VMWare VirtualCenter client 2.x before 2.0.1 Patch 1 (Build 33643) and 1.4.x before 1.4.1 Patch 1 (Build 33425), when server certificate verification is enabled, does not verify the serverβs X.509 certificate when creating an SSL session, which allows remote malicious servers to spoof valid servers via a man-in-the-middle attack.
kb.vmware.com/kb/4646606
secunia.com/advisories/23053
securitytracker.com/id?1017270
www.securityfocus.com/archive/1/452275/100/0/threaded
www.securityfocus.com/bid/21231
www.vmware.com/download/vi/vc-201-200611-patch.html
www.vupen.com/english/advisories/2006/4655
exchange.xforce.ibmcloud.com/vulnerabilities/30477