This script is Copyright (C) 2005-2015 Tenable Network Security, Inc.
The remote Fedora Core host is missing a security update.
A buffer overflow was discovered in fetchmail's POP3 client. A
malicious server could cause fetchmail to execute arbitrary code.
The Common Vulnerabilities and Exposures project has assigned the name
CVE-2005-2355 to this issue.
All fetchmail users should upgrade to the updated package, which fixes
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
See also :
Update the affected fetchmail and / or fetchmail-debuginfo packages.
Risk factor :
Medium / CVSS Base Score : 5.0