Monthly Archives: November 2017

 coe.umsl.edu sites inaccessible

Description

We have had reports of issues with some coe.umsl.edu sites.  We are working on the issue and expect it to be resolved soon.

Update: Issue now appears to be resolved after service restarts.

Posted: 11/30/17 11:41 am
Last updated: 11/30/17 2:43 pm
Event type: Intermittent or Slow Service
Current status: Resolved
Service Applications/Web Apps


 Warning! Mac OSX High Sierra 10.13 Vulnerability

Description

A security flaw has been detected in Mac operating systems, High Sierra 10.13 or greater.  This vulnerability allows anyone to login to a Mac device and change administrative settings by typing in the username “root” with no password more details can be found in the links provided.

 

Systems at Risk

  • Currently, this vulnerability is only detected in users with a Mac operating system that has been upgraded to High Sierra 10.13 or greater.
  • Systems with local console access, such as shared usage computers in teaching or lab environments, where users of shared computers are not privileged with root access.
  • Systems with Apple Remote Desktop (ARD) enabled

Systems Not at Risk

  • Mac operating systems that are prior to 10.13
  • Systems using SSH (Secure Shell)

Recommended Actions

  1. High Sierra 10.13 or greater users: A possible fix is to create a root account, then set a password and leave it enabled.  Instructions can be found here: https://www.macrumors.com/how-to/temporarily-fix-macos-high-sierra-root-bug/
  • If you do not have the latest MacOS, do not upgrade to High Sierra 10.13 or greater until a patch is made available

More Information

https://www.macrumors.com/how-to/temporarily-fix-macos-high-sierra-root-bug/

 

https://www.theverge.com/2017/11/28/16711782/apple-macos-high-sierra-critical-password-security-flaw

 

http://www.pocket-lint.com/news/142980-macos-high-sierra-root-bug-allows-admin-access-without-a-password-who-is-affected-and-is-there-a-fix http://uk.businessinsider.com/macos-high-sierra-can-be-hacked-with-username-root-and-no-password-2017-11

 

Posted: 11/29/17 7:58 am
Last updated: 11/29/17 7:58 am
Event type: Informational
Current status: Active
Service Security Alert


 Network Access Control Server

Start Time: 11/20/17 5:00 am - End Time: 11/20/17 7:00 am

Description

On Monday 11/20/17, ITS will be upgrading Bradford, our network access control server.
Access to Tritonnet and new system registrations could be affected during this time.

 

Upgrade has been completed sucessfully.

Primary Contact: Bob Garrison

Posted: 11/16/17 6:26 am
Last updated: 11/20/17 12:34 pm
Event type: Scheduled Maintenance
Current status: Resolved
Service Network-Wired, Network-Wireless


 UMSL Oracle Database and Printing Maintenance

Start Time: 11/10/17 5:30 pm - End Time: 11/10/17 8:00 pm

Description

All production UMSL Oracle databases will be down while the latest security patches are applied.  Most web applications running on apps.umsl.edu, fusion.umsl.edu and coe.umsl.edu will be unavailable during the maintenance period.

In addition, campus printing and related services (printing package download website, Mobile Print etc.) will be unavailable.

11/10/2017 6:20pm: Database maintenance has been completed

11/10/2017 7:55pm: Printing maintenance has been completed

Primary Contact: Caleb Evans

Posted: 11/9/17 3:24 pm
Last updated: 11/10/17 7:56 pm
Event type: Scheduled Maintenance
Current status: Resolved
Service Applications/Web Apps, Printing


 Network Maintenance – Remote Sites

Start Time: 11/4/17 8:00 pm - End Time: 11/5/17 5:00 am

Description

Starting Saturday evening a fiber contractor will be performing maintenance that could isolate the remote sites from campus.  While we are not expecting any downtime the possibility does exist.  Downtime would affect both data and telephone services from the remote sites.

 

Primary Contact: Don Lewis

Posted: 11/1/17 8:00 am
Last updated: 11/30/17 8:53 am
Event type: Scheduled Maintenance
Current status: Resolved
Service Network-Access