Guest

Cisco Unified Intelligent Contact Management Enterprise

Field Notice: FN - 62116- Cisco Enterprise and Hosted Contact Center Products Notice for Microsoft June 2005 Security Updates


Revised June 23, 2005

June 20, 2005


NOTICE:

THIS FIELD NOTICE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTY OF MERCHANTABILITY. YOUR USE OF THE INFORMATION ON THE FIELD NOTICE OR MATERIALS LINKED FROM THE FIELD NOTICE IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS FIELD NOTICE AT ANY TIME.

Products Affected

  • Cisco CTI and CTI OS - 4.x, 5.x and 6.0(0), with the most up to date Service Release

  • Cisco Internet Service Node - 1.0

  • Cisco Voice Portal - 2.1 and 3.0

  • ICM Enterprise - 4.6.2, 5.0(0), and 6.0(0); with the most up to date Service Release

  • ICM Hosted - 4.6.2, 5.0(0), and 6.0(0); with the most up to date Service Release

  • IPCC Enterprise - 4.6.2, 5.0(0), and 6.0(0); with the most up to date Service Release

  • IPCC Hosted - 4.6.2 and 5.0(0), with the most up to date Service Release

Problem Description

On June 14, 2005, Microsoft released the following security updates:

MS05-019 Critical (re-released)

Vulnerabilities in TCP/IP Could Allow Remote Code Execution and Denial of Service (893066)

The following bulletin has undergone a major revision increment. Microsoft updated this bulletin (originally posted on April 12, 2005) to advise customers that a revised version of the security update is available. Cisco recommends installing this revised security update even if you have installed the previous version.

MS05-025 Critical

Cumulative Security Update for Internet Explorer (883939)

Affected Supported Software:

  • Microsoft Windows 2000 Service Pack 3 and Microsoft Windows 2000 Service Pack 4

  • Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2

  • Microsoft Windows 98, Microsoft Windows 98 Second Edition (SE), and Microsoft Windows Millennium Edition (ME)

MS05-026 Critical

Vulnerability in HTML Help Could Allow Remote Code Execution (896358)

Affected Supported Software:

  • Microsoft Windows 2000 Service Pack 3 and Microsoft Windows 2000 Service Pack 4

  • Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2

  • Microsoft Windows 98, Microsoft Windows 98 Second Edition (SE), and Microsoft Windows Millennium Edition (ME) Review the FAQ section of this bulletin for details about these operating systems.

MS05-027 Critical

Vulnerability in SMB Could Allow Remote Code Execution (896422)

Affected Supported Software:

  • Microsoft Windows 2000 Service Pack 3 and Microsoft Windows 2000 Service Pack 4

  • Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2

MS05-028 Important

Vulnerability in Web Client Service May Allow Remote Code Execution (896426)

Affected Supported Software:

  • Microsoft Windows XP Service Pack 1

MS05-029 Important

Vulnerability in Outlook Web Access for Exchange Server 5.5 Could Allow Cross-Site Scripting Attacks (895179)

Unsupported platform (not installed by default)

MS05-030 Important

Cumulative Security Update for Outlook Express (897715)

Affected Supported Software:

  • Microsoft Windows 2000 Service Pack 3 and Microsoft Windows 2000 Service Pack 4

  • Microsoft Windows XP Service Pack 1

  • Microsoft Windows 98, Microsoft Windows 98 Second Edition (SE), and Microsoft Windows Millennium Edition (ME) Review the FAQ section of this bulletin for details about these operating systems.

MS05-031 Important

Vulnerability in Microsoft Windows Interactive Training Could Allow Remote Code Execution (898458)

Unsupported component (not installed by default).

MS05-032 Moderate

Vulnerability in Microsoft Agent Could Allow Spoofing (890046)

Affected Supported Software:

  • Microsoft Windows 2000 Service Pack 3 and Microsoft Windows 2000 Service Pack 4

  • Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2

  • Microsoft Windows 98, Microsoft Windows 98 Second Edition (SE), and Microsoft Windows Millennium Edition (ME) Review the FAQ section of this bulletin for details about these operating systems.

