Guest

Cisco Unified Intelligent Contact Management Hosted

Field Notice: FN - 63117 - Cisco Enterprise and Hosted Contact Center Products Notice for Microsoft April 2008 Security Updates

Cisco - Field Notice: FN - 63117 - Cisco Enterprise and Hosted Contact Center Products Notice for Microsoft April 2008 Security Updates

April 18, 2008


NOTICE:

THIS FIELD NOTICE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTY OF MERCHANTABILITY. YOUR USE OF THE INFORMATION ON THE FIELD NOTICE OR MATERIALS LINKED FROM THE FIELD NOTICE IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS FIELD NOTICE AT ANY TIME.

Revision History

Revision Date Comment
1.0
18-APR-2008
Initial Public Release

Products Affected

Products Affected
Cisco Agent Desktops - 6.x(x) and 7.x(x), all SRs.
Cisco CTI and CTI OS - 6.0 and 7.x(x), all SRs/MRs
Cisco Collaboration Server - 5.0, all SRs
Cisco Customer Voice Portal - 3.0, 3.1 and 4.x, all SRs
Cisco Internet Service Node - 2.0(0) and 2.1(0), all SRs
Cisco e-Mail Manager - 5.0, all SRs.
ICM Enterprise - 6.0 and 7.x(x), all SRs/MRs
ICM Hosted - 7.x(x)
IPCC Enterprise - 6.0 and 7.x(x), all SRs/MRs
IPCC Hosted - 7.x(x)

Problem Description

On April 8, 2008, Microsoft released the following security updates:

MS08-018 - Critical

Vulnerabilities in Microsoft Project Could Allow Remote Code Execution (950183)

Affected Supported Software:

None

MS08-021 - Critical

Vulnerabilities in GDI Could Allow Remote Code Execution (948590)

    Affected Supported Software:

    • Microsoft Windows 2000 Service Pack 4
    • Microsoft Windows Server 2003 Service Pack 1
    • Microsoft Windows Server 2003 Service Pack 2
    • Microsoft Windows XP Service Pack 2

MS08-022 - Critical

Vulnerability in VBScript and JScript Scripting Engines Could Allow Remote Code Execution (944338)

    Affected Supported Software:

    • Microsoft Windows 2000 Service Pack 4
    • Microsoft Windows Server 2003 Service Pack 1
    • Microsoft Windows Server 2003 Service Pack 2
    • Microsoft Windows XP Service Pack 2

MS08-023 - Critical

Security Update of ActiveX Kill Bits (948881)

    Affected Supported Software:

    • Microsoft Windows 2000 Service Pack 4
    • Microsoft Windows Server 2003 Service Pack 1
    • Microsoft Windows Server 2003 Service Pack 2
    • Microsoft Windows XP Service Pack 2

MS08-024 - Critical

Cumulative Security Update for Internet Explorer (947864)

    Affected Supported Software:

    • Microsoft Windows 2000 Service Pack 4
    • Microsoft Windows Server 2003 Service Pack 1
    • Microsoft Windows Server 2003 Service Pack 2
    • Microsoft Windows XP Service Pack 2

MS08-020 - Important

Vulnerability in DNS Client Could Allow Spoofing (945553)

    Affected Supported Software:

    • Microsoft Windows 2000 Service Pack 4
    • Microsoft Windows Server 2003 Service Pack 1
    • Microsoft Windows Server 2003 Service Pack 2
    • Microsoft Windows XP Service Pack 2

MS08-025 - Important

Vulnerability in Windows Kernel Could Allow Elevation of Privilege (941693)

    Affected Supported Software:

    • Microsoft Windows 2000 Service Pack 4
    • Microsoft Windows Server 2003 Service Pack 1
    • Microsoft Windows Server 2003 Service Pack 2
    • Microsoft Windows XP Service Pack 2

MS08-019 - Important

Vulnerabilities in Microsoft Visio Could Allow Remote Code Execution (949032)

Affected Supported Software:

None

Background

Cisco evaluates Microsoft security notices and updates for potential impact to Cisco Contact Center products.

The qualification process results in one of three categorical ratings being applied to a given update: Impacting, Deferred, or Not Applicable.

The three ratings are defined in the Cisco Customer Contact Software Policy for using Microsoft Security Updates on Products Deployed on a Retail Installation of Windows Operating System Bulletin.

The cumulative set of security patches available from Microsoft - including those marked here as Deferred - are applied to Microsoft Windows Server 2003 (current supported Service Pack) and/or appropriate component prior to Cisco's testing of every release of the CCBU products (major, minor, and maintenance). Customers installing a new Microsoft Windows server platform or those otherwise seeking a comprehensive list of Cisco-qualified security patches should update their installed CCBU product to a supported maintenance release level and then consult the product Security Bulletin Field Notices (FNs) issued in the interim since the maintenance version release date. Applicable FNs can be found by using the Product Alert Tool (PAT) available on Cisco.com, as ollows:

1. Go to the Product Alert Tool (registered customers only)

2. Create a Profile if one does not exist and select all products that are required.
(Cisco recommends setting up a profile for each area of interest. For example, create one profile for Field Notices, another profile for End of Sales, and so on.)

