Products Affected |
---|
CCS - 5.0, with the most up to date service release |
CEM - 5.0, with the most up to date service release |
CVP - 3.0 and 3.1,with the most up to date service release |
Cisco CTI and CTI OS - 6.0(0) and 7.0(0) with the most up to date service release; 7.0(0) SR4 |
Cisco Internet Service Node - 2.0(0) and 2.1(0) |
ICM Enterprise - 6.0(0) and 7.0(0) with the most up to date service release; 7.0(0) SR4 |
ICM Hosted - 6.0(0) and 7.0(0) with the most up to date service release; 7.0(0) SR4 |
IPCC Enterprise - 6.0(0) and 7.0(0) with the most up to date service release; 7.0(0) SR4 |
IPCC Hosted - 6.0(0) and 7.0(0) with the most up to date service release; 7.0(0) SR4 |
On August 08, 2006, Microsoft released the following security updates:
MS06-040 - Critical
Vulnerability in Server Service Could Allow Remote Code Execution (921883)
Affected Supported Software:
-Microsoft Windows 2000 Service Pack 4
-Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2
-Microsoft Windows Server 2003 Service Pack 1
MS06-041 - Critical
Vulnerability in DNS Resolution Could Allow Remote Code Execution (920683)
Affected Supported Software:
-Microsoft Windows 2000 Service Pack 4
-Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2
-Microsoft Windows Server 2003 Service Pack 1
MS06-042 - Critical
Cumulative Security Update for Internet Explorer (918899)
Affected Supported Software:
-Microsoft Windows 2000 Service Pack 4
-Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2
-Microsoft Windows Server 2003 Service Pack 1
MS06-043 - Critical
Vulnerability in Microsoft Windows Could Allow Remote Code Execution (920214)
Affected Supported Software:
-Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2
-Microsoft Windows Server 2003 Service Pack 1
MS06-044 - Critical
Vulnerability in Microsoft Management Console Could Allow Remote Code Execution (917008)
Affected Supported Software:
-Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2
-Microsoft Windows Server 2003 Service Pack 1
MS06-045 - Important
Vulnerabilities in Windows Explorer Could Allow Remote Code Execution (921398)
Affected Supported Software:
-Microsoft Windows 2000 Service Pack 4
-Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2
-Microsoft Windows Server 2003 Service Pack 1
MS06-046 - Critical
Vulnerability in HTML Could Allow Remote Code Execution (922616)
Affected Supported Software:
-Microsoft Windows 2000 Service Pack 4
-Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2
-Microsoft Windows Server 2003 Service Pack 1
MS06-047 - Critical
Vulnerability in Microsoft Visual Basic Could Allow Remote Code Execution (921645)
Affected Supported Software:
-None
MS06-048 - Critical
Vulnerability in Microsoft Office Could Allow Remote Code Execution (922968)
Affected Supported Software: -None
MS06-049 - Important
Vulnerability in Windows Kernel Could Result in Elevation of Privilege (920958)
Affected Supported Software:
-Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2
-Microsoft Windows Server 2003 Service Pack 1
MS06-050 - Important
Vulnerabilities in Microsoft Windows Hyperlink Object Could Allow Remote Code Execution (920670)
Affected Supported Software:
-Microsoft Windows 2000 Service Pack 4
-Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2
-Microsoft Windows Server 2003 Service Pack 1
MS06-051 - Critical
Vulnerability in Windows Kernel Could Result in Remote Code Execution (917422)
Affected Supported Software:
-Microsoft Windows 2000 Service Pack 4
-Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2
-Microsoft Windows Server 2003 Service Pack 1
For additional information on Microsoft security updates, see the Microsoft Security Home Page.
Cisco evaluates Microsoft security notices and updates for potential impact to Cisco Contact Center products.
The qualification process results in one of four categorical ratings being applied to a given update: Impacting, Not Impacting, Deferred, or Not Applicable.
The four ratings are defined in the Cisco Customer Contact Software Policy for use of Third-Party Software and Security Updates document.
