I'm currently investigating the Microsoft Windows Vulnerability In TLS/SSL Could Allow Spoofing (977377) exploit, as a McAfee customer I found this related article http://vil.nai.com/vil/content/v_vul50092.htm. I'm oblivious to what the FSL / MVM package of February 9 actually is, so I wondered if anyone would be so kind to explain so that I'm able to test my system for such vulnerability to assess my risk.
The article you referenced is referring to a script in McAfee Vulnerability Manager (MVM).
FSL = the Foundstone Scripting Language (Scripts used within MVM).
Do you have MVM installed in your organization? If you do, that article is suggesting that you run the script "Vulnerability In TLS/SSL Could Allow Spoofing (977377) " to verify if your end-points are vulnerable.
I hope that is clear.
I dont believe we have. I assume theres licensing costs?
I'm going to find my grant number to see if available for download - thanks again Cathy.