Page 3 of 11 results (0.003 seconds)

CVSS: 4.0EPSS: 0%CPEs: 2EXPL: 0

VMWare VirtualCenter client 2.x before 2.0.1 Patch 1 (Build 33643) and 1.4.x before 1.4.1 Patch 1 (Build 33425), when server certificate verification is enabled, does not verify the server's X.509 certificate when creating an SSL session, which allows remote malicious servers to spoof valid servers via a man-in-the-middle attack. El cliente VMWare VirtualCenter 2.x anterior a 2.0.1 Patch 1 (Build 33463) y 1.4.x anterior a 1.4.1 Patch 1 (Build 33425), cuando la verificación de certificados de servidor está habilitada, no verifica el certificado X.509 del servidor cuando crea una sesión SSL, lo cual permite a servidores remotos maliciosos suplantar a servidores válidos mediante un ataque de "hombre en medio" (man-in-the-middle). • http://kb.vmware.com/kb/4646606 http://secunia.com/advisories/23053 http://securitytracker.com/id?1017270 http://www.securityfocus.com/archive/1/452275/100/0/threaded http://www.securityfocus.com/bid/21231 http://www.vmware.com/download/vi/vc-201-200611-patch.html http://www.vupen.com/english/advisories/2006/4655 https://exchange.xforce.ibmcloud.com/vulnerabilities/30477 • CWE-20: Improper Input Validation •