This indicates an attack attempt to exploit a Buffer Overflow vulnerability in FreeBSD Project bootpd.
The vulnerability is due to an insufficient validation when the vulnerable software handles a malformed BOOTP packet. A remote attacker may be able to exploit this to execute arbitrary code within the context of the application or cause denial of service conditions, via a crafted BOOTP request.
FreeBSD Project bootpd prior to r342231
FreeBSD Project bootpd prior to r348229
FreeBSD Project bootpd prior to r342230
FreeBSD Project bootpd prior to r342228
System Compromise: Remote attackers can gain control of vulnerable systems.
Refer to the vendor's advisory for updates: