Microsoft has issued a security bulletin containing patch KB3042553 for security advisory MS15-034. This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker sends a specially crafted HTTP request to an affected Windows system. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2015-1635 to this issue.
A description of the vulnerability may be found at:
Avaya system products include an Operating System with the product when it is delivered. The system products described below are delivered with a Microsoft Operating System. Actions to be taken with these products are also described below.
Product: | Affected Version(s): | Risk Level: | Actions: |
---|---|---|---|
Avaya Meeting Exchange Components:
|
5.0.x through 6.2.x | High | Avaya recommends installing the security update as provided via Microsoft Windows Update. |
Recommended Actions for System Products:
Avaya strongly recommends following
networking and security best practices by implementing
firewalls, ACLs, physical security or other appropriate
access restrictions. Though Avaya believes such
restrictions should always be in place, risk to Avaya
products and the surrounding network from this potential
vulnerability may be mitigated by ensuring these
practices are implemented until such time as the recommended
update is applied.
Further restrictions as deemed necessary based on the
customer's security policies may be required during this
interim period.
When determining risk, Avaya takes into account many factors as outlined by Avaya's Security Vulnerability Classification Policy. The following table describes factors that mitigate the risk of specific vulnerabilities for affected Avaya products:
Vulnerability | Mitigating Factors |
---|---|
CVE-2015-1635 |
This is a High risk due to the potential for remote code execution by a malicious user within the customer's network. |
Avaya software-only products operate on general-purpose operating systems. Occasionally vulnerabilities may be discovered in the underlying operating system or applications that come with the operating system. These vulnerabilities often do not impact the software-only product directly but may threaten the integrity of the underlying platform.
In the case of this advisory Avaya software-only products are not affected by the vulnerability directly but the underlying Microsoft Windows platform may be. For affected Microsoft Operating Systems, Microsoft recommends installing patches. Detailed instructions for patching the Operating System are given by Microsoft at the following link:
Product: | Software Version(s): |
---|---|
Avaya Basic Call Management System Reporting Desktop | All Versions |
Avaya Branch Communications Server | All Versions |
Avaya C3000 Unified Messaging | All Versions |
Avaya Call Management System (CMS) Supervisor | All Versions |
Avaya CallVisor® Adjunct Switch Application Interface (ASAI) LAN (CVLAN) Client | All Versions |
Avaya Computer Telephony | All Versions |
Avaya Aura® Contact Center (AACC) | All Versions |
Avaya Aura® Workforce Optimization (WFO) | All Versions |
Avaya Contact Center Express (ACCE) | All Versions |
Avaya Customer Interaction Express (CIE) | All Versions |
Avaya CTI Software conneCTIon | All Versions |
Avaya CTI Q-Server TAPI | All Versions |
Avaya DialIt | All Versions |
Avaya Dialog Designer | All Versions |
Avaya Easy Management | All Versions |
Avaya Enterprise Device Manager | All Versions |
Avaya Enterprise Directory System | All Versions |
Avaya Enterprise Policy Manager | All Versions |
Avaya Enterprise Switch Manager | All Versions |
Avaya Fault and Performance Manager | All Versions |
Avaya HotCom Alert | All Versions |
Avaya HotCom BCA | All Versions |
Avaya HotCom Front Office Interface Server | All Versions |
Avaya HotCom Property Management System | All Versions |
Avaya HotCom Point of Sale | All Versions |
Avaya HotCom Sihot | All Versions |
Avaya HotCom VoiceMail | All Versions |
Avaya IDS Win Accounting | All Versions |
Avaya Integrated Management | All Versions |
Avaya Interaction Center (IC) | All Versions |
Avaya Internet Access Manager | All Versions |
Avaya IP Softphone | All Versions |
Avaya MACS Alarmserver | All Versions |
Avaya Medcom Medial | All Versions |
Avaya Network Configuration Manager | All Versions |
Avaya Network Resource Manager | All Versions |
Avaya one-X® Attendant | All Versions |
Avaya one-X® Communicator | All Versions |
Avaya Operational Analyst | All Versions |
Avaya PUMA | All Versions |
Avaya ScanSoft SpeechAttendant | All Versions |
Avaya Unified Communication Center (UCC) | All Versions |
Avaya Visual Messenger™ | All Versions |
Avaya VoIPManager | All Versions |
Avaya Visual Vectors | All Versions |
Recommended Actions for Avaya Aura® Contact Center and Avaya Aura® Work Force Optimization:
If applicable per the Avaya NES Contact Center Portfolio Service Packs Compatibility and Security Hotfixes Applicability List, install the security update as provided via Microsoft Windows update.
Recommended Actions for Other Software-Only Products:
Avaya recommends installing the security update as provided via Microsoft Windows update.
Additional information may also be available via the Avaya support website and through your Avaya account representative. Please contact your Avaya product support representative, or dial 1-800-242-2121, with any questions.
ALL INFORMATION IS BELIEVED TO BE CORRECT AT THE TIME OF PUBLICATION, IS PROVIDED "AS IS", AND IS APPLICABLE ONLY TO PRODUCT VERSIONS ELIGIBLE FOR MANUFACTURER SUPPORT IN ACCORDANCE WITH AVAYA PRODUCT LIFE CYCLE POLICY. AVAYA INC., ON BEHALF ITSELF AND ITS SUBSIDIARIES AND AFFILIATES (HEREINAFTER COLLECTIVELY REFERRED TO AS "AVAYA"), DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE AND FURTHERMORE, AVAYA MAKES NO REPRESENTATIONS OR WARRANTIES THAT THE STEPS RECOMMENDED WILL ELIMINATE SECURITY OR VIRUS THREATS TO CUSTOMERS' SYSTEMS. IN NO EVENT SHALL AVAYA BE LIABLE FOR ANY DAMAGES WHATSOEVER ARISING OUT OF OR IN CONNECTION WITH THE INFORMATION OR RECOMMENDED ACTIONS PROVIDED HEREIN, INCLUDING DIRECT, INDIRECT, INCIDENTAL, STATUTORY, CONSEQUENTIAL DAMAGES, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF AVAYA HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
THE INFORMATION PROVIDED HERE DOES NOT AFFECT THE SUPPORT AGREEMENTS IN PLACE FOR AVAYA PRODUCTS. SUPPORT FOR AVAYA PRODUCTS CONTINUES TO BE EXECUTED AS PER EXISTING AGREEMENTS WITH AVAYA.
V 1.0 - April 16, 2015 - Initial Statement issued.
Avaya customers or Business Partners should report any security issues found with Avaya products via the standard support process.
Independent security researchers can contact Avaya at
securityalerts@avaya.com.
© 2015 Avaya Inc. All Rights Reserved. All trademarks identifying Avaya products by the ® or ™ are registered trademarks or trademarks, respectively, of Avaya Inc. All other trademarks are the property of their respective owners.