FreeBSD Ports: gedit

Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades. :http://marc.theaimsgroup.com/?l=bugtraq&m=111661117701398 http://www.vuxml.org/freebsd/e319da0b-a228-11da-b410-000e0c2e438a.html
Insight
The following package is affected: gedit CVE-2005-1686 Format string vulnerability in gedit 2.10.2 may allow attackers to cause a denial of service (application crash) via a bin file with format string specifiers in the filename. NOTE: while this issue is triggered on the command line by the gedit user, it has been reported that web browsers and email clients could be configured to provide a file name as an argument to gedit, so there is a valid attack that crosses security boundaries.