It's likely this will be completely caught by FC4 FORTIFY_SOURCE however I've
not verified it yet. See RHEL bug for (private) proof of concept.
+++ This bug was initially created as a clone of Bug #163816 +++
We were alerted today to a Debian bug report showing a flaw where a malicious
POP3 server could overflow a stack buffer in fetchmail.
Draft advisory at http://fetchmail.berlios.de/fetchmail-SA-2005-01.txt
More details at end of http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=212762
(Actually it isn't and wouldn't be caught by FORTIFY_SOURCE)
Fixed in fetchmail-6.2.5-7.fc.1