FreeBSD Ports: openttd

Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades. http://security.openttd.org/en/CVE-2010-2534 http://www.vuxml.org/freebsd/b6069837-aadc-11df-82df-0015f2db7bde.html
Insight
The following package is affected: openttd CVE-2010-2534 The NetworkSyncCommandQueue function in network/network_command.cpp in OpenTTD before 1.0.3 does not properly clear a pointer in a linked list, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted request, related to the client command queue.