This script is Copyright (C) 2012-2013 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
Secunia reports :
The vulnerability is caused due to the TLS implementation not properly
clearing transport layer buffers when upgrading from plaintext to
ciphertext after receiving the 'STARTTLS' command. This can be
exploited to insert arbitrary plaintext data (e.g. SMTP commands)
during the plaintext phase, which will then be executed after
upgrading to the TLS ciphertext phase.
See also :
Update the affected package.
Risk factor :