|Title||Start Date & Time||End Date & Time|
|Service Maintenance Scheduled: Cisco AnyConnect VPN||Tuesday, March 3, 2015 - 6:00am||Tuesday, March 3, 2015 - 7:00am|
|Service Maintenance Scheduled: Research Laboratory Two (RL2) Network Service||Wednesday, March 4, 2015 - 6:00am||Wednesday, March 4, 2015 - 7:00am|
|Service Maintenance Scheduled: Integrated Teaching and Learning Laboratory (ITLL) Network Service||Wednesday, March 11, 2015 - 6:00am||Wednesday, March 11, 2015 - 7:00am|
Oracle has released an update addressing Oracle Security Alert for CVE-2013-0422 for Java (the same vulnerability notification that was released by the IT Security Office on Friday, January 11, 2013). These vulnerabilities may be remotely exploitable without authentication (i.e., they may be exploited over a network without the need for a username and password). To be successfully exploited, an unsuspecting user running an affected release in a browser will need to visit a malicious web page that leverages these vulnerabilities.
**The update changes the way that Java is used by providing the user with a prompt requesting permission to allow Java to run before any unsigned Java applet or Java Web Start application is run.**
The IT Security Office advises applying the update as soon as possible. Be aware that updating Java has the ability to affect access to legitimate applications.
Oracle Java JDK and JRE 7 Update 10 and earlier
Security bulletin names:
Oracle Security Alert for CVE-2013-0422
Released: January 13, 2013
If you have any questions, please contact the IT Service Center at 303-735-4357 (or 5-HELP from an on-campus phone) email@example.com. Email and phone help is available Mondays through Thursdays, 7:00 a.m. to 10:00 p.m.; Fridays 7:00 a.m. to 7:00 p.m.; and Saturdays and Sundays, noon to 6:00 p.m.
OIT has defined the following categories to describe the severity of security risks:
URGENT severity represents a broad threat to the entire campus community.
SEVERE severity included remote exploits and worms.
IMPORTANT severity includes virus and local exploits for commonly used services.