Guest

Cisco Agent Desktop

Field Notice: FN - 62428 - Cisco Enterprise and Hosted Contact Center Products Notice for Microsoft May 2006 Security Updates


May 23, 2006

NOTICE:

THIS FIELD NOTICE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTY OF MERCHANTABILITY. YOUR USE OF THE INFORMATION ON THE FIELD NOTICE OR MATERIALS LINKED FROM THE FIELD NOTICE IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS FIELD NOTICE AT ANY TIME.


Products Affected

Products Affected

ICM CTI/CAD Agent Desktop - 6.0(0) and 7.0(0) with the most up-to-date Service Release

Problem Description

On May 09, 2006, Microsoft released the following security updates:

MS06-020 - Critical

Vulnerabilities in Macromedia Flash Player from Adobe Could Allow Remote Code Execution (913433)

Affected Supported Software:

- Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2

MS06-019 - Critical

Vulnerability in Microsoft Exchange Could Allow Remote Code Execution (916803)

Affected Supported Software:

- None

MS06-018 - Moderate

Vulnerability in Microsoft Distributed Transaction Coordinator Could Allow Denial of Service (913580)

Affected Supported Software:

- None

For additional information on Microsoft security updates, see the Microsoft Security page.

Product

Version(s)

Tested (Y/I*)

Components Tested (All or Specific)

CTI Agent Desktop

7.0(0) SR2

Y

Agent Desktop on Windows XP SP1 and SP2

* Testing Disposition

I - In Progress (indicating that testing is in progress and will be updated when complete)

Y - Yes (tested)

NA - Not Applicable (none of the security updates are being tested because of a 'Not Applicable' or 'Deferred' assessment)

Customers should follow Microsoft's guidelines regarding when and how they should apply these updates. Refer to the Microsoft website for full details of the potential exposure from the caveat referenced on the Microsoft Security page.

Background

Cisco evaluates Microsoft security notices and updates for potential impact to Cisco Contact Center products.

The qualification process results in one of four categorical ratings being applied to a given update:

Impacting, Not Impacting, Deferred, or Not Applicable.

The four ratings are defined in the Cisco Customer Contact Software Policy for use of Third-Party Software and Security Updates document.

For the security updates listed in the Problem Description section of this bulletin, Cisco has assigned the updates to the following categories:

Impacting

MS06-020 - Vulnerabilities in Macromedia Flash Player from Adobe Could Allow Remote Code Execution

Deferred

None

Non-impacting

MS06-019 - Vulnerability in Microsoft Exchange Could Allow Remote Code Execution (916803)

MS06-018 - Vulnerability in Microsoft Distributed Transaction Coordinator Could Allow Denial of Service

Note: MS06-018 has been marked Non-Impacting even though it is a denial of service vulnerability because the Security Best Practices Guides for ICM and IPCC Enterprise and Hosted Editions for versions 7.0 and 6.0 both recommend disabling the MSDTC service. This service is not used by the ICM-IPCC product suite. Also this vulnerability, when exploited, causes only the MSDTC service to stop responding and does not adversely affect the operating system in other ways. Hence this is marked Non-Impacting.

Not Applicable

None.

Proper care should be taken in deciding on which updates to apply to your systems.

For additional information on the security measures to be considered in an ICM environment, refer to the Security Best Practices for Cisco Intelligent Contact Management Software Guide.

Problem Symptoms

It is important to point out that Cisco Contact Center Support has not had any cases pertaining to this vulnerability recorded from our customer base as of May 16, 2006.

Workaround/Solution

Cisco recommends that Contact Center customers separately assess all security patches released by Microsoft and install those deemed appropriate for their environments.

Cisco will continue to provide a service of separately assessing and where necessary, validating higher severity security patches that may be relevant to the Contact Center Enterprise software products.

Visit the Microsoft website to acquire the fixes. Keep in mind that you should download the appropriate fixes based on the version of the Microsoft operating system deployed in your environment and service pack level.

Revision History

Revision

Date

Comment

1.0

23-MAY-2006

Initial Public Release

For More Information

If you require further assistance, or if you have any further questions regarding this field notice, please contact the Cisco Systems Technical Assistance Center (TAC) by one of the following methods:

Receive Email Notification For New Field Notices

Product Alert Tool - Set up a profile to receive email updates about reliability, safety, network security, and end-of-sale issues for the Cisco products you specify.