This script is Copyright (C) 2012-2013 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
Matthias Andree reports :
With NTLM support enabled, fetchmail might mistake a server-side error
message during NTLM protocol exchange for protocol data, leading to a
Also, with a carefully crafted NTLM challenge, a malicious server
might cause fetchmail to read from a bad memory location, betraying
confidential data. It is deemed hard, although not impossible, to
steal other accounts' data.
See also :
Update the affected package.
Risk factor :
Medium / CVSS Base Score : 5.8