FreeBSD Ports: cdrdao

Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades, or ensure that cdrdao is not setuid root. http://secunia.com/advisories/15354/ http://sourceforge.net/forum/forum.php?forum_id=466399 http://www.vuxml.org/freebsd/d51a7e6e-c546-11d9-9aed-000e0c2e438a.html
Insight
The following package is affected: cdrdao A priviledge escalation attack in cdrdao allows a local user to gain root access if cdrdao is setuid root. The default configuration is not vulnerable, since the default is to NOT have this software installed as setuid root.