Coeus will be briefly inaccessible on Saturday, June 24th between 11:00 PM and 12:00 AM (midnight). I am expecting the actual downtime to last only a few minutes. NFS users (typically, unix and Linux) should not need to do anything. CIFS users (typically, Windows and MacOS) will see files closed.
If the above schedule is a problem, please contact IDSG.
News
BWRC Brief network outages on June 20 (Tuesday) from 10:00AM-11:00AM
I will replace a new network hardware at BWRC on Tuesday June 20,2006. There will be brief network outages from 10:00AM to 11:00AM.
This will affect some users who use wired connection. But EECS/Airbears wireless network will still be functioning.
I regret any inconvenience this may cause. Please make your plans accordingly.
Calendar Server Downtime, Tuesday 21st/Wednesday 22nd
On Tuesday, June 20, the calendar service will be going down to run the
database fixer, at approximately 11pm. It should be back online by 5am
Wednesday morning. If this is a severe imposition, please contact me.
Thanks for your continued patience.
Microsoft Security Bulletin Summary for June 2006
******************************************************************** Title: Microsoft Security Bulletin Summary for June 2006 Issued: June 13, 2006 Version Number: 1.0 Bulletin: http://go.microsoft.com/fwlink/?LinkId=68324 ********************************************************************
Summary: ======== This advisory contains information about all security updates released this month. It is broken down by security bulletin severity.
Critical Security Bulletins ===========================
MS06-021 - Cumulative Security Update for Internet Explorer (916281)
- Affected Software: - Windows Server 2003 Service Pack 1 - Windows Server 2003 - Windows Server 2003 with SP1 for Itanium-based Systems - Windows Server 2003 for Itanium-based Systems - Windows Server 2003 x64 Edition - Windows XP Service Pack 2 - Windows XP Service Pack 1 - Windows XP Professional x64 Edition - Windows 2000 Service Pack 4
- Review the FAQ section of bulletin MS06-021 for information about these operating systems: - Windows Millennium Edition (ME) - Windows 98 Second Edition (SE) - Windows 98
- Impact: Remote Code Execution - Version Number: 1.0
MS06-022 - Vulnerability in ART Image Rendering Could Allow Remote Code Execution (918439)
- Affected Software: - Windows Server 2003 Service Pack 1 - Windows Server 2003 - Windows Server 2003 with SP1 for Itanium-based Systems - Windows Server 2003 for Itanium-based Systems - Windows Server 2003 x64 Edition - Windows XP Service Pack 2 - Windows XP Service Pack 1 - Windows XP Professional x64 Edition - Windows 2000 Service Pack 4 with the Windows 2000 AOL Image Support Update
- Review the FAQ section of bulletin MS06-022 for information about these operating systems: - Windows Millennium Edition (ME) - Windows 98 Second Edition (SE) - Windows 98
- Impact: Remote Code Execution - Version Number: 1.0
MS06-023 - Vulnerability in Microsoft JScript Could Allow Remote Code Execution (917344)
- Affected Software: - Windows Server 2003 Service Pack 1 - Windows Server 2003 - Windows Server 2003 with SP1 for Itanium-based Systems - Windows Server 2003 for Itanium-based Systems - Windows Server 2003 x64 Edition - Windows XP Service Pack 2 - Windows XP Service Pack 1 - Windows XP Professional x64 Edition - Windows 2000 Service Pack 4
- Review the FAQ section of bulletin MS06-023 for information about these operating systems: - Windows Millennium Edition (ME) - Windows 98 Second Edition (SE) - Windows 98
- Impact: Remote Code Execution - Version Number: 1.0
MS06-024 - Vulnerability in Windows Media Player Could Allow Remote Code Execution (917734)
- Affected Software: - Windows Media Player 10 - Windows Media Player 9 - Windows Media Player for XP - Windows Media Player 7.1
