First published: Tue Nov 21 2006(Updated: )
VMWare VirtualCenter client 2.x before 2.0.1 Patch 1 (Build 33643) and 1.4.x before 1.4.1 Patch 1 (Build 33425), when server certificate verification is enabled, does not verify the server's X.509 certificate when creating an SSL session, which allows remote malicious servers to spoof valid servers via a man-in-the-middle attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VMware vCenter | =2.0.1 | |
VMware vCenter | =1.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-5990 is classified as a high-severity vulnerability due to its potential for remote exploitation.
To fix CVE-2006-5990, upgrade to VMware VirtualCenter 2.0.1 Patch 1 or 1.4.1 Patch 1.
The affected versions in CVE-2006-5990 include VMware VirtualCenter 2.0.1 before Patch 1 and 1.4.1 before Patch 1.
Yes, CVE-2006-5990 allows remote malicious servers to potentially spoof valid servers, facilitating man-in-the-middle attacks.
Yes, server certificate verification is crucial to ensure that the connection is made to a legitimate server, which CVE-2006-5990 fails to enforce.