This script is Copyright (C) 2013-2017 Tenable Network Security, Inc.
The remote host is affected by a security feature bypass
The remote host contains a flaw in the handling of SSL version 3
(SSLv3) and TLS (Transport Layer Security) protocols. An attacker can
inject specially crafted content into an SSL/TLS session, which could
allow an attacker to bypass security features of SSLv3 and TLS
protocols in order to intercept communications.
Note that this plugin only tests Microsoft IIS HTTPS and TLS-capable
FTP servers, which are known to use MS13-006 update files. Other
SSL/TLS implementations may also be affected. To test all SSL/TLS
services Nessus finds, configure the 'Report paranoia' preference
setting to 'Paranoid (more false alarms).'
See also :
Microsoft has released a set of patches for Windows Vista, 2008, 7,
2008 R2, 8, and 2012.
For other SSL/TLS implementations, contact the vendor for updates.
Risk factor :
Medium / CVSS Base Score : 5.8
CVSS Temporal Score : 4.3
Public Exploit Available : false