FreeBSD Ports: amaya

Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades. http://secunia.com/advisories/32848/ http://www.bmgsec.com.au/advisory/41/ http://www.bmgsec.com.au/advisory/40/ http://milw0rm.com/exploits/7467 http://www.coresecurity.com/content/amaya-buffer-overflows http://www.vuxml.org/freebsd/a89b76a7-f6bd-11dd-94d9-0030843d3802.html
Insight
The following package is affected: amaya CVE-2008-5282 Multiple stack-based buffer overflows in W3C Amaya Web Browser 10.0.1 allow remote attackers to execute arbitrary code via (1) a link with a long HREF attribute, and (2) a DIV tag with a long id attribute. CVE-2009-0323 Multiple stack-based buffer overflows in W3C Amaya Web Browser 10.0 and 11.0 allow remote attackers to execute arbitrary code via (1) a long type parameter in an input tag, which is not properly handled by the EndOfXmlAttributeValue function (2) an 'HTML GI' in a start tag, which is not properly handled by the ProcessStartGI function and unspecified vectors in (3) html2thot.c and (4) xml2thot.c, related to the msgBuffer variable. NOTE: these are different vectors than CVE-2008-6005.