003e"
}
],
"value": "IBM DB2 High Performance Unload 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, and 5.1 could allow an authenticated user to cause the program to crash due an out of bounds write."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787 Out-of-bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-27T23:57:31.927Z",
"orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"shortName": "ibm"
},
"references": [
{
"tags": [
"vendor-advisory",
"patch"
],
"url": "https://www.ibm.com/support/pages/node/7249336"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eRemediation/Fixes Please download and install Interim Fix 12.1.0.0.1 from Fix Central\u003c/p\u003e"
}
],
"value": "Remediation/Fixes Please download and install Interim Fix 12.1.0.0.1 from Fix Central"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Fixes to common vulnerabilities found in IBM Db2 High Performance Unload",
"x_generator": {
"engine": "ibm-cvegen"
}
}
},
"cveMetadata": {
"assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"assignerShortName": "ibm",
"cveId": "CVE-2025-33133",
"datePublished": "2025-10-27T23:57:31.927Z",
"dateReserved": "2025-04-15T17:51:11.506Z",
"dateUpdated": "2025-10-28T13:51:03.512Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-33132 (GCVE-0-2025-33132)
Vulnerability from nvd – Published: 2025-10-27 23:57 – Updated: 2025-10-28 13:53
VLAI?
Summary
IBM DB2 High Performance Unload 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, and 5.1 could allow an authenticated user to cause the program to crash due to the incorrect calculation of the size of the data that is being pointed to.
Severity ?
6.5 (Medium)
CWE
- CWE-467 - Use of sizeof() on a Pointer Type
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| IBM | DB2 High Performance Unload |
Affected:
6.1.0.3
Affected: 5.1.0.1 Affected: 6.1.0.2 Affected: 6.5 Affected: 6.5.0.0 IF1 Affected: 6.1.0.1 Affected: 6.1 Affected: 5.1 cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.3:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:5.1.0.1:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.2:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.5:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0.0:interm_fix1:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0.0:if1:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.1:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.1:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:5.1:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:5.1.0:*:*:*:*:*:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-33132",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-28T13:53:17.971219Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-28T13:53:31.618Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:5.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0.0:interm_fix1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0.0:if1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:5.1.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "DB2 High Performance Unload",
"vendor": "IBM",
"versions": [
{
"status": "affected",
"version": "6.1.0.3"
},
{
"status": "affected",
"version": "5.1.0.1"
},
{
"status": "affected",
"version": "6.1.0.2"
},
{
"status": "affected",
"version": "6.5"
},
{
"status": "affected",
"version": "6.5.0.0 IF1"
},
{
"status": "affected",
"version": "6.1.0.1"
},
{
"status": "affected",
"version": "6.1"
},
{
"status": "affected",
"version": "5.1"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eIBM DB2 High Performance Unload 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, and 5.1 could allow an authenticated user to cause the program to crash due to the incorrect calculation of the size of the data that is being pointed to.\u003c/p\u003e"
}
],
"value": "IBM DB2 High Performance Unload 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, and 5.1 could allow an authenticated user to cause the program to crash due to the incorrect calculation of the size of the data that is being pointed to."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-467",
"description": "CWE-467 Use of sizeof() on a Pointer Type",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-27T23:57:12.201Z",
"orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"shortName": "ibm"
},
"references": [
{
"tags": [
"vendor-advisory",
"patch"
],
"url": "https://www.ibm.com/support/pages/node/7249336"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eRemediation/Fixes Please download and install Interim Fix 12.1.0.0.1 from Fix Central\u003c/p\u003e"
}
],
"value": "Remediation/Fixes Please download and install Interim Fix 12.1.0.0.1 from Fix Central"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Fixes to common vulnerabilities found in IBM Db2 High Performance Unload",
"x_generator": {
"engine": "ibm-cvegen"
}
}
},
"cveMetadata": {
"assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"assignerShortName": "ibm",
"cveId": "CVE-2025-33132",
"datePublished": "2025-10-27T23:57:12.201Z",
"dateReserved": "2025-04-15T17:51:11.506Z",
"dateUpdated": "2025-10-28T13:53:31.618Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-33131 (GCVE-0-2025-33131)
Vulnerability from nvd – Published: 2025-10-27 23:56 – Updated: 2025-10-28 13:57
VLAI?
Summary
IBM DB2 High Performance Unload 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, and 5.1 could allow an authenticated user to cause the program to crash due to a buffer being overwritten when it is allocated on the stack.
Severity ?
