Description
The remote host is using a version of curl (or libcurl) which is vulnerable to a remote buffer overflow. To exploit it, an attacker would have to set up a rogue web server which would reply with maliciously-formed error messages.
Solution
Upgrade to curl 7.4.1 or higher.
Plugin Details
Risk Information
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C