|Title||Start Date & Time||End Date & Time|
|Service Issue Updated: Red Hat Satellite (redhat.colorado.edu)||Thursday, November 3, 2016 - 12:40pm|
|Service Maintenance Scheduled: My Leave, Finance Resources (FIN), and Human Capital Management (HCM)||Saturday, December 10, 2016 - 6:00am||Saturday, December 10, 2016 - 6:00pm|
|Service Maintenance Scheduled: ServiceNow (ticketing system)||Thursday, December 15, 2016 - 7:00pm||Thursday, December 15, 2016 - 9:00pm|
|Service Maintenance Scheduled: Electronic Research and Administration (eRA)||Saturday, December 17, 2016 - 8:00am||Saturday, December 17, 2016 - 2:00pm|
A vulnerability in OpenSSL could allow a remote attacker to expose sensitive data, possibly including user authentication credentials and secret keys, through incorrect memory handling. This may allow an attacker to decrypt traffic such as a credit card transaction or perform various other attacks.
If you are running OpenSSL versions 1.0.1 through 1.0.1f, we recommend that you update as soon as possible to OpenSSL version 1.0.1g or later; or, if your platform has provided a patch, that you apply it accordingly.
Red Hat, Inc.
Mandriva S. A.
Slackware Linux Inc.
Check Point Software Technologies
US-Cert Vulnerability Note VU#720951
Vulnerability Summary for CVE-2014-0160
Additional information about this vulnerability can be viewed at:
If you have any questions, please contact the IT Service Center at 303-735-4357 (or 5-HELP from an on-campus phone) or firstname.lastname@example.org.
OIT has defined the following categories to describe the severity of security risks:
URGENT severity represents a broad threat to the entire campus community.
SEVERE severity included remote exploits and worms.
IMPORTANT severity includes virus and local exploits for commonly used services.