FreeBSD Ports: ejabberd

Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades. http://secunia.com/advisories/38337 http://support.process-one.net/browse/EJAB-1173 http://www.openwall.com/lists/oss-security/2010/01/29/1 http://xforce.iss.net/xforce/xfdb/56025 http://www.vuxml.org/freebsd/a04a3c13-4932-11df-83fb-0015587e2cc1.html
Insight
The following package is affected: ejabberd CVE-2010-0305 ejabberd_c2s.erl in ejabberd before 2.1.3 allows remote attackers to cause a denial of service (daemon crash) via a large number of c2s (aka client2server) messages that trigger a queue overload.