OpenSSL/GnuTLS SSL Server Spoofing Vulnerability (Win)

Summary
This host is running OpenSSL/GnuTLS and is prone to SSL server spoofing vulnerability.
Impact
Successful exploitation will let the attacker spoof the SSL cerficate and gain unauthorized access.
Solution
Upgrade to OpenSSL 1.0.0 or later and GnuTLS 2.6.4 or 2.7.4 or later. http://www.openssl.org/ http://www.gnu.org/software/gnutls/
Insight
The NSS library used in these applications support MD2 with X.509 certificates, which allows certificate to be spoofed using MD2 hash collision design flaws.
Affected
OpenSSL version 0.9.8 through 0.9.8k GnuTLS version before 2.6.4 and before 2.7.4 on Windows
References