Guest

Cisco Unified Intelligent Contact Management Enterprise

Field Notice: Customer Contact Business Unit (CCBU) Qualification Notice for Microsoft November 2003 Security Updates


November 19, 2003


Products Affected

Product

Comments

Intelligent Contact Manager Enterprise Edition

4.6.2 and 5.0, all service releases

IP Contact Center Enterprise Edition

4.6.2 and 5.0, all service releases

Intelligent Contact Manager Hosted Edition

4.6.2 and 5.0, all service releases

IP Contact Manager Hosted Edition

4.6.2 and 5.0, all service releases

Cisco Internet Service Node

Versions 1.0, 2.0 and 2.1

Problem Description

Microsoft announces security updates to Microsoft Windows and other products on the second Tuesday of each month. On November 11, 2003 Microsoft released the following security updates:

  • MS03-048. Cumulative Security Update for Internet Explorer (824145)

  • MS03-049. Buffer Overrun in the Workstation Service Could Allow Code Execution (828749)

  • MS03-050. Vulnerability in Microsoft Word and Microsoft Excel Could Allow Arbitrary Code to Run (831527)

  • MS03-051. Buffer Overrun in Microsoft FrontPage Server Extensions Could Allow Code Execution (813360)

    Microsoft has also re-released Microsoft Security Bulletin

  • MS02-050. Certificate Validation Flaw Could Enable Identity Spoofing (Q329115)

Background

Cisco evaluates Microsoft security updates for potential impact to Cisco Customer Contact Business Unit (CCBU) products. The qualification process results in one of four categorical ratings being applied to a given update, as Impacting, Not Impacting, Deferred, or Not Applicable.

These categories are defined as:

Impacting

CCBU product impact testing is performed within a predefined window of when the security update is released by Microsoft.

  • The update is labeled by the vendor as Critical or Important or is otherwise of special interest to CCBU customers

  • It potentially affects some CCBU component or functionality ,or is basic to the OS and affects all operations for any software.

  • It must apply to the latest CCBU Specified Service Pack or packs

Not Impacting

CCBU products are not impacted by the security update and no further testing is performed.

  • The update is labeled by the vendor as Critical or Important or is otherwise of special interest to CCBU customers

  • It does not affect any CCBU component or functionality or any basic OS functionality

  • It must apply to the latest CCBU Specified Service Pack or packs.

Deferred

Validation is typically deferred to the next Service Release, Maintenance Release, and subsequent Major and Minor Releases.

  • The update is labeled by the vendor as Moderate or Low

  • It affects some CCBU component or functionality , or is basic to the OS and affects all operations for any software.

  • It must apply to the latest CCBU Specified Service Pack or packs

Not Applicable (No testing is performed)

The security update does not apply to any current CCBU product. No further qualification is required.

  • The security update does not apply to the latest CCBU Specified Service Pack or packs, regardless of CCBU Enterprise product applicability or vendor-rated severity.

Customers should follow Microsoft's guidelines regarding when and how they should apply these updates. Refer to the Microsoft website for full details of the potential exposure from the caveats referenced in these Security Bulletins.

Applies to all products listed above:

Impacting

  • MS03-048. Cumulative Security Update for Internet Explorer (824145) applies to both NT4 (SP6a) and to Win2K (SP3 or later)

  • MS03-049. Buffer Overrun in the Workstation Service Could Allow Code Execution (828749) applies only to Win2K (SP3 or later)

Not Impacting

  • MS03-050. Vulnerability in Microsoft Word and Microsoft Excel Could Allow Arbitrary Code to Run (831527)

  • MS03-051. Buffer Overrun in Microsoft FrontPage Server Extensions Could Allow Code Execution (813360)

  • MS02-050. Certificate Validation Flaw Could Enable Identity Spoofing (Q329115)

Problem Symptoms

It is important to point out that Cisco Contact Center Support has not had any cases pertaining to this threat recorded from our customer base as of November 18, 2003.

Refer to the Microsoft website for full details of the potential exposure from the caveats referenced in these Security Bulletins.

Workaround/Solution

Cisco has assessed, and where deemed appropriate, validated the Microsoft security patches addressed in this bulletin. Cisco recommends that Contact Center customers separately assess all security patches released by Microsoft and install those deemed appropriate for their environments. Cisco will continue to provide a service of separately assessing and where necessary, validating higher severity security patches that are relevant to the Call Center Enterprise software products.

Visit the Microsoft website to acquire the fixes. Keep in mind that you should download the appropriate fixes based on the version of the Microsoft operating system deployed in your environment and service pack level. The patches can be accessed via the following Microsoft web site: http://www.microsoft.com/technet/security/default.mspx

DDTS

There are no Cisco defects logged for issues related to the above patches as of November 18, 2003.

For More Information

If you require further assistance, or if you have any further questions regarding this field notice, please contact the Cisco Systems Technical Assistance Center (TAC) by one of the following methods:

Receive Email Notification For New Field Notices

Product Alert Tool - Set up a profile to receive email updates about reliability, safety, network security, and end-of-sale issues for the Cisco products you specify.