FreeBSD Ports: pear-XML_RPC

Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades. http://www.gulftech.org/?node=research&article_id=00087-07012005 http://www.hardened-php.net/advisory-022005.php http://www.vuxml.org/freebsd/523fad14-eb9d-11d9-a8bd-000cf18bbe54.html
Insight
The following package is affected: pear-XML_RPC CVE-2005-1921 PEAR XML_RPC 1.3.0 and earlier, as used in products such as WordPress, Serendipity, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement.