socket.c in fetchmail before 6.3.11 does not properly handle a ‘\0’ character in a domain name in the subject’s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
fetchmail.berlios.de/fetchmail-SA-2009-01.txt
lists.apple.com/archives/security-announce/2009/Nov/msg00000.html
marc.info/?l=oss-security&m=124949601207156&w=2
osvdb.org/56855
secunia.com/advisories/36175
secunia.com/advisories/36179
secunia.com/advisories/36236
support.apple.com/kb/HT3937
www.debian.org/security/2009/dsa-1852
www.mandriva.com/security/advisories?name=MDVSA-2009:201
www.securityfocus.com/archive/1/505530/100/0/threaded
www.securityfocus.com/bid/35951
www.securitytracker.com/id?1022679
www.slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.543463
www.vupen.com/english/advisories/2009/2155
www.vupen.com/english/advisories/2009/3184
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11059