This script is Copyright (C) 2009-2017 Tenable Network Security, Inc.
The remote host is running a vulnerable server that may allow an
attacker to authenticate without proper credentials.
The version of Samhain installed on the remote host has an input
verfication bug in its SRP implementation. If able to supply a valid
username, a malicious client can exploit this issue and connect
without a valid password.
See also :
Upgrade to Samhain 2.5.4 or later.
Risk factor :
Medium / CVSS Base Score : 5.8
CVSS Temporal Score : 4.3
Public Exploit Available : false