This script is Copyright (C) 2010-2016 Tenable Network Security, Inc.
The remote Fedora host is missing a security update.
This update fixes a problem whereby IO::Socket::SSL fell back to the
'VERIFY_NONE' verification mode if another verification mode was
defined but no valid ca_file or ca_path was provided.
The updated version throws an error in that situation rather than
proceeding with the connection despite being unable to verify the
certificate(s) as requested.
This issue was originally reported at
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
See also :
Update the affected perl-IO-Socket-SSL package.
Risk factor :
Medium / CVSS Base Score : 4.0
CVSS Temporal Score : 3.5
Public Exploit Available : true