PHP SSL Certificate Validation Security Bypass Vulnerability (Windows)

Summary
This host is running PHP and is prone to security bypass vulnerability.
Impact
Successful exploitation will allow remote attackers to spoof the server via a MitM (Man-in-the-Middle) attack and disclose potentially sensitive information.
Solution
Upgrade to PHP version 5.4.18 or 5.5.2 or later, For updates refer to http://php.net
Insight
The flaw is due to the SSL module not properly handling NULL bytes inside 'subjectAltNames' general names in the server SSL certificate.
Affected
PHP versions before 5.4.18 and 5.5.x before 5.5.2 on Windows.
Detection
Get the installed version of PHP with the help of detect NVT and check it is vulnerable or not.
References