FreeBSD Ports: vim6, vim6+ruby

Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades. http://www.openwall.com/lists/oss-security/2008/07/15/4 http://www.vuxml.org/freebsd/f866d2af-bbba-11df-8a8d-0008743bf21a.html
Insight
The following packages are affected: vim6 vim6+ruby CVE-2008-3432 Heap-based buffer overflow in the mch_expand_wildcards function in os_unix.c in Vim 6.2 and 6.3 allows user-assisted attackers to execute arbitrary code via shell metacharacters in filenames, as demonstrated by the netrw.v3 test case.