(Oct 8) Timo Warns discovered that the internal authentication server of hostapd, a user space IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP Authenticator, is vulnerable to a buffer overflow when processing fragmented EAP-TLS messages. As a result, an internal overflow checking routine terminates [More…]
The following bug has been fixed:
[-] PCI compliance scanners are failing because Courier IMAP is not PCI compliant
[-] Parallels Premium Outbound Antispam license could not be applied due to wrong product name
[-] Russian locale has been updated
- Project: Joomla!
- SubProject: All
- Severity: Low
- Versions: 3.0.2 and earlier 3.0.x versions; version 2.5.8 and earlier 2.5.x versions.
- Exploit type: Information disclosure
- Reported Date: 2012-October-31
- Fixed Date: 2013-February-4
- CVE Number: CVE-2013-1453
Description
Method of encoding search terms led to possible information disclosure.
Affected Installs
Joomla! version 3.0.2 and earlier 3.0.x versions; version 2.5.8 and earlier 2.5.x versions.
Solution
Upgrade to version 3.0.3 or 2.5.9.
Reported by Egidio Romano
Contact
The JSST at the Joomla! Security Center.
- Project: Joomla!
- SubProject: All
- Severity: Low
- Versions: 3.0.2 and earlier 3.0.x versions.
- Exploit type: Information disclosure
- Reported Date: 2013-January-13
- Fixed Date: 2013-February-4
- CVE Number: CVE-2013-1454
Description
Coding errors led to information disclosure in some situations.
Affected Installs
Joomla! version 3.0.2 and earlier 3.0.x versions.
Solution
Upgrade to version 3.0.3.
Reported by Stergios Kolios
Contact
The JSST at the Joomla! Security Center.
- Project: Joomla!
- SubProject: All
- Severity: Low
- Versions: 3.0.2 and earlier 3.0.x versions.
- Exploit type: Information disclosure
- Reported Date: 2013-January-16
- Fixed Date: 2013-February-4
- CVE Number: CVE-2013-1455
Description
Undefined variable caused information disclosure in some situations.
Affected Installs
Joomla! version 3.0.2 and earlier 3.0.x versions.
Solution
Upgrade to version 3.0.3.
Reported by Mark Dexter
Contact
The JSST at the Joomla! Security Center.