Guest

Cisco Unified Intelligent Contact Management Enterprise

Field Notice: Cisco Enterprise and Hosted Contact Center Products Notice for Microsoft December 2004 Second Security Update


December 20, 2004

December 15, 2004


Products Affected

  • CTI OS - 4.x, 5.x and 6.0(0), with the most up to date Service Release

  • Cisco Internet Service Node - Versions 1.0, 2.0 and 2.1

  • ICM Enterprise - 4.6.2, 5.0(0), and 6.0(0), with the most up to date Service Release

  • ICM Hosted - 4.6.2 and 5.0(0), with the most up to date Service Release

  • IPCC Enterprise - 4.6.2, 5.0(0), and 6.0(0), with the most up to date Service Release

  • IPCC Hosted - 4.6.2 and 5.0(0), with the most up to date Service Release

Problem Description

On December 14, 2004 Microsoft released the following security updates:

MS04-041 - Important

Vulnerability in WordPad Could Allow Code Execution (885836)

Affected Supported Software:

  • Microsoft Windows NT Server 4.0 Service Pack 6a

  • Microsoft Windows 2000 Service Pack 3 and Microsoft Windows 2000 Service Pack 4

  • Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2

  • Microsoft Windows 98, Microsoft Windows 98 Second Edition (SE), and Microsoft Windows Millennium Edition (ME)

MS04-042 - Important

Vulnerability in DHCP Could Allow Remote Code Execution and Denial of Service (885249)

Affected Supported Software:

  • Microsoft Windows NT Server 4.0 Service Pack 6a

MS04-043 - Important

Vulnerability in HyperTerminal Could Allow Code Execution (873339)

Affected Supported Software:

  • Microsoft Windows NT Server 4.0 Service Pack 6a

  • Microsoft Windows 2000 Service Pack 3 and Microsoft Windows 2000 Service Pack 4

  • Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2

MS04-044 - Important

Vulnerabilities in Windows Kernel and LSASS Could Allow Elevation of Privilege (885835)

Affected Supported Software:

  • Microsoft Windows NT Server 4.0 Service Pack 6a

  • Microsoft Windows 2000 Service Pack 3 and Microsoft Windows 2000 Service Pack 4

  • Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2

MS04-045 - Important

Vulnerability in WINS Could Allow Remote Code Execution (870763).

Affected Supported Software:

  • Microsoft Windows NT Server 4.0 Service Pack 6a

  • Microsoft Windows 2000 Service Pack 3 and Microsoft Windows 2000 Service Pack 4

For additional information on Microsoft security updates, see http://www.microsoft.com/security.

Background

Cisco evaluates Microsoft security notices and updates for potential impact to Cisco Contact Center products. The qualification process results in one of four categorical ratings being applied to a given update:

Impacting, Not Impacting, Deferred or Not Applicable.

The four ratings are defined in the Cisco Customer Contact Software Policy for use of Third-Party Software and Security Updates document.

For the security updates listed in the Problem Description section of this notice, Cisco has assigned the updates to the following categories:

Impacting

MS04-044 - Vulnerabilities in Windows Kernel and LSASS Could Allow Elevation of Privilege (885835)

Not Impacting

MS04-042 - Vulnerability in DHCP Could Allow Remote Code Execution and Denial of Service (885249)

MS04-045 - Vulnerability in WINS Could Allow Remote Code Execution (870763)

Deferred

MS04-041 - Vulnerability in WordPad Could Allow Code Execution (885836)

MS04-043 - Vulnerability in HyperTerminal Could Allow Code Execution (873339)

Customers should follow Microsoft's guidelines regarding when and how they should apply these updates. Refer to the Microsoft website for full details of the potential exposure from the caveat is referenced on the Microsoft Security page.

Problem Symptoms

It is important to point out that Cisco Contact Center Support has not had any cases pertaining to the identified vulnerabilities recorded from our customer base as of December 20, 2004.

Workaround/Solution

Cisco has assessed, and where deemed appropriate, validated the Microsoft security patches addressed in this bulletin according to the category assignment and corresponding testing requirement per the Cisco Customer Contact Software Policy for use of Third-Party Software and Security Updates.

Cisco recommends that Contact Center customers separately assess all security patches released by Microsoft and install those deemed appropriate for their environments.

Cisco will continue to provide a service of separately assessing and where necessary, validating higher severity security patches that may be relevant to the Contact Center software products.

Visit the Microsoft website to download the necessary updates. Keep in mind that you should download the appropriate fixes based on the version of the Microsoft operating system deployed in your environment and service pack level.

For More Information

If you require further assistance, or if you have any further questions regarding this field notice, please contact the Cisco Systems Technical Assistance Center (TAC) by one of the following methods:

Receive Email Notification For New Field Notices

Product Alert Tool - Set up a profile to receive email updates about reliability, safety, network security, and end-of-sale issues for the Cisco products you specify.