Microsoft has issued a security bulletin containing patch KB2828223 for security advisory MS13-029. This security update resolves a vulnerability in Windows Remote Desktop Client. The vulnerability could allow remote code execution if a user views a specially crafted webpage. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2013-1296 to this issue.
A description of the vulnerability may be found at:
Certain Avaya products utilize Microsoft Operating Systems and may be affected by this vulnerability.
Avaya system products include an Operating System with the product when it is delivered. The system products described below are delivered with a Microsoft Operating System. Actions to be taken with these products are also described below.
|Product:||Affected Version(s):||Risk Level:||Actions:|
|Avaya CallPilot®||All||Low||Avaya recommends that customers install the security update as provided via Microsoft Windows Update.|
|Avaya Communication Server 1000 Telephony Manager||All||Low||Avaya recommends that customers install the security update as provided via Microsoft Windows Update.|
|Avaya Aura® Conferencing Standard Edition||All||Low||Avaya recommends that customers install the security update as provided via Microsoft Windows Update.|
|Avaya Meeting Exchange Components:
|Avaya Messaging Application Server||All||Low|
Recommended Actions for System Products:
Avaya strongly recommends that customers follow networking and security best practices by implementing firewalls, ACLs, physical security or other appropriate access restrictions. Though Avaya believes such restrictions should always be in place, risk to Avaya products and the surrounding network from this potential vulnerability may be mitigated by ensuring these practices are implemented until such time as the recommended update is applied. Further restrictions as deemed necessary based on the customer's security policies may be required during this interim period.
When determining risk, Avaya takes into account many factors as outlined by Avaya's Security Vulnerability Classification Policy. The following table describes factors that mitigate the risk of specific vulnerabilities for affected Avaya products:
||This is a Low Risk because exploitation would require Internet browsing, which is considered non-standard user interaction.|
Avaya software-only products operate on general-purpose operating systems. Occasionally vulnerabilities may be discovered in the underlying operating system or applications that come with the operating system. These vulnerabilities often do not impact the software-only product directly but may threaten the integrity of the underlying platform.
In the case of this advisory Avaya software-only products are not affected by the vulnerability directly but the underlying Microsoft Windows platform may be. For affected Microsoft Operating Systems, Microsoft recommends installing patches. Detailed instructions for patching the Operating System are given by Microsoft at the following link:
|Avaya Basic Call Management System Reporting Desktop||All Versions|
|Avaya Branch Communications Server||All Versions|
|Avaya C3000 Unified Messaging||All Versions|
|Avaya Call Management System (CMS) Supervisor||All Versions|
|Avaya CallVisor® Adjunct Switch Application Interface (ASAI) LAN (CVLAN) Client||All Versions|
|Avaya Computer Telephony||All Versions|
|Avaya Aura® Contact Center (AACC)||All Versions|
|Avaya Aura® Workforce Optimization (WFO)||All Versions|
|Avaya Contact Center Express (ACCE)||All Versions|
|Avaya Customer Interaction Express (CIE)||All Versions|
|Avaya CTI Software conneCTIon||All Versions|
|Avaya CTI Q-Server TAPI||All Versions|
|Avaya DialIt||All Versions|
|Avaya Dialog Designer||All Versions|
|Avaya Easy Management||All Versions|
|Avaya Enterprise Device Manager||All Versions|
|Avaya Enterprise Directory System||All Versions|
|Avaya Enterprise Policy Manager||All Versions|
|Avaya Enterprise Switch Manager||All Versions|
|Avaya Fault and Performance Manager||All Versions|
|Avaya HotCom Alert||All Versions|
|Avaya HotCom BCA||All Versions|
|Avaya HotCom Front Office Interface Server||All Versions|
|Avaya HotCom Property Management System||All Versions|
|Avaya HotCom Point of Sale||All Versions|
|Avaya HotCom Sihot||All Versions|
|Avaya HotCom VoiceMail||All Versions|
|Avaya IDS Win Accounting||All Versions|
|Avaya Integrated Management||All Versions|
|Avaya Interaction Center (IC)||All Versions|
|Avaya Internet Access Manager||All Versions|
|Avaya IP Softphone||All Versions|
|Avaya MACS Alarmserver||All Versions|
|Avaya Medcom Medial||All Versions|
|Avaya Network Configuration Manager||All Versions|
|Avaya Network Resource Manager||All Versions|
|Avaya one-X® Attendant||All Versions|
|Avaya one-X® Communicator||All Versions|
|Avaya Operational Analyst||All Versions|
|Avaya PUMA||All Versions|
|Avaya ScanSoft SpeechAttendant||All Versions|
|Avaya Unified Communication Center (UCC)||All Versions|
|Avaya Visual Messenger™||All Versions|
|Avaya VoIPManager||All Versions|
|Avaya Visual Vectors||All Versions|
Recommended Actions for Avaya Aura® Contact Center and Avaya Aura® Work Force Optimization:
If applicable per the Avaya Aura® Contact Center Service Pack/Hotfix Compatibility Matrix, install the security update as provided via Microsoft Windows update.
Recommended Actions for Other Software-Only Products:
Avaya recommends that customers install the security update as provided via Microsoft Windows update.
Additional information may also be available via the Avaya support website and through your Avaya account representative. Please contact your Avaya product support representative, or dial 1-800-242-2121, with any questions.
ALL INFORMATION IS BELIEVED TO BE CORRECT AT THE TIME OF PUBLICATION AND IS PROVIDED "AS IS". AVAYA INC., ON BEHALF ITSELF AND ITS SUBSIDIARIES AND AFFILIATES (HEREINAFTER COLLECTIVELY REFERRED TO AS "AVAYA"), DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE AND FURTHERMORE, AVAYA MAKES NO REPRESENTATIONS OR WARRANTIES THAT THE STEPS RECOMMENDED WILL ELIMINATE SECURITY OR VIRUS THREATS TO CUSTOMERS' SYSTEMS. IN NO EVENT SHALL AVAYA BE LIABLE FOR ANY DAMAGES WHATSOEVER ARISING OUT OF OR IN CONNECTION WITH THE INFORMATION OR RECOMMENDED ACTIONS PROVIDED HEREIN, INCLUDING DIRECT, INDIRECT, INCIDENTAL, STATUTORY, CONSEQUENTIAL DAMAGES, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF AVAYA HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
THE INFORMATION PROVIDED HERE DOES NOT AFFECT THE SUPPORT AGREEMENTS IN PLACE FOR AVAYA PRODUCTS. SUPPORT FOR AVAYA PRODUCTS CONTINUES TO BE EXECUTED AS PER EXISTING AGREEMENTS WITH AVAYA.
V 1.0 - April 11, 2013 - Initial Statement issued.
Send information regarding any discovered security problems with Avaya products to either the contact noted in the product's documentation or firstname.lastname@example.org.
© 2013 Avaya Inc. All Rights Reserved. All trademarks identifying Avaya products by the ® or ™ are registered trademarks or trademarks, respectively, of Avaya Inc. All other trademarks are the property of their respective owners.