Guest

Cisco Unified Intelligent Contact Management Hosted

Field Notice: FN - 62716 - Cisco Enterprise and Hosted Contact Center Products Notice for Microsoft February 2007 Security Updates


February 20, 2007

NOTICE:

THIS FIELD NOTICE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTY OF MERCHANTABILITY. YOUR USE OF THE INFORMATION ON THE FIELD NOTICE OR MATERIALS LINKED FROM THE FIELD NOTICE IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS FIELD NOTICE AT ANY TIME.


Products Affected

Products Affected

Cisco Collaboration Server (CCS) - 5.0, all SRs

Cisco Computer Telephony Integration (CTI) and Computer Telephony Integration Object Server (CTI OS) - 6.x(x) and 7.x(x), all SRs/MRs

Cisco e-mail Manager (CEM) - 5.0, all SRs

Customer Voice Portal (CVP) - 3.0, 3.1 and 4.0, all SRs

IP Contact Center (IPCC) Enterprise - 6.x(x) and 7.x(x), all SRs/MRs

IP Contact Center (IPCC) Hosted - 7.x(x), all SRs

Intelligent Contact Management (ICM) Enterprise - 6.x(x) and 7.x(x), all SRs/MRs

Intelligent Contact Management (ICM) Hosted - 7.x(x), all SRs

Internet Service Node (ISN) - 2.0(0) and 2.1(0), all SRs

Problem Description

On February 13 2007, Microsoft released the following security updates:

MS07-005 - Important

Vulnerability in Step-by-Step Interactive Training Could Allow Remote Code Execution (923723)

Affected Supported Software:

- None

MS07-006 - Important

Vulnerability in Windows Shell Could Allow Elevation of Privilege (928255)

Affected Supported Software:

- Microsoft Windows XP Service Pack 2

- Microsoft Windows Server 2003 Service Pack 1

MS07-007 - Important

Vulnerability in Windows Image Acquisition Service Could Allow Elevation of Privilege (927802)

Affected Supported Software:

- Microsoft Windows 2000 Service Pack 4

- Microsoft Windows Server 2003 Service Pack 1

MS07-008 - Critical

Vulnerability in HTML Help ActiveX Control Could Allow Remote Code Execution(928843)

Affected Supported Software:

- Microsoft Windows 2000 Service Pack 4

- Microsoft Windows XP Service Pack 2

- Microsoft Windows Server 2003 Service Pack 1

MS07-009 - Critical

Vulnerability in Microsoft Data Access Components Could Allow Remote Code Execution (927779)

Affected Supported Software:

- Microsoft Windows 2000 Service Pack 4

- Microsoft Windows XP Service Pack 2

- Microsoft Windows Server 2003 Service Pack 1

MS07-010 - Critical

Vulnerability in Microsoft Malware Protection Engine Could Allow Remote Code Execution (927779)

Affected Supported Software:

- None

MS07-011 - Important

Vulnerability in Microsoft OLE Dialog Could Allow Remote Code Execution (926436)

Affected Supported Software:

- Microsoft Windows 2000 Service Pack 4

- Microsoft Windows XP Service Pack 2

- Microsoft Windows Server 2003 Service Pack 1

MS07-012 - Important

Vulnerability in Microsoft MFC Could Allow Remote Execution (924667)

Affected Supported Software:

- Microsoft Windows 2000 Service Pack 4

- Microsoft Windows XP Service Pack 2

- Microsoft Windows Server 2003 Service Pack 1

MS07-013 - Important

Vulnerability in Microsoft RichEdit Could Allow Remote Execution (918118)

Affected Supported Software:

- Microsoft Windows 2000 Service Pack 4

- Microsoft Windows XP Service Pack 2

- Microsoft Windows Server 2003 Service Pack 1

MS07-014 - Critical

Vulnerability in Microsoft Word Could Allow Remote Execution (929434)

Affected Supported Software:

- None

MS07-015 - Critical

Vulnerability in Microsoft Office Could Allow Remote Execution (932554)

Affected Supported Software:

- None

MS07-016 - Critical

Cumulative Security Update for Internet Explorer (928090)

Affected Supported Software:

- Microsoft Windows 2000 Service Pack 4

- Microsoft Windows XP Service Pack 2

- Microsoft Windows Server 2003 Service Pack 1

Background

Cisco evaluates Microsoft security notices and updates for potential impact to Cisco Contact Center products.

The qualification process results in one of four categorical ratings being applied to a given update:

Impacting, Not Impacting, Deferred, or Not Applicable.

The four ratings are defined in the Cisco Customer Contact Software Policy for use of Third-Party Software and Security Updates document.