For the security updates listed in the Problem Description section of this bulletin, Cisco has assigned the updates to the following categories:
Impacting
MS06-040 - Vulnerability in Server Service Could Allow Remote Code Execution
MS06-041 - Vulnerability in DNS Resolution Could Allow Remote Code Execution
MS06-043 - Vulnerability in Microsoft Windows Could Allow Remote Code Execution
MS06-044 - Vulnerability in Microsoft Management Console Could Allow Remote Code Execution
MS06-045 - Vulnerabilities in Windows Explorer Could Allow Remote Code Execution
MS06-049 - Vulnerability in Windows Kernel Could Result in Elevation of Privilege
MS06-051 - Vulnerability in Windows Kernel Could Result in Remote Code Execution
Deferred
MS06-042 - Cumulative Security Update for Internet Explorer
MS06-046 - Vulnerability in HTML Could Allow Remote Code Execution
MS06-050 - Vulnerabilities in Microsoft Windows Hyperlink Object Could Allow Remote Code Execution
Non-impacting
MS06-047 - Vulnerability in Microsoft Visual Basic Could Allow Remote Code Execution
MS06-048 - Vulnerability in Microsoft Office Could Allow Remote Code Execution
Not Applicable
None
Due to the nature of some of the vulnerabilities addressed by a number of critical, important and moderate security updates only exploitable if a user visited a malicious Web (or FTP) site or viewed a malicious e-mail message that could potentially allow remote code execution, the updates MS06-042, MS06-046 and MS06-050 are deferred and will be rolled up into the next service release testing of the supported applications. While an attacker who successfully exploited these vulnerabilities could take complete control of an affected system or cause a denial of service attack, Production Contact Center application servers should not be used for chat, e-mail or to browse unknown and potentially dangerous Web (or FTP) sites.
Proper care should be taken in deciding on which updates to apply to your systems. For additional information on the security measures to be considered in an ICM environment, refer to the Security Best Practices for Cisco Intelligent Contact Management Software Guide.
Product |
Version(s) |
Tested (Y/I*) |
Components Tested |
---|---|---|---|
ICM/IPCC |
7.0(0) SR4 |
Y |
All ICM/IPCC components tested on Windows Server 2003 SP1 |
CTIOS |
7.0(0) SR4 |
Y |
CTIOS components testedon Windows Server 2003 SP1; Agent Desktop on Windows XP SP2 |
CVP |
3.1 SR2 |
Y |
CVP components tested on Windows Server 2003 SP4 with Rollup 1 |
CEM, CCS |
CEM 5.0 SR5, CCS 5.0 SR3, CMB 5.0 SR1, DCA 2.0(1) SR2 |
Y |
CEM and CCS components tested on Windows Server 2000 SP4 with Rollup 1 |
Testing Disposition
I - In Progress (indicating that testing is in progress and will be updated when complete)
Y - Yes (tested)
NA - Not Applicable (none of the security updates are being tested because of a Not Applicable or Deferred assessment)
Customers should follow Microsoft's guidelines regarding when and how they should apply these updates. Refer to the Microsoft website for full details of the potential exposure from the caveat is referenced on the Microsoft Security Home Page.
It is important to point out that Cisco Contact Center Support has not had any cases pertaining to this vulnerability recorded from our customer base as of August 10, 2006
Cisco recommends that Contact Center customers separately assess all security patches released by Microsoft and install those deemed appropriate for their environments.
Cisco will continue to provide a service of separately assessing and where necessary, validating higher severity security patches that may be relevant to the Contact Center Enterprise software products.
Visit the Microsoft website to acquire the fixes. Keep in mind that you should download the appropriate fixes based on the version of the Microsoft operating system and service pack level deployed in your environment.
Revision |
Date |
Comment |
---|---|---|
1.0 |
22-AUG-2006 |
Initial Public Release |
If you require further assistance, or if you have any further questions regarding this field notice, please contact the Cisco Systems Technical Assistance Center (TAC) by one of the following methods:
Product Alert Tool - Set up a profile to receive email updates about reliability, safety, network security, and end-of-sale issues for the Cisco products you specify.