This script is Copyright (C) 2011-2013 Tenable Network Security, Inc.
The remote SuSE 11 host is missing one or more security updates.
NetworkManager did not pin a certificate's subject to an ESSID. A
rogue access point could therefore be used to conduct MITM attacks by
using any other valid certificate issued by same CA as used in the
original network (CVE-2006-7246). This has been fixed.
Please note that existing WPA2 Enterprise connections need to be
deleted and re-created to take advantage of the new security checks.
See also :
Apply SAT patch number 5381.
Risk factor :