FreeBSD Ports: weechat

Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades. http://weechat.org/security/ https://savannah.nongnu.org/bugs/?37704 http://www.vuxml.org/freebsd/e02c572f-2af0-11e2-bb44-003067b2972c.html
Insight
The following packages are affected: weechat weechat-devel CVE-2012-5854 Heap-based buffer overflow in WeeChat 0.3.6 through 0.3.9 allows remote attackers to cause a denial of service (crash or hang) and possibly execute arbitrary code via crafted IRC colors that are not properly decoded.