>From Beyond-Security's SecuriTeam.com(The information has been provided by Tharbad): A security vulnerability in MySQL, a database management system, has been discovered. This vulnerability allows remote attackers to crash by issuing a SELECT statement containing a large amount of characters. This crash is due to a buffer overflow, and may enable the attacker to execute arbitrary code. The attacker would need access to MySQL's query engine to exploit this, e.g. a valid username/password, or an interface from which he can enter SQL select statements. Vulnerable systems: MySQL version prior to 3.23.31 Immune systems: MySQL version 3.23.31 and above Example: (You need a valid login/password to exploit this.) # mysql -p -e 'select a.'`perl -e'printf("A"x130)'`'.b' Enter password: (hanged..^C) Alternatively, the following method will work without requiring a password: # mysql -u --execute=