VMWare VirtualCenter client 2.x before 2.0.1 Patch 1 (Build 33643) and 1.4.x before 1.4.1 Patch 1 (Build 33425), when server certificate verification is enabled, does not verify the server's X.509 certificate when creating an SSL session, which allows remote malicious servers to spoof valid servers via a man-in-the-middle attack.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:21
Type | Values Removed | Values Added |
---|---|---|
References | () http://kb.vmware.com/kb/4646606 - | |
References | () http://secunia.com/advisories/23053 - Vendor Advisory | |
References | () http://securitytracker.com/id?1017270 - | |
References | () http://www.securityfocus.com/archive/1/452275/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/21231 - | |
References | () http://www.vmware.com/download/vi/vc-201-200611-patch.html - Patch | |
References | () http://www.vupen.com/english/advisories/2006/4655 - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/30477 - |
Information
Published : 2006-11-21 01:07
Updated : 2024-11-21 00:21
NVD link : CVE-2006-5990
Mitre link : CVE-2006-5990
CVE.ORG link : CVE-2006-5990
JSON object : View
Products Affected
vmware
- virtualcenter
CWE
CWE-20
Improper Input Validation