MS05-033 Moderate

Vulnerability in Telnet Client Could Allow Information Disclosure (896428)

Affected Supported Software:

  • Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2

MS05-034 Moderate

Cumulative Security Update for ISA Server 2000 (899753)

Unsupported platform (not installed by default).

For additional information on Microsoft security updates, see http://www.microsoft.com/security

Background

Cisco evaluates Microsoft security notices and updates for potential impact to Cisco Contact Center products.

The qualification process results in one of four categorical ratings being applied to a given update: Impacting, Not Impacting, Deferred, or Not Applicable.

The four ratings are defined in the Cisco Customer Contact Software Policy for use of Third-Party Software and Security Updates document.

For the security updates listed in Problem Description section of this bulletin, Cisco has assigned the updates to the following categories:

Impacting

  • MS05-019: Vulnerabilities in TCP/IP Could Allow Remote Code Execution and Denial of Service

  • MS05-027: Vulnerability in SMB Could Allow Remote Code Execution

  • MS05-028: Vulnerability in Web Client Service May Allow Remote Code Execution

    (Agent Desktops and Client PCs Only)

Deferred

  • MS05-025: Cumulative Security Update for Internet Explorer

    MS05-026: Vulnerability in HTML Help Could Allow Remote Code Execution

  • MS05-030: Cumulative Security Update for Outlook Express

  • MS05-032: Vulnerability in Microsoft Agent Could Allow Spoofing

  • MS05-033: Vulnerability in Telnet Client Could Allow Information Disclosure

Not Applicable

  • MS05-029: Vulnerability in Outlook Web Access for Exchange Server 5.5 Could Allow Cross-Site Scripting Attacks

  • MS05-031: Vulnerability in Microsoft Windows Interactive Training Could Allow Remote Code Execution

  • MS05-034: Cumulative Security Update for ISA Server 2000

Due to the nature of some of the vulnerabilities addressed by a number of critical, important and moderate security updates, only exploitable if a user visited a malicious Web Page or viewed a malicious e-mail message that could potentially allow remote code execution they are deferred and rolled up into the next service release testing of the supported applications.

While an attacker who successfully exploited these vulnerabilities could take complete control of an affected system, Production Contact Center application servers should not be used for chat, e-mail or to browse unknown and potentially dangerous Web Sites.

Proper care should be taken in deciding on which updates to apply to your systems.

For additional information on the security measures to be considered in an ICM environment, refer to the Security Best Practices for Cisco Intelligent Contact Management Software Guide.

For the Security Updates categorized as Impacting, Cisco is continuing to test its products to further determine if there are any potential conflicts. An update to this field notice will be released when those tests are completed.

Customers should follow Microsoft's guidelines regarding when and how they should apply these updates. Refer to the Microsoft website for full details of the potential exposure from the caveat is referenced on the Microsoft Security page.

Problem Symptoms

It is important to point out that Cisco Contact Center Support has not had any cases pertaining to this vulnerability recorded from our customer base as of June 17, 2005.

Workaround/Solution

Cisco has assessed, and where deemed appropriate, validated the Microsoft security patches addressed in this bulletin. Deferred security updates will be folded in to regression testing of the listed products' next service release or major release whichever comes first.

Cisco recommends that Contact Center customers separately assess all security patches released by Microsoft and install those deemed appropriate for their environments.

Cisco will continue to provide a service of separately assessing and where necessary, validating higher severity security patches that may be relevant to the Contact Center Enterprise software products.

Visit the Microsoft website to acquire the fixes. Keep in mind that you should download the appropriate fixes based on the version of the Microsoft operating system deployed in your environment and service pack level.

For More Information

If you require further assistance, or if you have any further questions regarding this field notice, please contact the Cisco Systems Technical Assistance Center (TAC) by one of the following methods:

Receive Email Notification For New Field Notices

Product Alert Tool - Set up a profile to receive email updates about reliability, safety, network security, and end-of-sale issues for the Cisco products you specify.