FreeBSD Ports: junkbuster

Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades. http://www.debian.org/security/2005/dsa-713 http://www.gentoo.org/security/en/glsa/glsa-200504-11.xml http://www.vuxml.org/freebsd/97edf5ab-b319-11d9-837d-000e0c2e438a.html
Insight
The following packages are affected: junkbuster junkbuster-zlib CVE-2005-1108 The ij_untrusted_url function in JunkBuster 2.0.2-r2, with single-threaded mode enabled, allows remote attackers to overwrite the referrer field via a crafted HTTP request. CVE-2005-1109 The filtering of URLs in JunkBuster before 2.0.2-r3 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via heap corruption.