Fetchmail: Multiple vulnerabilities Multiple vulnerabilities have been reported in Fetchmail, allowing remote attackers to execute arbitrary code or to conduct Man-in-the-Middle attacks. fetchmail 2010-06-01 2010-06-01 280537 307761 remote 6.3.14 6.3.14

Fetchmail is a remote mail retrieval and forwarding utility.

Multiple vulnerabilities have been reported in Fetchmail:

A remote attacker could entice a user to connect with Fetchmail to a specially crafted SSL-enabled server in verbose mode, possibly resulting in the execution of arbitrary code with the privileges of the user running the application. NOTE: The issue is only existent on platforms on which char is signed.

Furthermore, a remote attacker might employ a specially crafted X.509 certificate, containing a NUL character in the Common Name field to conduct man-in-the-middle attacks on SSL connections made using Fetchmail.

There is no known workaround at this time.

All Fetchmail users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=net-mail/fetchmail-6.3.14"
CVE-2010-0562 CVE-2009-2666 craig craig vorlon