FreeBSD Ports: xinetd

Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades. https://bugzilla.redhat.com/show_bug.cgi?id=790940 http://www.vuxml.org/freebsd/e11955ca-187c-11e2-be36-00215af774f0.html
Insight
The following package is affected: xinetd CVE-2012-0862 builtins.c in Xinetd before 2.3.15 does not check the service type when the tcpmux-server service is enabled, which exposes all enabled services and allows remote attackers to bypass intended access restrictions via a request to tcpmux port 1.