According to NGS, the two issues patched by IBM are remotely exploitable buffer overflows that could allow for complete compromise of the affected database server or denial of service attacks. The NGS report indicates that the security research firm has reported additional bugs to IBM that have not yet been patched.
The IBM patch for DB2 Version 7.x may be found here. The IBM patch for DB2 Version 8.1 may be found here. eWEEK.com could find no specifics of the errors in the bug list provided with the patches, although there was one bug listed as "IY60622 SECURITY VULNERABILITY - POTENTIAL EXPLOITABLE BUFFER OVERFLOW".
Neither the NGS advisory, the IBM report nor outside sources indicated that any exploits exist for these issues in the wild. According to NGS Vendor Notification Alerts page, IBM was notified on May 8 and on June 8 of the two problems. NGS is withholding details on the exact nature of the bugs until Dec. 1, in order to give DB2 administrators opportunity to apply the fixes before attackers exploit the flaws. NGS also states that its NGSSquirrel for DB2 vulnerability scanner has been updated to search for the flaws in DB2 servers.