3. From the Product Alert Tool (PAT) toolbar, select "Alerts History."

4. Select the profile created for Field Alerts.

5. Select "ALL" or specify the date range.

6. Run the reports based on the information entered.

For the security updates listed in the Problem Description section of this bulletin, Cisco has assigned the updates to the following categories:

Impacting

MS08-020 - Vulnerability in DNS Client Could Allow Spoofing (945553)

MS08-025 - Vulnerability in Windows Kernel Could Allow Elevation of Privilege (941693)

Deferred

MS08-021 - Vulnerabilities in GDI Could Allow Remote Code Execution (948590)

MS08-022 - Vulnerability in VBScript and JScript Scripting Engines Could Allow Remote Code Execution (944338)

MS08-023 - Security Update of ActiveX Kill Bits (948881)

MS08-024 - Cumulative Security Update for Internet Explorer (947864)

Not Applicable

MS08-018 - Vulnerability in Microsoft Project Could Allow Remote Code Execution (950183)

MS08-019 - Vulnerabilities in Microsoft Visio Could Allow Remote Code Execution (949032)

Proper care should be taken in deciding which updates to apply to your systems. For additional information on the security measures to be considered in an ICM environment, refer to the Security Best Practices for Cisco Intelligent Contact Management Software Guide.

Product Version(s) Tested (Y/I*) Components Tested (All or Specific)
ICM/IPCC
7.0(0) SR4, 7.2(4)
Y
All ICM/IPCC 7.0(0)SR4 components tested on Windows Server 2003 SP1. All ICM/IPCC 7.2(4) components tested on Windows Server 2003 SP2.
CTI OS
7.0(0) SR4, 7.2(4)
Y
CTI OS components tested on Windows Server 2003 SP1; Agent Desktop on Windows XP SP2
CVP
3.1 SR2
Y
CVP components tested on Windows Server 2000 SP4 with Rollup 1
CVP
4.1(1)
Y
CVP components tested on Windows 2003 SP1
CEM & CCS
CEM 5.0 SR9, CCS 5.0 SR6, CMB 5.0 SR3, DCA 2.0(1) SR2
Y
CEM and CCS components tested on Windows Server 2000 SP4 with Rollup 1.
CAD
7.2(1)
Y
CAD server components tested on Windows Server 2003 SP1; Agent, Supervisor and Admin Desktops on Windows XP SP2.

* Testing Disposition

I - In Progress (indicating that testing is in rogress and will be updated when complete)

Y - Yes (tested)

NA - Not Applicable (none of the security updates are being tested because of a "Not Applicable" or "Deferred"
assessment)

Customers should follow Microsoft's guidelines regarding when and how they should apply these updates. Refer to the Microsoft website for full details of the potential exposure from the caveat, which is referenced on the Microsoft Security page.

Problem Symptoms

It is important to point out that Cisco Contact Center Support has not had any cases pertaining to this vulnerability recorded from our customer base as of April 8, 2008.

Workaround/Solution

Cisco has assessed, and where deemed appropriate, validated the Microsoft security patches addressed in this bulletin along with any workarounds for the problems found.

Cisco recommends that Contact Center customers separately assess all security patches released by Microsoft and install those deemed appropriate for their environments.

Cisco will continue to provide a service of separately assessing and, where necessary, validating higher severity security patches that may be relevant to the ICM/IPCC Enterprise and ICM/IPCC Hosted software products.

Visit the Microsoft website to acquire the fixes. Keep in mind that you should download the appropriate fixes based on the version of the Microsoft operating system deployed in your environment and service pack level.

NOTE
Readers Please Note: Starting in May 2008, Cisco Contact Center product impact
assessments published in response to Microsoft Security Bulletins will no longer be issued as a Field Notice. Instead, Cisco will make this information available online, provided on the IntelliShield Event Response page of the Cisco Security Center. In the interim, customers can visit Cisco Security Center and then click on IntelliShield Event Responses link under Technical Resources to familiarize themselves with Cisco Security Center and the IntelliShield Event Response page.

For More Information

If you require further assistance, or if you have any further questions regarding this field notice, please contact the Cisco Systems Technical Assistance Center (TAC) by one of the following methods:

Receive Email Notification For New Field Notices

Product Alert Tool - Set up a profile to receive email updates about reliability, safety, network security, and end-of-sale issues for the Cisco products you specify.