FreeBSD Ports: mantis

Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades. http://www.mantisbt.org/bugs/view.php?id=9524 http://www.mantisbt.org/bugs/view.php?id=9533 http://enablesecurity.com/2008/08/11/surf-jack-https-will-not-save-you/ http://int21.de/cve/CVE-2008-3102-mantis.html http://www.vuxml.org/freebsd/00d6040a-b8e0-11dd-a578-0030843d3802.html
Insight
The following package is affected: mantis CVE-2008-3102 Mantis 1.1.x through 1.1.2 and 1.2.x through 1.2.0a2 does not set the secure flag for the session cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.