FreeBSD Ports: squid

Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades. http://www.idefense.com/application/poi/display?id=107&type=vulnerabilities&flashstatus=false http://www.osvdb.org/6791 http://secunia.com/advisories/11804 http://www.squid-cache.org/bugs/show_bug.cgi?id=998 http://www.vuxml.org/freebsd/6f955451-ba54-11d8-b88c-000d610a3b12.html
Insight
The following package is affected: squid CVE-2004-0541 Buffer overflow in the ntlm_check_auth (NTLM authentication) function for Squid Web Proxy Cache 2.5.x and 3.x, when compiled with NTLM handlers enabled, allows remote attackers to execute arbitrary code via a long password ('pass' variable).