FreeBSD Ports: ircd-ratbox

Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades. http://www.debian.org/security/2010/dsa-1980 http://lists.ratbox.org/pipermail/ircd-ratbox/2010-January/000890.html http://lists.ratbox.org/pipermail/ircd-ratbox/2010-January/000891.html http://www.vuxml.org/freebsd/192609c8-0c51-11df-82a0-00248c9b4be7.html
Insight
The following packages are affected: ircd-ratbox ircd-ratbox-devel CVE-2009-4016 Integer underflow in the clean_string function in irc_string.c in (1) IRCD-hybrid 7.2.2 and 7.2.3, (2) ircd-ratbox before 2.2.9, and (3) oftc-hybrid before 1.6.8, when flatten_links is disabled, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a LINKS command. CVE-2010-0300 cache.c in ircd-ratbox before 2.2.9 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a HELP command.