|Title||Start Date & Time||End Date & Time|
|Service Issue Updated: Microsoft Exchange||Thursday, June 30, 2016 - 10:12am|
|Service Restored: Google Calendar||Thursday, June 30, 2016 - 8:55am||Thursday, June 30, 2016 - 12:56pm|
|Service Maintenance Scheduled: VoiceThread||Saturday, July 2, 2016 - 10:00pm||Sunday, July 3, 2016 - 6:00am|
Ruby on Rails is reporting vulnerabilities in the Ruby on Rails Action Pack framework that if exploited can allow authentication bypass, SQL injection, arbitrary code execution, or denial of service.
**The IT Security Office will be performing non-invasive network based security scans of internet facing systems to identify systems at risk of compromise.**
The IT Security Office strongly advises updating or applying workarounds.
Fixed Versions: 3.2.11, 3.1.10, 3.0.19, 2.3.15
Security bulletin names:
Vulnerability Note VU#380039
Ruby on Rails Action Pack framework insecurely typecasts YAML and Symbol XML parameters
Released: January 8, 2013
Additional information about this vulnerability can be viewed at:
If you have any questions, please contact the IT Service Center at 303-735-4357 (or 5-HELP from an on-campus phone) or email@example.com. Email and phone help is available Mondays through Thursdays, 7:00 a.m. to 10:00 p.m.; Fridays 7:00 a.m. to 7:00 p.m.; and Saturdays and Sundays, noon to 6:00 p.m.
OIT has defined the following categories to describe the severity of security risks:
URGENT severity represents a broad threat to the entire campus community.
SEVERE severity included remote exploits and worms.
IMPORTANT severity includes virus and local exploits for commonly used services.