{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-13T01:51:30.572","vulnerabilities":[{"cve":{"id":"CVE-2009-0172","sourceIdentifier":"cve@mitre.org","published":"2009-01-16T21:30:03.593","lastModified":"2026-04-23T00:35:47.467","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Unspecified vulnerability in IBM DB2 8 before FP17a, 9.1 before FP6a, and 9.5 before FP3a allows remote attackers to cause a denial of service (infinite loop) via a crafted CONNECT data stream."},{"lang":"es","value":"Vulnerabilidad no especificada en IBM DB2 v9.1 anterior a FP6a y 9.5 anterior a FP3a permite a atacantes remotos causar denegación de servicio a través de una secuencia de datos CONNECT manipulada."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2_universal_database:9.1:*:aix:*:*:*:*:*","matchCriteriaId":"0D925911-6225-4B31-9C19-EF40360A9FB7"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2_universal_database:9.1:*:hp-ux:*:*:*:*:*","matchCriteriaId":"A96437C6-D2C6-46BC-BC2D-078F6131E8E7"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2_universal_database:9.1:*:linux:*:*:*:*:*","matchCriteriaId":"806CC0EE-9779-4676-A1FB-13878BAE42F4"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2_universal_database:9.1:*:solaris:*:*:*:*:*","matchCriteriaId":"C31FA827-1D6D-471A-8246-D39AF6AD0F83"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2_universal_database:9.1:*:windows:*:*:*:*:*","matchCriteriaId":"9446F75C-BE15-4DAE-9B96-E80F0EF24C0A"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2_universal_database:9.1:fp2:*:*:*:*:*:*","matchCriteriaId":"06EA7251-AF53-4A63-B469-97A1316FCFFF"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2_universal_database:9.1:fp2:aix:*:*:*:*:*","matchCriteriaId":"640F9988-7F33-4440-AB63-2743237BF2B3"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2_universal_database:9.1:fp2:hp-ux:*:*:*:*:*","matchCriteriaId":"C6F52E0B-24A2-4942-9256-ADBBEE3C1BE6"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2_universal_database:9.1:fp2:linux:*:*:*:*:*","matchCriteriaId":"627E56A7-98F1-4A94-9F76-4C6A9365616B"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2_universal_database:9.1:fp2:solaris:*:*:*:*:*","matchCriteriaId":"9DBCE5C1-CE78-4DEA-A6E7-35B2525052E9"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2_universal_database:9.1:fp2:windows:*:*:*:*:*","matchCriteriaId":"CC92F759-749C-4E6A-83B3-C8ADB333054F"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2_universal_database:9.1:fp3:aix:*:*:*:*:*","matchCriteriaId":"30FD4DEA-CB8C-4E90-BE9E-B5C6225371A1"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2_universal_database:9.1:fp3:hp-ux:*:*:*:*:*","matchCriteriaId":"24FE6316-E7FB-474B-B61B-38F72D6EE632"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2_universal_database:9.1:fp3:solaris:*:*:*:*:*","matchCriteriaId":"D16FC5E6-87A6-4594-8E1F-8DEBA7A7326B"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2_universal_database:9.1:fp4:*:*:*:*:*:*","matchCriteriaId":"6E9595EC-7222-4737-96B8-80847399CFF4"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2_universal_database:9.1:fp4:aix:*:*:*:*:*","matchCriteriaId":"3F54309A-BA0E-447A-A115-DDBC20F6B2FC"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2_universal_database:9.1:fp4:hp-ux:*:*:*:*:*","matchCriteriaId":"55F55D9D-3016-4AB1-84B3-20FEE3CD0A98"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2_universal_database:9.1:fp4:linux:*:*:*:*:*","matchCriteriaId":"C518666C-29DE-45C0-A68D-74B5E2CEBBBB"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2_universal_database:9.1:fp4:windows:*:*:*:*:*","matchCriteriaId":"A3BD177C-6CF6-463D-8999-830DA1BF3E38"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2_universal_database:9.1:fp4a:*:*:*:*:*:*","matchCriteriaId":"74479A15-2388-4FBA-AE83-1692F22122E5"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2_universal_database:9.1:fp4a:hp-ux:*:*:*:*:*","matchCriteriaId":"7D21AED3-42E7-4C07-8DD3-4DFCC40E1460"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2_universal_database:9.1:fp4a:linux:*:*:*:*:*","matchCriteriaId":"240239CD-9E05-46E0-A42C-13DB5EE8