The remote host is vulnerable to a buffer overflow.
The remote host seems to be running a vulnerable version of the Netscape Enterprise Server, iPlanet or Sun ONE Web Server. This version is based on a vulnerable version of libNSS, the Network Security Service library that implements the SSL/TLS protocol. It is reported that versions of libNSS up to 3.9.0 are prone to a remote heap overflow in the processing of the 'hello' message. An attacker may use this overflow to execute arbitrary code on the remote host.
Upgrade or patch according to vendor recommendations.