FreeBSD Ports: openttd

Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades. http://security.openttd.org/en/CVE-2011-3342 http://www.vuxml.org/freebsd/78c25ed7-f3f9-11e0-8b5c-b482fe3f522d.html
Insight
The following package is affected: openttd CVE-2011-3342 Multiple buffer overflows in OpenTTD before 1.1.3 allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via vectors related to (1) NAME, (2) PLYR, (3) CHTS, or (4) AIPL (aka AI config) chunk loading from a savegame.