The COM_CHANGE_USER command in MySQL 3.x before 3.23.54, and 4.x to 4.0.6, allows remote attackers to execute arbitrary code via a long response.Referenceshttp://marc.info/?l=bugtraq&m=103971644013961&w=2http://marc.info/?l=bugtraq&m=104005886114500&w=2http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000555http://www.linuxsecurity.com/advisories/engarde_advisory-2660.htmlhttp://security.e-matters.de/advisories/042002.htmlhttp://www.debian.org/security/2002/dsa-212http://www.redhat.com/support/errata/RHSA-2002-288.htmlhttps://exchange.xforce.ibmcloud.com/vulnerabilities/10848http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:087http://www.redhat.com/support/errata/RHSA-2003-166.htmlhttp://marc.info/?l=bugtraq&m=104004857201968&w=2http://www.novell.com/linux/security/advisories/2003_003_mysql.htmlhttp://www.securityfocus.com/bid/6375http://www.redhat.com/support/errata/RHSA-2002-289.htmlhttp://www.trustix.net/errata/misc/2002/TSL-2002-0086-mysql.asc.txthttp://www.securityfocus.com/advisories/5269