This script is Copyright (C) 2012 Tenable Network Security, Inc.
The remote SuSE 10 host is missing a security-related patch.
NetworkManager did not pin a certificate's subject to an ESSID. A
rogue access point could therefore be used to conduct MITM attacks by
using any other valid certificate issued by same CA as used in the
original network. (CVE-2006-7246)
Please note that existing WPA2 Enterprise connections need to be
deleted and re-created to take advantage of the new security checks.
See also :
Apply ZYPP patch number 7957.
Risk factor :