SB2025081836 - Multiple vulnerabilities in IBM Security Guardium Key Lifecycle Manager
Published: August 18, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 16 secuirty vulnerabilities.
1) Resource exhaustion (CVE-ID: CVE-2025-2533)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.
2) Stack-based buffer overflow (CVE-ID: CVE-2025-30472)
The vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to a boundary error in orf_token_endian_convert() function in exec/totemsrp.c. A remote attacker can send an overly large UDP packet to the application, trigger a stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability requires that encryption is disabled.
3) Deadlock (CVE-ID: CVE-2025-36010)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to executable segments that are waiting for each other to release a necessary lock. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.
4) Resource exhaustion (CVE-ID: CVE-2025-33114)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.
5) Missing Release of Resource after Effective Lifetime (CVE-ID: CVE-2025-36071)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper release of memory resources. A remote attacker can trigger the vulnerability and perform a denial of service (DoS) attack.
6) Stack-based buffer overflow (CVE-ID: CVE-2024-52894)
The vulnerability allows a remote privileged user to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources. A remote privileged user can send a specially crafted query and perform a denial of service (DoS) attack.
7) Input validation error (CVE-ID: CVE-2025-24970)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in SslHandler when using native SSLEngine. A remote attacker can send a specially crafted packet to the application and perform a denial of service (DoS) attack.
8) Uncontrolled Recursion (CVE-ID: CVE-2025-33143)
The vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to uncontrolled recursion. A remote user can send a specially crafted SQL statement that performs uncontrolled recursion.
9) Input validation error (CVE-ID: CVE-2024-50602)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input within the XML_ResumeParser function. A remote attacker can pass specially crafted XML input to the application and perform a denial of service (DoS) attack.
10) Integer overflow (CVE-ID: CVE-2024-45492)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to integer overflow within the nextScaffoldPart() function in xmlparse.c. A remote attacker can pass specially crafted data to the application, trigger an integer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
11) Integer overflow (CVE-ID: CVE-2024-45491)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to integer overflow within the dtdCopy() function in xmlparse.c. A remote attacker can pass specially crafted input to the application, trigger an integer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
12) Buffer Underwrite ('Buffer Underflow') (CVE-ID: CVE-2024-45490)
The vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to a boundary error in xmlparse.c when handling negative length for XML_ParseBuffer. A remote attacker can pass specially crafted input to the application, trigger buffer underflow and execute arbitrary code on the system.
13) Stack-based buffer overflow (CVE-ID: CVE-2024-49828)
The vulnerability allows a remote attacker to perform a denial of service attack.
The vulnerability exists due to server may crash under certain conditions with a specially crafted query. A remote unauthenticated attacker can send a specially crafted query to perform a denial of service attack.
14) Stack-based buffer overflow (CVE-ID: CVE-2024-51473)
The vulnerability allows a remote attacker to perform a denial of service attack.
The vulnerability exists due to server may crash under certain conditions with a specially crafted query. A remote unauthenticated attacker can send a specially crafted query to perform a denial of service attack.
15) Heap-based buffer overflow (CVE-ID: CVE-2025-0755)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within various bson_append functions. A remote attacker can pass specially crafted data to the application, trigger a heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
16) Stack-based buffer overflow (CVE-ID: CVE-2025-33092)
The vulnerability allows a local user to perform a denial of service attack.
The vulnerability exists due to improper bounds checking. A local user can send a specially crafted query to overflow the buffer and execute arbitrary code on the system.
Remediation
Install update from vendor's website.