Debian Security Advisory DSA 774-1 - Edward Shornock discovered a bug in the UIDL handling code of fetchmail, a common POP3, APOP and IMAP mail fetching utility. A malicious POP3 server could exploit this problem and inject arbitrary code that will be executed on the victim host. If fetchmail is running as root, this becomes a root exploit.
e30a4b05419887264e05a08c16a5de24bfb39591623bf714786afdb00b2b9703
Fetchmail version 1.02 suffers from a remote code injection vulnerability.
fc3f1ce80d30fc5169baa1476c5710f9cd636aec98c35ccdc729e1c419f34d2c
Gentoo Linux Security Advisory GLSA 200507-21 - fetchmail does not properly validate UIDs coming from a POP3 mail server. The UID is placed in a fixed length buffer on the stack, which can be overflown. Versions less than 6.2.5.2 are affected.
e183ba8135f58ed6750b8c55799fddc77fe41b5730a1d87bec474be7a913c8cf