First published: Wed Jul 19 2006(Updated: )
vmware-config.pl in VMware for Linux, ESX Server 2.x, and Infrastructure 3 does not check the return code from a Perl chmod function call, which might cause an SSL key file to be created with an unsafe umask that allows local users to read or modify the SSL key.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Server | =1.0.1_build_29996 | |
VMware Workstation | =5.5.3 | |
VMware Virtual Infrastructure Client | =3 | |
VMware Player | ||
VMware ESX | =2.0 | |
VMware ESX | =2.0.1 | |
VMware ESX | =2.1.2 | |
VMware ESX | =2.5 | |
VMware ESX | =2.5.2 | |
VMware ESX | =2.1.1 | |
VMware ESX | =2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-3589 is considered to have moderate severity due to the potential exposure of SSL key files.
To fix CVE-2006-3589, ensure proper permissions are set on the SSL key files and update the affected VMware products to the latest versions.
CVE-2006-3589 affects VMware Server 1.0.1, VMware Workstation 5.5.3, VMware ESX versions 2.0 to 2.5.2, and VMware Virtual Infrastructure Client 3.
An attacker with local access can exploit CVE-2006-3589 to read or modify unsafe SSL key files due to incorrect permissions.
Yes, VMware has released updates for the affected products to mitigate the vulnerability identified as CVE-2006-3589.