FreeBSD Ports: squid

Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades. http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE9-dns_reply http://secunia.com/advisories/15294 http://www.vuxml.org/freebsd/7e97b288-c7ca-11d9-9e1e-c296ac722cb3.html
Insight
The following package is affected: squid CVE-2005-1519 Squid 2.5 STABLE9 and earlier, when the DNS client port is unfiltered and the environment does not prevent IP spoofing, allows remote attackers to spoof DNS lookups.