VMWare VirtualCenter client 2.x before 2.0.1 Patch 1 (Build 33643) and 1.4.x before 1.4.1 Patch 1 (Build 33425), when server certificate verification is enabled, does not verify the server's X.509 certificate when creating an SSL session, which allows remote malicious servers to spoof valid servers via a man-in-the-middle attack.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.vupen.com/english/advisories/2006/4655 | vdb entry vendor advisory |
http://securitytracker.com/id?1017270 | vdb entry |
http://www.securityfocus.com/archive/1/452275/100/0/threaded | mailing list |
http://www.vmware.com/download/vi/vc-201-200611-patch.html | patch |
http://kb.vmware.com/kb/4646606 | |
http://secunia.com/advisories/23053 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/21231 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/30477 | vdb entry |