IBM Support

Security Bulletin: IBM Db2 High Performance Unload is affected by 3RD PARTY - - Unquoted Service Path vulnerability

Security Bulletin


IBM Db2 High Performance Unload has addressed the following vulnerability:Unquoted Service Path

Vulnerability Details

CVEID:   CVE-2019-4606
DESCRIPTION:   IBM DB2 High Performance Unload could allow a local attacker to execute arbitrary code on the system, caused by an untrusted search path vulnerability. By using a executable file, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVSS Base score: 7.4
CVSS Temporal Score: See: for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

Db2 High Performance Unload load for LUW v6.5
Db2 High Performance Unload load for LUW v6.5.0.0 IF1
Db2 High Performance Unload load for LUW v6.1
Db2 High Performance Unload load for LUW v6.1.0.3
Db2 High Performance Unload load for LUW v6.1.0.2
Db2 High Performance Unload load for LUW v6.1.0.1
Db2 High Performance Unload load for LUW v5.1
Db2 High Performance Unload load for LUW v5.1.0.1


HPU have solved the problem in the installer, so that the future releases will not be affected.
For the existing releases and already existing installations on Windows, please refer to below workaround method for updating the Windows service appropriately, so that it would not be affected by this problem any more.

Workarounds and Mitigations

Workaround method:
It is based on updating a Windows registry entry corresponding to the HPU network service.
This registry name is based on the HPU service name which is WinNetServiceXX, where 'XX' is '51', '61' or '65', depending on the HPU version considered.
Here is the registry entry name: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WinNetServiceXX
Under this entry, its key named 'ImagePath', containing the path of the binary associated to the service, is the one to be updated.
It must be changed by rounding the entire path by double-quotes.
Then, in order to have this change taking effect, the HPU network service must be restarted.

Get Notified about Future Security Bulletins




Third Party Acknowledgement Info: The vulnerability was reported to IBM by Rich Mirch

Change History

10 Dec 2019: Initial Publication

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.


According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Document Location


[{"Business Unit":{"code":"BU053","label":"Cloud & Data Platform"},"Product":{"code":"SSC6UE","label":"Optim High Performance Unload for DB2 for Linux, UNIX and Windows"},"Component":"All","Platform":[{"code":"PF002","label":"AIX"},{"code":"PF016","label":"Linux"},{"code":"PF033","label":"Windows"}],"Version":"6.1,6.5","Edition":"All","Line of Business":{"code":"","label":""}}]

Document Information

Modified date:
20 December 2019