The remote web server is running an outdated instance of OpenSSL and that is affected by a remote code execution (RCE) vulnerability.
According to its banner, the version of OpenSSL on the remote host is 1.0.2 prior to 1.0.2g or 1.0.1 prior to 1.0.1s and is affected by a flaw in the 'doapr_outch()' function within 'crypto/bio/b_print.c' that is triggered when failing to allocate memory, as the function's return value has no way to signal this error to a calling function. This may allow a context-dependent attacker to corrupt memory and crash a process linked against the library or potentially execute arbitrary code.
Upgrade OpenSSL to version 1.0.2g or higher. If 1.0.2 cannot be obtained, 1.0.1s has also been patched for this vulnerability.