- Impact: Remote Code Execution - Version Number: 1.0
MS06-025 - Vulnerability in Routing and Remote Access Could Allow Remote Code Execution (911280)
- Affected Software: - Windows Server 2003 Service Pack 1 - Windows Server 2003 - Windows Server 2003 with SP1 for Itanium-based Systems - Windows Server 2003 for Itanium-based Systems - Windows Server 2003 x64 Edition - Windows XP Service Pack 2 - Windows XP Service Pack 1 - Windows XP Professional x64 Edition - Windows 2000 Service Pack 4
- Impact: Remote Code Execution - Version Number: 1.0
MS06-026 - Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution (918547)
- Affected Software: - Windows Millennium Edition (ME) - Windows 98 Second Edition (SE) - Windows 98
- Impact: Remote Code Execution - Version Number: 1.0
MS06-027 - Vulnerability in Microsoft Word Could Allow Remote Code Execution (917336)
- Affected Software: - Word 2003 - Word Viewer 2003 - Word 2002 - Word 2000 - Works Suite 2006 - Works Suite 2005 - Works Suite 2004 - Works Suite 2003 - Works Suite 2002 - Works Suite 2001 - Works Suite 2000
- Impact: Remote Code Execution - Version Number: 1.0
MS06-028 - Vulnerability in Microsoft PowerPoint Could Allow Remote Code Execution (916768)
- Affected Software: - PowerPoint 2003 - PowerPoint 2002 - PowerPoint 2000 - PowerPoint 2004 for Mac - PowerPoint v.X for Mac
- Impact: Remote Code Execution - Version Number: 1.0
Important Security Bulletins ============================
MS06-029 - Vulnerability in Microsoft Exchange Server Running Outlook Web Access Could Allow Script Injection (912442)
- Affected Software: - Exchange Server 2003 Service Pack 2 - Exchange Server 2003 Service Pack 1 - Exchange 2000 Server Pack 3 with the August 2004 Exchange 2000 Server Post-Service Pack 3 Update Rollup
- Impact: Remote Code Execution - Version Number: 1.0
MS06-030 - Vulnerability in Server Message Block Could Allow Elevation of Privilege (914389)
- Affected Software: - Windows Server 2003 Service Pack 1 - Windows Server 2003 - Windows Server 2003 with SP1 for Itanium-based Systems - Windows Server 2003 for Itanium-based Systems - Windows Server 2003 x64 Edition - Windows XP Service Pack 2 - Windows XP Service Pack 1 - Windows XP Professional x64 Edition - Windows 2000 Service Pack 4
- Impact: Elevation of Privilege - Version Number: 1.0
MS06-032 - Vulnerability in TCP/IP Could Allow Remote Code Execution (917953)
- Affected Software: - Windows Server 2003 Service Pack 1 - Windows Server 2003 - Windows Server 2003 with SP1 for Itanium-based Systems - Windows Server 2003 for Itanium-based Systems - Windows Server 2003 x64 Edition - Windows XP Service Pack 2 - Windows XP Service Pack 1 - Windows XP Professional x64 Edition - Windows 2000 Service Pack 4
- Impact: Remote Code Execution - Version Number: 1.0
Moderate Security Bulletin ==========================
MS06-031 - Vulnerability in RPC Mutual Authentication Could Allow Spoofing (917736)
- Affected Software: - Windows 2000 Service Pack 4
- Impact: Spoofing - Version Number: 1.0
Wireless AP Controller outage – 3rd Floor Cory
There will be a brief outage of the 315 AP controller on the 3rd floor of Cory. The maintenance window will be from 07:30 to 08:30 Wednesday morning June 21.
This will cut off wireless service on the third floor during that time. We expect a much shorter downtime if things go as planned.
Solaris 8 SWW now frozen
As it was previously announced, Solaris 8 SWW is now frozen. Solaris 8 SWW will be removed from service Wednesday, December 20th, 2006.
IRIS Website maintenance, June 12, 5:30pm
The IRIS Web Site will be briefly unavailable around 5:30pm on Monday, June 12 for routine system maintenance. Total downtime should not exceed ten minutes.