F436"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2_universal_database:9.1:fp4a:windows:*:*:*:*:*","matchCriteriaId":"77828856-BFE6-4D31-90C1-CDB189BA95AD"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2_universal_database:9.1:ga:*:*:*:*:*:*","matchCriteriaId":"E3422821-0C01-4502-AD99-0AFE73751B3F"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2_universal_database:9.5:*:*:*:*:*:*:*","matchCriteriaId":"F01421A6-B4B4-4F86-87D3-B11AEC1258CC"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2_universal_database:9.5:*:aix:*:*:*:*:*","matchCriteriaId":"55D8F159-5A2D-4CB6-A7B9-7DCF8A9B82C4"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2_universal_database:9.5:*:hp-ux:*:*:*:*:*","matchCriteriaId":"F7E8AA7B-4E40-41B9-8940-95B5F00E11DA"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2_universal_database:9.5:*:linux:*:*:*:*:*","matchCriteriaId":"C91A9870-C75D-4B49-B1F5-E9CF054D3CA5"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2_universal_database:9.5:*:solaris:*:*:*:*:*","matchCriteriaId":"B7C7E16D-AC11-4FC0-9534-799926E525EB"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2_universal_database:9.5:*:windows:*:*:*:*:*","matchCriteriaId":"C1B953D1-0B8F-4C6F-8485-E5E942593015"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2_universal_database:9.5:fp1:aix:*:*:*:*:*","matchCriteriaId":"2098CCDC-1F4B-44AC-976E-E31FED8AD976"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2_universal_database:9.5:fp1:hp-ux:*:*:*:*:*","matchCriteriaId":"87FFA2D9-8544-4B12-B02E-8B2198CB3621"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2_universal_database:9.5:fp1:linux:*:*:*:*:*","matchCriteriaId":"BDDEF993-94F0-431F-AC23-86EE3089F61B"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2_universal_database:9.5:fp1:solaris:*:*:*:*:*","matchCriteriaId":"652E829C-0886-4FD6-9513-C1AD844E30AE"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2_universal_database:9.5:fp1:windows:*:*:*:*:*","matchCriteriaId":"99A3B7D1-8467-4B9B-ACAC-2D265386F2D9"}]}]}],"references":[{"url":"ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v82/APARLIST.TXT","source":"cve@mitre.org"},{"url":"ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v91/APARLIST.TXT","source":"cve@mitre.org"},{"url":"ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v95/APARLIST.TXT","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/33529","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://securitytracker.com/id?1021591","source":"cve@mitre.org"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg1IZ37696","source":"cve@mitre.org"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21363936","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www-1.ibm.com/support/docview.wss?uid=swg1IZ36534","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www-1.ibm.com/support/docview.wss?uid=swg1IZ37697","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/33258","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://www.vupen.com/english/advisories/2009/0137","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47931","source":"cve@mitre.org"},{"url":"ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v82/APARLIST.TXT","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v91/APARLIST.TXT","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v95/APARLIST.TXT","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/33529","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://securitytracker.com/id?1021591","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg1IZ37696","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21363936","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www-1.ibm.com/support/docview.wss?uid=swg1IZ36534","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www-1.ibm.com/support/docview.wss?uid=swg1IZ37697","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/33258","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://www.vupen.com/english/advisories/2009/0137","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47931","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}