Since about 1 PM today, AirBears and AirBearsBeyond WLANs within EECS and the outdoor Mesh are currently unable to deliver DHCP leases to clients. CNS has been notified and is currently working on the problem.
News
New Apple security update
Apple has released Security Update 2006-001.
http://docs.info.apple.com/article.html?artnum=303382 has the complete bulletin.
Apple’s Security Updates’ MUST be applied within 5 business days of notification.
Should there be active exploits, the time will be adjusted and users will be informed appropriately.
HERMES, PRINT, RIS, WINSWW and macserver.eecs offline for patching
Microsoft will release their patches for the month on Tuesday, March 14, 2006. HERMES, PRINT, RIS and WINSWW will be down for patching the following Wednesday, March 15, 2006, from 3:00p5:00p.
macserver.eecs.berkeley.edu, which hosts the Mac software warehouse, will be down for maintenance at this time as well.
Power outage this morning caused service outage
Around 8:00 this morning parts of campus, including Soda and Cory halls, lost power for about an hour. This affected all of the computing and infrastructure services in EECS.
IDSG and network staff are working to restore computing and network services to the department. Many have been restored already and the rest should follow shortly.
We appreciate your patience as we continue to recover from the outage. For further details, please see the UC Berkeley newscenter.
Calendar Server Down For Maintenance
The EECS Department’s Oracle Calendar (formerly Corporate Time) server is currently down for emergency maintenance. We expect it to be available again no later than the morning of Friday, February 24.
[Read more…] about Calendar Server Down For Maintenance
MAC Server Down
Macserver is down, we apologize for the inconvenience. IDSG and Apple are working to bring it back, hopefully some time tomorrow. If you require software on macserver please send IDSG an email. Thank you for your patience.
[Read more…] about MAC Server Down
Microsoft Security Bulletin for February 2006
Microsoft Security Bulletin Summary for February 14, 2006
Issued: February 14, 2006
Version Number: 1.0
Security patches defined by Microsoft as “critical” or “important”
MUST be applied within 10 business days of notification. Should there
be active exploits, the time will be adjusted and users will be
informed appropriately. Hosts unpatched after the defined time are
subject to scanning and removal from the EECS network as per campus IT security policies.
Patching is sometimes dependent on the service pack level of the
Microsoft OS, and installed applications, please read requirements
carefully.
Critical Security Bulletins
MS06-004—Cumulative Security Update for Internet Explorer (910620)
Impact: Remote Code Execution
Affected Software:
- Windows 2000 Service Pack 4
MS06-005—Vulnerability in Windows Media Player Could Allow Remote Code Execution (911565)
Impact: Remote Code Execution
Affected Software:
- Windows 2000 Service Pack 4
- Windows XP Service Pack 1
- Windows XP Service Pack 2
- Windows Server 2003
Important Security Bulletins
MS06-006—Vulnerability in Windows Media Player Plug-in with Non-Microsoft Internet Browsers Could Allow Remote Code Execution
(911564)
Impact: Remote Code Execution
Affected Software:
- Windows 2000 Service Pack 4
- Windows XP Service Pack 1
- Windows XP Service Pack 2
- Windows XP Professional x64 Edition
- Windows Server 2003
- Windows Server 2003 Service Pack 1
- Windows Server 2003 x64 Edition
MS06-007—Vulnerability in TCP/IP Could Allow Denial of Service
(913446)
Impact: Remote Denial of Service
Affected Software:
- Windows XP Service Pack 1
- Windows XP Service Pack 2
- Windows XP Professional x64 Edition
- Windows Server 2003
- Windows Server 2003 Service Pack 1
- Windows Server 2003 for Itanium-based Systems
- Windows Server 2003 with SP1 for Itanium-based Systems
- Windows Server 2003 x64 Edition
MS06-008—Vulnerability in Web Client Service Could Allow Remote
Code Execution (911927)
Impact: Remote Code Execution
Affected Software:
- Windows XP Service Pack 1
- Windows XP Service Pack 2
- Windows XP Professional x64 Edition
- Windows Server 2003
- Windows Server 2003 Service Pack 1
- Windows Server 2003 for Itanium-based Systems
- Windows Server 2003 with SP1 for Itanium-based Systems
- Windows Server 2003 x64 Edition
MS06-009—Vulnerability in the Korean Input Method Editor Could
Allow Elevation of Privilege (901190)
Impact: Elevation of Privilege
Affected Software:
- Windows XP Service Pack 1
- Windows XP Service Pack 2
- Windows XP Professional x64 Edition
- Windows Server 2003
- Windows Server 2003 for Itanium-based Systems
- Windows Server 2003 with SP1 for Itanium-based Systems
- Windows Server 2003 x64 Edition
- Microsoft Office 2003 Service Pack 1
- Microsoft Office 2003 Service Pack 2
- Microsoft Office 2003 Multilingual User Interface Packs
- Microsoft Office Visio 2003 Multilingual User Interface Packs
- Microsoft Office Project 2003 Multilingual User Interface Packs
- Microsoft Office 2003 Proofing Tools
- Microsoft Office Visio 2003
- Microsoft Office OneNote 2003
- Microsoft Office Project 2000
MS06-010—Vulnerability in PowerPoint 2000 Could Allow Information Disclosure (889167)
Impact: Information Disclosure
Affected Software:
- Microsoft Office PowerPoint 2000
imap.eecs down
The EECS IMAP server, imap.eecs.berkeley.edu, unexpectedly went offline shortly after 10:30pm. IRIS staff are investigating.
[Read more…] about imap.eecs down
Previous blocking of ICMP traffic from off campus to EECS networks has been lifted.
Previous blocking of ICMP traffic from off campus to EECS networks has been lifted.
BWRC Network Downtime
BWRC network will be down on Monday, February 13th and Tuesday, February 14th.
BWRC has been running on the original Bay Networks data switch hardware since the Center opened. We will transfer all data traffic to the new Extreme Networks “Alpine” switch. One to two days disruption will be involved for a significant fraction of the BWRC client machines.
During the initial part of the transfer process (2-4 hours), there will be no network connectivity at BWRC. After the initial period, all core servers and services should be back on line.
During the remainder of the process we will be hooking up the data connections for the regular BWRC clients. This is likely to last into a second day. Please use the EECS wireless network while you are waiting for your deskside machine to be hooked up.
If you have an urgent need for the earliest possible access, please reply indicating which port or cubicle you need access for and what the nature of the urgency is. We’ll review and give these requests priority as is possible.
Please make your plan accordingly.