For the security updates listed in the Problem Description section of this bulletin, Cisco has assigned the updates to the following categories:

Impacting

MS07-006 - Vulnerability in Windows Shell Could Allow Elevation of Privilege (928255)

MS06-007 - Vulnerability in Windows Image Acquisition Service Could Allow Elevation of Privilege (927802)

MS06-008 - Vulnerability in HTML Help ActiveX Control Could Allow Remote Code Execution(928843)

MS06-009 - Vulnerability in Microsoft Data Access Components Could Allow Remote Code Execution (927779)

Deferred

MS07-011 - Vulnerability in Microsoft OLE Dialog Could Allow Remote Code Execution (926436)

MS07-012 - Vulnerability in Microsoft MFC Could Allow Remote Code Execution (924667)

MS07-013 - Vulnerability in Microsoft RichEdit Could Allow Remote Code Execution (918118)

MS07-016 - Cumulative Security Update For Internet Explorer (928090)

Non-impacting

MS07-005 - Vulnerability in Step-by-Step Interactive Training Could Allow Remote Code Execution (923723)

MS07-010 - Vulnerability in Microsoft Malware Protection Engine Could Allow Remote Code Execution (932135)

MS07-014 - Vulnerabilities in Microsoft Word Could Allow Remote Code Execution (929434)

MS07-015 - Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (932554)

Not Applicable

None

Due to the nature of some of the vulnerabilities addressed by a number of critical, important and moderate security updates - only exploitable if a user visited a malicious Web (or FTP) site or viewed a malicious e-mail message that could potentially allow remote code execution - they are deferred and rolled up into the next service release testing of the supported applications.

While an attacker who successfully exploited these vulnerabilities could take complete control of an affected system or cause a denial of service attack, Production Contact Center application servers should not be used for chat, e-mail or to browse unknown and potentially dangerous meb (or FTP) sites.

Proper care should be taken in deciding on which updates to apply to your systems. For additional information on the security measures to be considered in an ICM environment, refer to the Security Best Practices for Cisco Intelligent Contact Management Software Guide at the Cisco Unified Intelligent Contact Management Enterprise Technical References page.

Refer to the following table for specific information on testing of Cisco products for potential conflicts with the security updates categorized as Impacting.

Product

Version(s)

Tested (Y/I*)

Components Tested

ICM/IPCC

7.0(0) SR4, 7.1(3)

Y

All ICM/IPCC components tested on Windows Server 2003 SP1

CTI OS

7.0(0) SR4, 7.1(3)

Y

CTI OS components tested on Windows Server 2003 SP1; Agent Desktop on Windows XP SP2

CVP

3.1 SR2

Y

CVP components tested on Windows Server 2000 SP4 with Rollup 1

CVP

4.0

I

Pending testing on Windows 2003 SP1

CEM & CCS

CEM 5.0 SR5, CCS 5.0 SR3, CMB 5.0 SR1, DCA 2.0(1) SR2

Y

CEM and CCS components tested on Windows Server 2000 SP4 with Rollup 1.

* Testing Disposition

I - In Progress (indicating that testing is in progress and will be updated when complete)

Y - Yes (tested)

NA - Not Applicable (none of the security updates are being tested because of a Not Applicable or Deferred assessment)

Problem Symptoms

It is important to point out that Cisco Contact Center Support has not had any cases pertaining to this vulnerability recorded from our customer base as of February 13, 2007.

Workaround/Solution

Cisco has assessed, and where deemed appropriate, validated the Microsoft security patches addressed in this bulletin along with any workarounds for the problems found. Deferred security updates will be folded in to regression testing of the listed products' next service release/maintenance release or major/minor release, whichever comes first.

Cisco recommends that Contact Center customers separately assess all security patches released by Microsoft and install those deemed appropriate for their environments.

Cisco will continue to provide a service of separately assessing and where necessary, validating higher severity security patches that may be relevant to the ICM/IPCC and ICM/IPCC Hosted software products.

Visit the Microsoft website to acquire the fixes. Keep in mind that you should download the appropriate fixes based on the version of the Microsoft operating system deployed in your environment and service pack level.

Revision History

Revision

Date

Comment

1.0

20-FEB-2007

Initial Public Release

For More Information

If you require further assistance, or if you have any further questions regarding this field notice, please contact the Cisco Systems Technical Assistance Center (TAC) by one of the following methods:

Receive Email Notification For New Field Notices

Product Alert Tool - Set up a profile to receive email updates about reliability, safety, network security, and end-of-sale issues for the Cisco products you specify.