FreeBSD Ports: netatalk

Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades. http://secunia.com/advisories/33227/ http://www.openwall.com/lists/oss-security/2009/01/13/3 http://www.vuxml.org/freebsd/72cba7b0-13cd-11de-a964-0030843d3802.html
Insight
The following package is affected: netatalk CVE-2008-5718 The papd daemon in Netatalk before 2.0.4-beta2, when using certain variables in a pipe command for the print file, allows remote attackers to execute arbitrary commands via shell metacharacters in a print request, as demonstrated using a crafted Title.