Debian Security Advisory DSA 774-1 (fetchmail)

Summary
The remote host is missing an update to fetchmail announced via advisory DSA 774-1. Edward Shornock discovered a bug in the UIDL handling code of fetchmail, a common POP3, APOP and IMAP mail fetching utility. A malicious POP3 server could exploit this problem and inject arbitrary code that will be executed on the victim host. If fetchmail is running as root, this becomes a root exploit. the old stable distribution (woody) is not affected by this problem.
Solution
For the stable distribution (sarge) this problem has been fixed in version 6.2.5-12sarge1. For the unstable distribution (sid) this problem has been fixed in version 6.2.5-16. We recommend that you upgrade your fetchmail package. https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20774-1