Guest

Cisco Unified Intelligent Contact Management Enterprise

Field Notice: *Expired* FN - 28635 - Customer Contact Business Unit (CCBU) Initial Notice For Microsoft January 2004 Security Updates


Revised April 17, 2008

January 26, 2004


NOTICE:

THIS FIELD NOTICE HAS BEEN EXPIRED AND IS NO LONGER MAINTAINED OR UPDATED BY CISCO.

THIS FIELD NOTICE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE, WARRANTY OR SUPPORT. USE OF THE INFORMATION ON THIS FIELD NOTICE OR MATERIALS LINKED FROM THIS FIELD NOTICE IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS FIELD NOTICE AT ANY TIME.

Products Affected

Product

Comments

Intelligent Contact Manager Enterprise Edition

4.6.2 and 5.0, all service releases

IP Contact Center Enterprise Edition

4.6.2 and 5.0, all service releases

Intelligent Contact Manager Hosted Edition

4.6.2 and 5.0, all service releases

IP Contact Center Hosted Edition

4.6.2 and 5.0, all service releases

  

Problem Description

On January 13, 2004, Microsoft released the following security updates:

MS04-001 Critical

Vulnerability in Microsoft Internet Security and Acceleration Server 2000 H.323 Filter can allow remote code execution (816458)

Applies only to Microsoft Internet Security and Acceleration Server 2000, Microsoft Small Business Server 2000 (which includes Microsoft Internet Security and Acceleration Server 2000), and Microsoft Small Business Server 2003 (which includes Microsoft Internet Security and Acceleration Server 2000).

MS04-002 Moderate

Vulnerability in Exchange Server 2003 could lead to privilege escalation (832759)

Affected Software:

Microsoft Exchange Server 2003

Non Affected Software:

Microsoft Exchange 2000 Server

Microsoft Exchange Server 5.5

MS04-003 Important

Buffer Overrun in the Microsoft Data Access Components (MDAC) function could allow code execution (832483)

Applies only to Microsoft Data Access Components 2.5 (included with Microsoft Windows 2000) and Microsoft Data Access Components 2.6 (included with Microsoft SQL Server 2000).

Microsoft has also re-released Microsoft Security Bulletin:

MS03-045 (Re-issued)

Buffer Overrun in the ListBox and in the ComboBox Control could allow code execution (824141).

Applies only to Windows NT 4/SP6a Hebrew and Arabic versions.

For additional information see the Microsoft security updates page.

Background

Cisco evaluates Microsoft security updates for potential impact to Customer Contact Business Unit (CCBU) products. The qualification process results in one of four categorical ratings being applied to a given update: Impacting, Not Impacting, Deferred, or Not Applicable.

The four ratings are defined as follows:

  1. Impacting (CCBU product impact testing is performed within a predefined window of when the security update is released by Microsoft)

    • The update is labeled by the vendor as Critical or Important or is otherwise of special interest to CCBU customers

    • It potentially affects some CCBU component or functionality (or is basic to the OS and affects all operations for any software)

    • It must apply to the latest CCBU Specified Service Pack(s)

  2. Not Impacting (CCBU products are not impacted by the security update and no further testing is performed)

    • The update is labeled by the vendor as Critical or Important or is otherwise of special interest to CCBU customers

    • It does not affect any CCBU component or functionality or any basic OS functionality

    • It must apply to the latest CCBU Specified Service Pack(s)

  3. Deferred (Validation is typically deferred to the next Service Release, Maintenance Release, and subsequent Major/Minor Releases)

    • The update is labeled by the vendor as Moderate or Low

    • It affects some CCBU component or functionality (or is basic to the OS and affects all operations for any software)

    • It must apply to the latest CCBU Specified Service Pack(s)

  4. Not Applicable (The security update does not apply to any current CCBU product. No further qualification is required)

    • The security update does not apply to the latest CCBU Specified Service Pack(s), regardless of CCBU Enterprise product applicability or vendor-rated severity.

For the security updates listed in Product Description section of this bulletin, Cisco has assigned the updates to the following categories:

Impacting

MS04-003. Buffer Overrun in MDAC Function could allow code execution (832483)

Not Applicable

MS04-001. Vulnerability in Microsoft Internet Security and Acceleration Server 2000 H.323 Filter can allow remote code execution (816458)

Recommended Action: Customers who deploy Cisco Internet Service Node should address the H.323 vulnerability by following Cisco's recommendations on the Cisco Security Advisory page.

MS04-002. Vulnerability in Exchange Server 2003 could lead to privilege escalation (832759)

MS03-045. Buffer Overrun in the ListBox and in the ComboBox Control could allow code execution (824141)

Customers should follow Microsoft's guidelines regarding when and how they should apply these updates. Refer to the Microsoft security updates page for full details of the potential exposure.

Problem Symptoms

It is important to point out that Cisco Contact Center Support has not had any cases pertaining to this threat recorded from our customer base as of January 14, 2004.

Workaround/Solution

Cisco has assessed, and where deemed appropriate, validated the Microsoft security patches addressed in this bulletin. Cisco recommends that Contact Center customers separately assess all security patches released by Microsoft and install those deemed appropriate for their environments. Cisco will continue to provide a service of separately assessing and where necessary, validating higher severity security patches that are relevant to the Call Center Enterprise software products.

Visit the Microsoft website to acquire the fixes. Keep in mind that you should download the appropriate fixes based on the version of the Microsoft operating system deployed in your environment and service pack level.

DDTS

There are no Cisco defects logged for issues related to the above patches as of January 14, 2004.

For More Information

If you require further assistance, or if you have any further questions regarding this field notice, please contact the Cisco Systems Technical Assistance Center (TAC) by one of the following methods:

Receive Email Notification For New Field Notices

Product Alert Tool - Set up a profile to receive email updates about reliability, safety, network security, and end-of-sale issues for the Cisco products you specify.