3.6
CWE
NVD-CWE-Other
Advisory Published
Updated

CVE-2006-3589

First published: Wed Jul 19 2006(Updated: )

vmware-config.pl in VMware for Linux, ESX Server 2.x, and Infrastructure 3 does not check the return code from a Perl chmod function call, which might cause an SSL key file to be created with an unsafe umask that allows local users to read or modify the SSL key.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
VMware Server=1.0.1_build_29996
VMware Workstation=5.5.3
VMware Virtual Infrastructure Client=3
VMware Player
VMware ESX=2.0
VMware ESX=2.0.1
VMware ESX=2.1.2
VMware ESX=2.5
VMware ESX=2.5.2
VMware ESX=2.1.1
VMware ESX=2.1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2006-3589?

    CVE-2006-3589 is considered to have moderate severity due to the potential exposure of SSL key files.

  • How do I fix CVE-2006-3589?

    To fix CVE-2006-3589, ensure proper permissions are set on the SSL key files and update the affected VMware products to the latest versions.

  • Which VMware products are affected by CVE-2006-3589?

    CVE-2006-3589 affects VMware Server 1.0.1, VMware Workstation 5.5.3, VMware ESX versions 2.0 to 2.5.2, and VMware Virtual Infrastructure Client 3.

  • What kind of attack can exploit CVE-2006-3589?

    An attacker with local access can exploit CVE-2006-3589 to read or modify unsafe SSL key files due to incorrect permissions.

  • Is there a patch available for CVE-2006-3589?

    Yes, VMware has released updates for the affected products to mitigate the vulnerability identified as CVE-2006-3589.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203