FreeBSD Ports: kpopup

Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades. http://www.securityfocus.com/archive/1/342736 http://www.henschelsoft.de/kpopup_en.html http://www.vuxml.org/freebsd/1613db79-8e52-11da-8426-000fea0a9611.html
Insight
The following package is affected: kpopup CVE-2003-1170 Format string vulnerability in main.cpp in kpopup 0.9.1 and 0.9.5pre2 allows local users to cause a denial of service (segmentation fault) and possibly execute arbitrary code via format string specifiers in command line arguments. CVE-2003-1167 misc.cpp in KPopup 0.9.1 trusts the PATH variable when executing killall, which allows local users to elevate their privileges by modifying the PATH variable to reference a malicious killall program.