Guest

Cisco Unified Intelligent Contact Management Enterprise

Field Notice: Cisco Enterprise and Hosted Contact Center Products Notice for Microsoft January 2005 Security Update


January 12, 2005


Products Affected

Products Affected

CTI OS - 4.x, 5.x and 6.0(0) with the most up to date Service Release

Cisco Internet Service Node - Versions 1.0, 2.0 and 2.1

ICM Enterprise - 4.6.2, 5.0(0), and 6.0(0) with the most up to date Service Release

ICM Hosted - 4.6.2 and 5.0(0) with the most up to date Service Release

IPCC Enterprise - 4.6.2, 5.0(0), and 6.0(0) with the most up to date Service Release

IPCC Hosted - 4.6.2 and 5.0(0) with the most up to date Service Release

 

Problem Description

On January 11, 2005, Microsoft released the following security updates:

MS05-001 - Critical

Vulnerability in HTML Help Could Allow Code Execution (890175)

Affected Supported Software:

  • Microsoft Windows 2000 Service Pack 3 and Microsoft Windows 2000 Service Pack 4

  • Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2

  • Microsoft Windows 98, Microsoft Windows 98 Second Edition (SE), and Microsoft Windows Millennium Edition (ME)

Affected Component:

Internet Explorer 6 Service Pack 1 when installed on Microsoft Windows NT Server 4.0 Service Pack 6a

MS05-002 - Critical

Vulnerability in Cursor and Icon Format Handling Could Allow Remote Code Execution (891711)

Affected Supported Software:

  • Microsoft Windows NT Server 4.0 Service Pack 6a

  • Microsoft Windows 2000 Service Pack 3 and Microsoft Windows 2000 Service Pack 4

  • Microsoft Windows XP Service Pack 1

  • Microsoft Windows 98, Microsoft Windows 98 Second Edition (SE), and Microsoft Windows Millennium Edition (ME)

MS05-003 - Important

Vulnerability in Indexing Service Could Allow Remote Code Execution (871250)

Affected Supported Software:

  • Microsoft Windows 2000 Service Pack 3 and Microsoft Windows 2000 Service Pack 4

  • Microsoft Windows XP Service Pack 1

Affected Component:

Indexing Service

For additional information on Microsoft security updates, see the Microsoft Securitypage.

Background

Cisco evaluates Microsoft security notices and updates for potential impact to Cisco Contact Center products.

The qualification process results in one of four categorical ratings being applied to a given update:

Impacting, Not Impacting, Deferred, or Not Applicable.

The four ratings are defined in the Cisco Customer Contact Software Policy for use of Third-Party Software and Security Updates.

For the security updates listed in Problem Description section of this bulletin, Cisco has assigned the updates to the following categories:

Deferred

MS05-001 - Vulnerability in HTML Help Could Allow Code Execution (890175)

MS05-002 - Vulnerability in Cursor and Icon Format Handling Could Allow Remote Code Execution (891711)

Not Impacting

MS05-003 - Vulnerability in Indexing Service Could Allow Remote Code Execution (871250)

The vulnerabilities addressed by MS05-001 and MS05-002 can only be exploited if a user visited a malicious web page or viewed a malicious e-mail message that could potentially allow remote code execution. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. Production Contact Center servers should not be used for e-mail or to browse unknown and potentially dangerous Web Sites.

MS05-003 resolves a remote code execution vulnerability with the Indexing Service which is not enabled by default. The Security Best Practices Guide recommends disabling this service on Contact Center servers.

For additional information on the security measures to be considered in an ICM environment, refer to the Security Best Practices for Cisco Intelligent Contact Management Software.

Customers should follow Microsoft's guidelines regarding when and how they should apply these updates. Refer to the Microsoft website for full details of the potential exposure from the caveat.

Problem Symptoms

It is important to point out that Cisco Contact Center Support has not had any cases pertaining to this vulnerability recorded from our customer base as of January 11, 2005.

Workaround/Solution

Cisco has assessed, and where deemed appropriate, validated the Microsoft security patches addressed in this bulletin.

Deferred security updates will be folded in to regression testing of the listed products' next service release or major release, whichever comes first.

Cisco recommends that Contact Center customers separately assess all security patches released by Microsoft and install those deemed appropriate for their environments.

Cisco will continue to provide a service of separately assessing and, where necessary, validating higher severity security patches that may be relevant to the Contact Center Enterprise software products.

Visit the Microsoft website to acquire the fixes. Keep in mind that you should download the appropriate fixes based on the version of the Microsoft operating system deployed in your environment and service pack level.

For More Information

If you require further assistance, or if you have any further questions regarding this field notice, please contact the Cisco Systems Technical Assistance Center (TAC) by one of the following methods:

Receive Email Notification For New Field Notices

Product Alert Tool - Set up a profile to receive email updates about reliability, safety, network security, and end-of-sale issues for the Cisco products you specify.