This script is Copyright (C) 2006-2013 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
Freeradius Security Contact reports :
Insufficient input validation was being done in the EAP-MSCHAPv2 state
machine. A malicious attacker could manipulate their EAP-MSCHAPv2
client state machine to potentially convince the server to bypass
authentication checks. This bypassing could also result in the server
See also :
Update the affected package.
Risk factor :
High / CVSS Base Score : 7.5