This script is Copyright (C) 2014 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
Erik Ekman of the iodine project reports :
The client could bypass the password check by continuing after getting
error from the server and guessing the network parameters. The server
would still accept the rest of the setup and also network traffic.
See also :
Update the affected package.
Risk factor :
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now