It's likely this will be completely caught by FC4 FORTIFY_SOURCE however I've not verified it yet. See RHEL bug for (private) proof of concept. +++ This bug was initially created as a clone of Bug #163816 +++ We were alerted today to a Debian bug report showing a flaw where a malicious POP3 server could overflow a stack buffer in fetchmail. Draft advisory at http://fetchmail.berlios.de/fetchmail-SA-2005-01.txt More details at end of http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=212762
(Actually it isn't and wouldn't be caught by FORTIFY_SOURCE)
Fixed in fetchmail-6.2.5-7.fc[34].1