May 10, 2007
NOTICE:
THIS FIELD NOTICE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTY OF MERCHANTABILITY. YOUR USE OF THE INFORMATION ON THE FIELD NOTICE OR MATERIALS LINKED FROM THE FIELD NOTICE IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS FIELD NOTICE AT ANY TIME.
Products Affected
Products Affected |
---|
Cisco Agent Desktop (CAD) - 6.x(x) and 7.x(x), all SRs |
Cisco Collaboration Server (CCS) - 5.0, all SRs |
Cisco Computer Telephony Integration (CTI) and Computer Telephony Integration Object Server (CTI OS) - 6.0 and 7.x(x), all SRs/MRs |
Cisco e-mail Manager (CEM) - 5.0, all SRs |
Customer Voice Portal (CVP) - 3.0, 3.1 and 4.0, all SRs |
IP Contact Center (IPCC) Enterprise - 6.0 and 7.x(x), all SRs/MRs |
IP Contact Center (IPCC) Hosted - 7.x(x) |
Intelligent Contact Management (ICM) Enterprise - 6.0 and 7.x(x), all SRs/MRs |
Intelligent Contact Management (ICM) Hosted - 7.x(x) |
Internet Service Node (ISN) - 2.0(0) and 2.1(0), all SRs |
Problem Description
On May 08 2007, Microsoft released the following security updates:
MS07-023 - Critical
Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (934233)
Affected Supported Software:
- None
MS07-024 - Critical
Vulnerabilities in Microsoft Word Could Allow Remote Code Execution (934232)
Affected Supported Software:
- None
MS07-025 - Critical
Vulnerability in Microsoft Office Could Allow Remote Code Execution (934873)
Affected Supported Software:
- None
MS07-026 - Critical
Vulnerabilities in Microsoft Exchange Could Allow Remote Code Execution (931832)
Affected Supported Software:
- None
MS07-027 - Critical
Cumulative Security Update for Internet Explorer (931768)
Affected Supported Software:
- Microsoft Windows XP Service Pack 2
- Microsoft Windows Server 2003 Service Pack 1
- Microsoft Windows 2000 Service Pack 4
MS07-028 - Critical
Vulnerability in CAPICOM Could Allow Remote Code Execution (931906)
Affected Supported Software:
- None
MS07-029 - Critical
Vulnerability in Windows DNS RPC Interface Could Allow Remote Code Execution (935966)
Affected Supported Software:
- Microsoft Windows Server 2003 Service Pack 1
- Microsoft Windows 2000 Service Pack 4
Background
Cisco evaluates Microsoft security notices and updates for potential impact to Cisco Contact Center products.
The qualification process results in one of four categorical ratings being applied to a given update: Impacting, Not Impacting, Deferred, or Not Applicable.
The four ratings are defined in: Cisco Customer Contact Software Policy for use of Third Party Software and Security.
For the security updates listed in the Problem Description section of this bulletin, Cisco has assigned the updates to the following categories:
Impacting
MS07-029 - Vulnerability in Windows DNS RPC Interface Could Allow Remote Code Execution (935966)
Deferred
MS07-027 - Cumulative Security Update for Internet Explorer (931768)
Non-impacting
MS07-023 - Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (934233)
MS07-024 - Vulnerabilities in Microsoft Word Could Allow Remote Code Execution (934232)
MS07-025 - Vulnerability in Microsoft Office Could Allow Remote Code Execution (934873)
MS07-026 - Vulnerabilities in Microsoft Exchange Could Allow Remote Code Execution (931832)
MS07-028 - Vulnerability in CAPICOM Could Allow Remote Code Execution (931906)
Not Applicable
None
Proper care should be taken in deciding on which updates to apply to your systems. For additional information on the security measures to be considered in an ICM environment, refer to: Security Best Practices for Cisco Intelligent Contact Management Software Guide.
Product |
Version(s) |
Tested (Y/I*) |
Components Tested (All or Specific) |
---|---|---|---|
ICM/IPCC |
7.0(0) SR4, 7.1(3) |
Y |
All ICM/IPCC components tested on Windows Server 2003 SP1 |
CTI OS |
7.0(0) SR4, 7.1(3) |
Y |
CTI OS components tested on Windows Server 2003 SP1; Agent Desktop on Windows XP SP2 |
CVP |
3.1 SR2 |
Y |
CVP components tested on Windows Server 2000 SP4 with Rollup 1 |
CVP |
4.0 |
Y |
Tested on Windows 2003 SP1 |
CEM & CCS |
CEM 5.0 SR6, CCS 5.0 SR4, CMB 5.0 SR2, DCA 2.0(1) SR2 |
Y |
CEM and CCS components tested on Windows Server 2000 SP4 with Rollup 1. |
CAD |
7.1(2) |
Y |
CAD server components tested on Windows Server 2003 R2; Agent, Supervisor and Admin Desktops on Windows 2000 Professional SP4. |
Customers should follow Microsoft's guidelines regarding when and how they should apply these updates. Refer to the Microsoft Security website for more details.
Problem Symptoms
It is important to point out that Cisco Contact Center Support has not had any cases pertaining to this vulnerability recorded from our customer base as of May 9, 2007.
Workaround/Solution
Cisco has assessed, and where deemed appropriate, validated the Microsoft security patches addressed in this bulletin along with any workarounds for the problems found.
Cisco recommends that Contact Center customers separately assess all security patches released by Microsoft and install those deemed appropriate for their environments.
Cisco will continue to provide a service of separately assessing and where necessary, validating higher severity security patches that may be relevant to the ICM/IPCC and ICM/IPCC Hosted software products.
Visit the Microsoft website to acquire the fixes. Keep in mind that you should download the appropriate fixes based on the version of the Microsoft operating system deployed in your environment and service pack level.
Revision History
Revision |
Date |
Comment |
---|---|---|
1.0 |
10-MAY-2007 |
Initial Public Release |
For More Information
If you require further assistance, or if you have any further questions regarding this field notice, please contact the Cisco Systems Technical Assistance Center (TAC) by one of the following methods:
Receive Email Notification For New Field Notices
Product Alert Tool - Set up a profile to receive email updates about reliability, safety, network security, and end-of-sale issues for the Cisco products you specify.