Gentoo Linux Security Advisory 201006-12 - Multiple vulnerabilities have been reported in Fetchmail, allowing remote attackers to execute arbitrary code or to conduct Man-in-the-Middle attacks. Versions less than 6.3.14 are affected.
673e4aabeca54c4f6f8eb89a2119f7e035d028ee5801f0d90caec3696f7ba79a
Mandriva Linux Security Advisory 2010-037 - The sdump function in sdump.c in fetchmail 6.3.11, 6.3.12, and 6.3.13, when running in verbose mode on platforms for which char is signed, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an SSL X.509 certificate containing non-printable characters with the high bit set, which triggers a heap-based buffer overflow during escaping. This update provides fetchmail 6.3.14, which is not vulnerable to this issue.
a0d164b3f8214565099f864d7d92bc2d97f7048af315e7a19ffc5b957dc2e861