FreeBSD Ports: php5-filter

Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades. http://www.php.net/releases/5_3_4.php http://www.php.net/releases/5_2_15.php http://www.vuxml.org/freebsd/c623f058-10e7-11e0-becc-0022156e8794.html
Insight
The following packages are affected: php5-filter php52-filter CVE-2010-3710 Stack consumption vulnerability in the filter_var function in PHP 5.2.x through 5.2.14 and 5.3.x through 5.3.3, when FILTER_VALIDATE_EMAIL mode is used, allows remote attackers to cause a denial of service (memory consumption and application crash) via a long e-mail address string.