Novell is now a part of Micro Focus

Security update for fetchmail


(Last modified: 03JUN2002)

solutions Security update for fetchmail SuSE Linux Maintenance Web (96bcf630ec7dc8139f9b32d26e34af51)

Applies to

Product(s): SuSE Linux Enterprise Server 7 for PowerPC

Package: fetchmail
Release: 20020603
Obsoletes: none


Everyone using fetchmail should apply this patch.

Problem description

A malicious server is able to return a very high message count that leads to the allocation of an memory area that overlaps a portion of the stack. Subsequently, the server may be able to overwrite that stack area with executable code which will run under the user id of the user executing fetchmail. This security patch fixes this remotely exploitable bug.
A possible buffer overflow due to an incorrect maximum string length provided to vsnprintf() has been fixed as well.
Additionally, a bugfix has been applied to avoid fetchmail hanging when using SSL connections and the server drops the TCP connection unexpectedly.


Please install the updates provided at the location noted below.

Installation notes

This update is provided as an RPM package that can easily be installed onto a running system by using this command:
rpm -Uvh fetchmail.rpm

links to download packages

Download Source Packages

Download the source code of the patches for maintained products.


The Origin of this information may be internal or external to Novell. Novell makes all reasonable efforts to verify this information. However, the information provided in this document is for your information only. Novell makes no explicit or implied claims to the validity of this information.

Any trademarks referenced in this document are the property of their respective owners. Consult your product manuals for complete trademark information.

© Copyright Micro Focus or one of its affiliates