FreeBSD Ports: cdrdao

The remote host is missing an update to the system as announced in the referenced advisory.
Update your system with the appropriate patches or software upgrades, or ensure that cdrdao is not setuid root.
The following package is affected: cdrdao A priviledge escalation attack in cdrdao allows a local user to gain root access if cdrdao is setuid root. The default configuration is not vulnerable, since the default is to NOT have this software installed as setuid root.