FreeBSD Ports: emil

Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades. http://www.debian.org/security/2004/dsa-468 http://lists.netsys.com/pipermail/full-disclosure/2004-March/019325.html http://www.vuxml.org/freebsd/ce46b93a-80f2-11d8-9645-0020ed76ef5a.html
Insight
The following package is affected: emil CVE-2004-0152 Multiple stack-based buffer overflows in (1) the encode_mime function, (2) the encode_uuencode function, (3) or the decode_uuencode function for emil 2.1.0 and earlier allow remote attackers to execute arbitrary code via e-mail messages containing attachments with filenames. CVE-2004-0153 Multiple format string vulnerabilities in emil 2.1.0 and earlier may allow remote attackers to execute arbitrary code by triggering certain error messages.