During this time Network and Computer Account registration, query and update forms will be unavailable.
We regret any inconvenience caused by this downtime.
Access to EECS caching DNS servers (cronus and rhea) to be restricted
Beginning Tuesday July 11, 2006, access to the EECS caching DNS (Domain Name Server or Domain Name System) servers cronus and rhea will be restricted to campus IP addresses.
If you have a system off-campus, you will not be able to use cronus and rhea for DNS service. Instead you will need to configure your off-campus system to utilize your ISP’s name servers.
This action (restricting access to the EECS caching DNS servers) is occuring following the campus IS&T’s lead of restricting access to the main campus caching DNS servers, ns1.berkeley.edu (128.32.136.9, 128.32.206.9) and ns2.berkeley.edu (128.32.136.12, 128.32.206.12) beginning July 1, 2006.
It is currently considered a “best practice” to restrict access to caching DNS servers. DNS service on cronus and rhea has been abused from off-campus IP addresses. Because of the security risks associated with allowing anyone to access the caching DNS servers, many groups are restricting access to their caching DNS servers including UCLA, the University of Oregon and the University of Virginia.
IS&T has documented details and reasons behind why it is necessary to restrict access to caching DNS servers:
Current cronus and rhea IP addresses include:
cronus interfaces rhea interfaces cronus-32 128.32.32.21 rhea-32 128.32.32.23 cronus-33 128.32.33.21 rhea-33 128.32.33.23 cronus-34 128.32.34.21 rhea-34 128.32.34.23 cronus-35 128.32.35.21 rhea-35 128.32.35.23 cronus-36 128.32.36.21 rhea-36 128.32.36.23 cronus-37 128.32.37.21 rhea-37 128.32.37.23 cronus-38 128.32.38.21 rhea-38 128.32.38.23 cronus-40 128.32.40.21 rhea-40 128.32.40.23 cronus-41 128.32.41.21 rhea-41 128.32.41.23 cronus-42 128.32.42.21 rhea-42 128.32.42.23 cronus-43 128.32.43.21 rhea-43 128.32.43.23 cronus-47 128.32.47.21 rhea-47 128.32.47.23 cronus-48 128.32.48.21 rhea-48 128.32.48.23 cronus-62 128.32.62.21 rhea-62 128.32.62.23 cronus-63 128.32.63.21 rhea-63 128.32.63.23 cronus-112 128.32.112.21 rhea-112 128.32.112.23 cronus-132 128.32.132.21 rhea-132 128.32.132.23 cronus-134 128.32.134.21 rhea-134 128.32.134.23 cronus-153 128.32.153.21 rhea-153 128.32.153.23 cronus-168 128.32.168.21 rhea-168 28.32.168.23 cronus-171 128.32.171.21 rhea-171 128.32.171.23 cronus-cusg 169.229.3.251 rhea-cusg 169.229.3.252 cronus-169-229-63 169.229.63.21 rhea-169-229-63 169.229.63.23
Caching DNS service will also end from IP address 128.32.33.5 on Tuesday July 11, 2006.
Please update your off-campus systems accordingly.
BWRC Network Switch Downtime
BWRC alpine switch will need to reboot on June 12 Monday morning around 9:30AM in order to fix software problem. The downtime will take less than 10 mins.
Please make your plans accordingly. Thanks.
Latest Version of Matlab for Mac Available on Macsww
The new version of Matlab for Macintosh, R2006a, the license file and instructions for installation are available on //macsww/public/PPC/matlab.
Navigate to //macsww/public/PPC/matlab/R2006A/disk1 and double click InstallForMacOSX to install. The installer will prompt you to select the files corresponding to CD’s 2 and 3, which are disk2 and disk3.
Cut copy and past license.txt when prompted.
Be careful not to install the license server.
To delete a previous installation simply drag /Applications/MATLAB7x to the trash.