FreeBSD Security Advisory (FreeBSD-SA-10:04.jail.asc)

Summary
The remote host is missing an update to the system as announced in the referenced advisory FreeBSD-SA-10:04.jail.asc
Solution
Upgrade your system to the appropriate stable release or security branch dated after the correction date https://secure1.securityspace.com/smysecure/catid.html?in=FreeBSD-SA-10:04.jail.asc
Insight
The jail(2) system call allows a system administrator to lock a process and all of its descendants inside an environment with a very limited ability to affect the system outside that environment, even for processes with superuser privileges. It is an extension of, but far more powerful than, the traditional UNIX chroot(2) system call. By design, neither the chroot(2) nor the jail(2) system call modify existing open file descriptors of the calling process, in order to allow programmers to make fine grained access control and privilege separation. The jail(8) utility creates a new jail or modifies an existing jail, optionally imprisoning the current process (and future descendants) inside it. The jail(8) utility does not change the current working directory while imprisoning. The current working directory can be accessed by its descendants.