This script is Copyright (C) 2012-2017 Tenable Network Security, Inc.
The remote server is affected by a signature validation bypass
According to its banner, the remote server is running a version of
OpenSSL that is earlier than 0.9.8j.
A remote attacker could implement a man-in-the-middle attack by
forging an SSL/TLS signature using DSA and ECDSA keys which bypass
validation of the certificate chain.
See also :
Upgrade to OpenSSL 0.9.8j or later.
Risk factor :
Medium / CVSS Base Score : 5.8
CVSS Temporal Score : 5.0
Public Exploit Available : true