6.5 (Medium)
CWE
- CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| IBM | DB2 High Performance Unload |
Affected:
6.1.0.3
Affected: 5.1.0.1 Affected: 6.1.0.2 Affected: 6.5 Affected: 6.5.0.0 IF1 Affected: 6.1.0.1 Affected: 6.1 Affected: 5.1 cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.3:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:5.1.0.1:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.2:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.5:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0.0:interm_fix1:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0.0:if1:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.1:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.1:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:5.1:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:5.1.0:*:*:*:*:*:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-33131",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-28T13:57:29.073195Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-28T13:57:38.628Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:5.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0.0:interm_fix1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0.0:if1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:5.1.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "DB2 High Performance Unload",
"vendor": "IBM",
"versions": [
{
"status": "affected",
"version": "6.1.0.3"
},
{
"status": "affected",
"version": "5.1.0.1"
},
{
"status": "affected",
"version": "6.1.0.2"
},
{
"status": "affected",
"version": "6.5"
},
{
"status": "affected",
"version": "6.5.0.0 IF1"
},
{
"status": "affected",
"version": "6.1.0.1"
},
{
"status": "affected",
"version": "6.1"
},
{
"status": "affected",
"version": "5.1"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eIBM DB2 High Performance Unload 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, and 5.1 could allow an authenticated user to cause the program to crash due to a buffer being overwritten when it is allocated on the stack.\u003c/p\u003e"
}
],
"value": "IBM DB2 High Performance Unload 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, and 5.1 could allow an authenticated user to cause the program to crash due to a buffer being overwritten when it is allocated on the stack."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-120",
"description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-27T23:56:34.181Z",
"orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"shortName": "ibm"
},
"references": [
{
"tags": [
"vendor-advisory",
"patch"
],
"url": "https://www.ibm.com/support/pages/node/7249336"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eRemediation/Fixes Please download and install Interim Fix 12.1.0.0.1 from Fix Central\u003c/p\u003e"
}
],
"value": "Remediation/Fixes Please download and install Interim Fix 12.1.0.0.1 from Fix Central"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Fixes to common vulnerabilities found in IBM Db2 High Performance Unload",
"x_generator": {
"engine": "ibm-cvegen"
}
}
},
"cveMetadata": {
"assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"assignerShortName": "ibm",
"cveId": "CVE-2025-33131",
"datePublished": "2025-10-27T23:56:34.181Z",
"dateReserved": "2025-04-15T17:51:11.506Z",
"dateUpdated": "2025-10-28T13:57:38.628Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-33126 (GCVE-0-2025-33126)
Vulnerability from nvd – Published: 2025-10-27 23:56 – Updated: 2025-10-28 14:02
VLAI?
Summary
IBM DB2 High Performance Unload 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, 5.1, 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, 5.1, 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, 5.1, 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, and 5.1 could allow an authenticated user to cause the program to crash due to the incorrect calculation of a buffer size.
Severity ?
6.5 (Medium)
CWE
- CWE-131 - Incorrect Calculation of Buffer Size
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| IBM | DB2 High Performance Unload |
Affected:
6.1.0.3
Affected: 5.1.0.1 Affected: 6.1.0.2 Affected: 6.5 Affected: 6.5.0.0 IF1 Affected: 6.1.0.1 Affected: 6.1 Affected: 5.1 cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.3:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:5.1.0.1:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.2:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.5:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0.0:interm_fix1:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0.0:if1:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.1:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.1:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:5.1:*:*:*:*:*:*:* cpe:2.3:a:ibm:db2_high_performance_unload:5.1.0:*:*:*:*:*:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-33126",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-28T13:59:27.560019Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-28T14:02:57.632Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:5.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0.0:interm_fix1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.5.0.0:if1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_high_performance_unload:5.1.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "DB2 High Performance Unload",
"vendor": "IBM",
"versions": [
{
"status": "affected",
"version": "6.1.0.3"
},
{
"status": "affected",
"version": "5.1.0.1"
},
{
"status": "affected",
"version": "6.1.0.2"
},
{
"status": "affected",
"version": "6.5"
},
{
"status": "affected",
"version": "6.5.0.0 IF1"
},
{
"status": "affected",
"version": "6.1.0.1"
},
{
"status": "affected",
"version": "6.1"
},
{
"status": "affected",
"version": "5.1"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eIBM DB2 High Performance Unload 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, 5.1, 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, 5.1, 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, 5.1, 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, and 5.1 could allow an authenticated user to cause the program to crash due to the incorrect calculation of a buffer size.\u003c/p\u003e"
}
],
"value": "IBM DB2 High Performance Unload 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, 5.1, 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, 5.1, 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, 5.1, 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, and 5.1 could allow an authenticated user to cause the program to crash due to the incorrect calculation of a buffer size."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-131",
"description": "CWE-131 Incorrect Calculation of Buffer Size",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-27T23:56:06.271Z",
"orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"shortName": "ibm"
},
"references": [
{
"tags": [
"vendor-advisory",
"patch"
],
"url": "https://www.ibm.com/support/pages/node/7249336"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eRemediation/Fixes Please download and install Interim Fix 12.1.0.0.1 from Fix Central\u003c/p\u003e"
}
],
"value": "Remediation/Fixes Please download and install Interim Fix 12.1.0.0.1 from Fix Central"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Fixes to common vulnerabilities found in IBM Db2 High Performance Unload",
"x_generator": {
"engine": "ibm-cvegen"
}
}
},
"cveMetadata": {
"assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"assignerShortName": "ibm",
"cveId": "CVE-2025-33126",
"datePublished": "2025-10-27T23:56:06.271Z",
"dateReserved": "2025-04-15T17:51:11.505Z",
"dateUpdated": "2025-10-28T14:02:57.632Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}