Edward Shornock discovered a bug in the UIDL handling code of fetchmail, a common POP3, APOP and IMAP mail fetching utility. A malicious POP3 server could exploit this problem and inject arbitrary code that will be executed on the victim host. If fetchmail is running as root, this becomes a root exploit. The old stable distribution (woody) is not affected by this problem. For the stable distribution (sarge) this problem has been fixed in version 6.2.5-12sarge1. For the unstable distribution (sid) this problem has been fixed in version 6.2.5-16. We recommend that you upgrade your fetchmail package.
Edward Shornock discovered a bug in the UIDL handling code of fetchmail, a common POP3, APOP and IMAP mail fetching utility. A malicious POP3 server could exploit this problem and inject arbitrary code that will be executed on the victim host. If fetchmail is running as root, this becomes a root exploit.
The old stable distribution (woody) is not affected by this problem.
For the stable distribution (sarge) this problem has been fixed in version 6.2.5-12sarge1.
For the unstable distribution (sid) this problem has been fixed in version 6.2.5-16.
We recommend that you upgrade your fetchmail package.
MD5 checksums of the listed files are available in the original advisory.