OpenSSL DSA_do_verify() Security Bypass Vulnerability in NASL

Summary
The host is running NASL and is prone to Security Bypass vulnerability.
Impact
Successful exploitation could allow remote attackers to bypass the certificate validation checks and can cause spoofing attacks via signature checks with SSL/TLS. Impact Level: System/Application
Solution
Apply Patch http://cvs.fedoraproject.org/viewvc/rpms/libnasl/F-10/libnasl.spec?r1=1.16&r2=1.17 ********* NOTE: Please ignore the warning, if patch is applied. *********
Insight
The flaw is due to improper validation of return value in nasl/nasl_crypto2.c file from DSA_do_verify function of OpenSSL.
Affected
Nessus Attack Scripting Language (NASL) version 2.2.11 and prior on Linux.
References