Microsoft issued a security bulletin summary for March 2006 which contained two security advisories: MS06-011 and MS06-012. Microsoft also released an update for MS06-011 on June 13, 2006. The advisories describe vulnerabilities in various Microsoft Windows Operating Systems. A description of the vulnerabilities can be found at:
Certain Avaya products utilize Microsoft Operating Systems and may be affected by these vulnerabilities.Avaya software-only products operate on general-purpose Operating Systems. Occasionally vulnerabilities may be discovered in the underlying Operating System or applications which come with the Operating System. These vulnerabilities often do not impact the software-only product directly but may threaten the integrity of the underlying platform.
In the case of this advisory Avaya software-only products are not affected by these vulnerabilities directly but the underlying Microsoft platform may be impacted. For affected Microsoft Operating Systems, Microsoft recommends installing patches. Detailed instructions for patching the Operating System are given by Microsoft at the following links:
The following Avaya software-only products run on Microsoft Operating Systems and may have been installed on a vulnerable Microsoft Operating System. Customers should determine on which Microsoft Operating System the product was installed and then follow Microsoft's guidance for applying patches:
Product: | Software Version(s): |
---|---|
Avaya Agent Access | All Versions |
Avaya Basic Call Management System Reporting Desktop - server | All Versions |
Avaya Basic Call Management System Reporting Desktop - client | All Versions |
Avaya CMS Supervisor | All Versions |
Avaya Computer Telephony | All Versions |
Avaya CVLAN Client | All Versions |
Avaya Enterprise Manager | All Versions |
Avaya Integrated Management | All Versions |
Avaya Interaction Center (IC) | All Versions |
Avaya Interaction Center - Voice Quick Start | All Versions |
Avaya IP Agent | All Versions |
Avaya IP Softphone | All Versions |
Avaya Modular Messaging | All Versions |
Avaya Network Reporting | All Versions |
Avaya OctelAccess(r) Server | All Versions |
Avaya OctelDesignerTM | All Versions |
Avaya Operational Analyst | All Versions |
Avaya Outbound Contact Management> | All Versions |
Avaya Speech Access | All Versions |
Avaya Unified Communication Center (UCC) | All Versions |
Avaya Unified Messenger (r) | All Versions |
Avaya Visual Messenger TM | All Versions |
Avaya Visual Vector Client | All Versions |
Avaya VPNmanagerTM Console | All Versions |
Avaya Web Messenger | All Versions |
Avaya system products include an Operating System with the product when it is delivered. The system products described below are delivered with a Microsoft Operating System. Actions to be taken with these products are also described below.
Product: | Affected S/W Version(s): | Recommended Actions: |
---|---|---|
Unified Communications Center (UCC) - S3400 | None | Not Affected. The Unified Communications Center product is deployed with the Microsoft Windows 2000 Operating System. |
Modular Messaging - Messaging Application Server (MAS) | 3.0 | Follow Microsoft's recommendation for installing the Operating
System patch: MS06-011 MS06-012 The Modular Messaging - Messaging Application Server (MAS) is deployed with the Microsoft Windows 2000 or Microsoft Windows 2003 Operating System. Only version 3 is affected by these two vulnerabilities. Avaya recommends applying the updated patch from Microsoft for MS06-011. |
S8100/DefinityOne/IP600 Media Servers> | None | Not Affected. These products are deployed with either the Microsoft Windows 2000 Operating System or the Microsoft Windows NT Operating System. |
Avaya recommends that the Microsoft patches and/or workaround solutions are applied for the vulnerability outlined in the above system product table. Although certain Avaya system products utilize Microsoft Operating Systems and may be affected by these vulnerabilities, Avaya recommends that the use of e-mail clients and Internet browsers be restricted on Avaya system products (i.e. Outlook Express and Internet Explorer). The use of browsers should be restricted to authorized users-only as well as limited to the operational-needs of the product. Unrestricted access to the Intranet or Internet should be prohibited beyond the necessary functions of the product's web administration interface and to obtaining patches. This reduces the risk of vulnerabilities in these applications.
Further information regarding the Microsoft patches on Avaya system products is below:
MS06-011 Permissive Windows Services DACLs Could Allow Elevation of Privilege (914798): A vulnerability has been discovered in Windows XP SP1 and Windows 2003 that could allow for an attacker which is already validated as a member of the Network Configuration Operators group on the targeted machine to take complete control of the systems. An update to this advisory has been published as of June 13, 2006. The Avaya Modular Messaging Message Application Server V 3.0 runs on Windows 2003, and is affected by this vulnerability. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2006-0023 to this issue.
MS06-012 Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (905413): A vulnerability has been reported in Microsoft Office Excel. An attacker that attacks a vulnerable system where the logged in user has administrative rights can take complete control of the system. Avaya system products do not ship with Microsoft Office Excel, and are therefore not affected by this vulnerability. The Common Vulnerabilities and Exposures project (cve.mitre.org) had assigned the names CVE-2006-0020, CVE-2006-0028, CVE-2006-0029, CVE-2006-0030, CVE-2006-0031, and CVE-2006-0009 to this issue.
ALL INFORMATION IS BELIEVED TO BE CORRECT AT THE TIME OF PUBLICATION AND IS PROVIDED "AS IS". AVAYA INC., ON BEHALF ITSELF AND ITS SUBSIDIARIES AND AFFILIATES (HEREINAFTER COLLECTIVELY REFERRED TO AS "AVAYA"), DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE AND FURTHERMORE, AVAYA MAKES NO REPRESENTATIONS OR WARRANTIES THAT THE STEPS RECOMMENDED WILL ELIMINATE SECURITY OR VIRUS THREATS TO CUSTOMERS' SYSTEMS. IN NO EVENT SHALL AVAYA BE LIABLE FOR ANY DAMAGES WHATSOEVER ARISING OUT OF OR IN CONNECTION WITH THE INFORMATION OR RECOMMENDED ACTIONS PROVIDED HEREIN, INCLUDING DIRECT, INDIRECT, CONSEQUENTIAL DAMAGES, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF AVAYA HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
THE INFORMATION PROVIDED HERE DOES NOT AFFECT THE SUPPORT AGREEMENTS IN PLACE FOR AVAYA PRODUCTS. SUPPORT FOR AVAYA PRODUCTS CONTINUES TO BE EXECUTED AS PER EXISTING AGREEMENTS WITH AVAYA.
V 1.0 - March 14, 2006 - Initial Statement issued.
V 2.0 - June 13 - Added updated information from Microsoft regarding
MS06-011.
Send information regarding any discovered security problems with Avaya products to either the contact noted in the product's documentation or [email protected].
© 2006 Avaya Inc. All Rights Reserved. All trademarks identified by the ® or ™ are registered trademarks or trademarks, respectively, of Avaya Inc. All other trademarks are the property of their respective owners.