December 02, 2004
CTI OS - 4.x, 5.x and 6.0, all service releases
Cisco Internet Service Node - Versions 1.0, 2.0 and 2.1
ICM Enterprise - 4.6.2, 5.0, and 6.0,all service releases
ICM Hosted - 4.6.2 and 5.0, all service releases
IPCC Enterprise - 4.6.2, 5.0, and 6.0,all service releases
IPCC Hosted - 4.6.2 and 5.0, all service releases
On December 2, 2004 Microsoft released the following security update:
Cumulative Security Update for Internet Explorer (889293)
Microsoft Windows NT Server 4.0 Service Pack 6a
Microsoft Windows 2000 Service Pack 3 and Microsoft Windows 2000 Service Pack 4
Microsoft Windows 98, Microsoft Windows 98 Second Edition (SE), and Microsoft Windows Millennium Edition (Me)
Review the FAQ section of the Microsoft bulletin for details about these operating systems.
Internet Explorer 6 Service Pack 1
For additional information on Microsoft security updates, see the Microsoft Security page.
Cisco evaluates Microsoft security notices and updates for potential impact to Cisco Contact Center products.
The qualification process results in one of four categorical ratings being applied to a given update:
Impacting, Not Impacting, Deferred, or Not Applicable.
The four ratings are defined in the Cisco Customer Contact Software Policy For Use of Third-Party Software and Security Updates document.
For the security update listed in Problem Description section of this bulletin, Cisco has assigned the update to the following category:
MS04-040 Cumulative Security Update for Internet Explorer (889293)
This vulnerability can only be exploited if a user visited a malicious Web Page that could potentially allow remote code execution. An attacker who successfully exploited this vulnerability could take complete control of an affected system. Production Contact Center servers should not be used to browse to unknown and potentially dangerous Web Sites.
For additional information on the security measures to be considered in an ICM environment, refer to the Security Best Practices for Cisco Intelligent Contact Management Software
Customers should follow Microsoft's guidelines regarding when and how they should apply these updates. Refer to the Microsoft website for full details of the potential exposure from the caveat is referenced on the Microsoft Security page.
It is important to point out that Cisco Contact Center Support has not had any cases pertaining to this vulnerability recorded from our customer base as of December 2, 2004.
Cisco has assessed, and where deemed appropriate, validated the Microsoft security patch addressed in this bulletin.
Cisco recommends that Contact Center customers separately assess all security patches released by Microsoft and install those deemed appropriate for their environments.
Cisco will continue to provide a service of separately assessing and where necessary, validating higher severity security patches that may be relevant to the Contact Center Enterprise software products.
Visit the Microsoft website to acquire the fixes. Keep in mind that you should download the appropriate fixes based on the version of the Microsoft operating system deployed in your environment and service pack level.
For More Information
If you require further assistance, or if you have any further questions regarding this field notice, please contact the Cisco Systems Technical Assistance Center (TAC) by one of the following methods:
Receive Email Notification For New Field Notices
Product Alert Tool - Set up a profile to receive email updates about reliability, safety, network security, and end-of-sale issues for the Cisco products you specify.