FreeBSD Security Advisory (FreeBSD-SA-04:14.cvs.asc)

Summary
The remote host is missing an update to the system as announced in the referenced advisory FreeBSD-SA-04:14.cvs.asc
Solution
Upgrade your system to the appropriate stable release or security branch dated after the correction date https://secure1.securityspace.com/smysecure/catid.html?in=FreeBSD-SA-04:14.cvs.asc
Insight
The Concurrent Versions System (CVS) is a version control system. It may be used to access a repository locally, or to access a `remote repository' using a number of different methods. When accessing a remote repository, the target machine runs the CVS server to fulfill client requests. A number of vulnerabilities were discovered in CVS by Stefan Esser, Sebastian Krahmer, and Derek Price. . Insufficient input validation while processing Entry lines. (CVE-2004-0414) . A double-free resulting from erroneous state handling while processing Argumentx commands. (CVE-2004-0416) . Integer overflow while processing Max-dotdot commands. (CVE-2004-0417) . Erroneous handling of empty entries handled while processing Notify commands. (CVE-2004-0418) . A format string bug while processing CVS wrappers. . Single-byte buffer underflows while processing configuration files from CVSROOT. . Various other integer overflows. Additionally, iDEFENSE reports an undocumented command-line flag used in debugging does not perform input validation on the given path names.