This script is Copyright (C) 2008-2013 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
SecurityFocus reports :
GnuTLS is prone to a security-bypass vulnerability because the
application fails to properly validate chained X.509 certificates.
Successfully exploiting this issue allows attackers to perform
man-in-the-middle attacks by impersonating trusted servers.
Unsuspecting users may be under a false sense of security that can aid
attackers in launching further attacks.
See also :
Update the affected package.
Risk factor :
Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 3.2
Public Exploit Available : false