Windows Security Updates for January 2006 - (MS06-002 MS06-003)

Original Release Date: January 10, 2006
Last Revised: January 10, 2006
Number: ASA-2006-004
Risk Level: Low
Advisory Version: 1.0
Advisory Status: Final

1. Overview:

Microsoft issued a security bulletin summary for January 2006 which contained three security advisories: MS06-001, MS06-002, and MS06-003. The MS06-001 advisory has already been addressed by Avaya in ASA-20 06-001: WMF vulnerability in Windows (MS06-001). The advisories describe vulnerabilities in the Microsoft Operating System. A description of the vulnerabilities can be found at:

http://www.microsoft.com/technet/security/bulletin/ms06-jan.mspx

Certain Avaya products utilize Microsoft Operating Systems and may be affected by these vulnerabilities.

2. Avaya Software-Only Products:

Avaya software-only products operate on general-purpose Operating Systems. Occasionally vulnerabilities may be discovered in the underlying Operating System or applications which come with the Operating System. These vulnerabilities often do not impact the software-only product directly but may threaten the integrity of the underlying platform.

In the case of this advisory Avaya software-only products are not affected by the vulnerabilities directly but the underlying Microsoft platform may be impacted. For affected Microsoft Operating Systems, Microsoft recommends installing patches. Detailed instructions for patching the Operating System are given by Microsoft at the following link:

http://www.microsoft.com/technet/security/bulletin/ms06-jan.mspx

The following Avaya software-only products run on Microsoft Operating Systems and may have been installed on a vulnerable Microsoft Operating System. Customers should determine on which Microsoft Operating System the product was installed and then follow Microsoft's guidance for applying patches:

Software-Only Products

Product:

Software Version(s):

Avaya Agent Access

All Versions

Avaya Basic Call Management System Reporting Desktop - server

All Versions

Avaya Basic Call Management System Reporting Desktop - client

All Versions

Avaya CMS Supervisor

All Versions

Avaya Computer Telephony

All Versions

Avaya CVLAN Client

All Versions

Avaya Enterprise Manager

All Versions

Avaya Integrated Management

All Versions

Avaya Interaction Center

All Versions

Avaya Interaction Center - Voice Quick Start

All Versions

Avaya IP Agent

All Versions

Avaya IP Softphone

All Versions

Avaya Modular Messaging

All Versions

Avaya Network Reporting

All Versions

Avaya OctelAccess(r) Server

All Versions

Avaya OctelDesignerTM

All Versions

Avaya Operational Analyst

All Versions

Avaya Outbound Contact Management

All Versions

Avaya Speech Access

All Versions

Avaya Unified Communication Center

All Versions

Avaya Unified Messenger (r)

All Versions

Avaya Visual Messenger TM

All Versions

Avaya Visual Vector Client

All Versions

Avaya VPNmanagerTM Console

All Versions

Avaya Web Messenger

All Versions

3. Avaya System Products

Avaya system products include an Operating System with the product when it is delivered. The system products described below are delivered with a Microsoft Operating System. Actions to be taken with these products are also described below.

Product:

Affected S/W Version(s):

Recommended Actions

Unified Communications Center (UCC) - S3400

All Versions

Follow Microsoft's recommendation for installing the Operating System patch:

MS06-002

The Unified Communications Center product is deployed with the Microsoft Windows 2000 Operating System.

Modular Messaging - Messaging Application Server (MAS)

All Versions

Follow Microsoft's recommendation for installing the Operating System patch:

MS06-002

The Modular Messaging - Messaging Application Server (MAS) is deployed with the Microsoft Windows 2000 Operating System.

S8100/DefinityOne/IP600 Media Servers

All Versions

Follow Microsoft's recommendation for installing the Operating System patch:

MS06-002

These products are deployed with either the Microsoft Windows 2000 Operating System or the Microsoft Windows NT Operating System.

4. Recommended Actions:

Avaya recommends that the Microsoft patches and/or workaround solutions are applied for the vulnerability outlined in the above system product table. Although certain Avaya system products utilize Microsoft Operating Systems and may be affected by these vulnerabilities, Avaya recommends that the use of e-mail clients and Internet browsers be restricted on Avaya system products (i.e. Outlook Express and Internet Explorer). The use of browsers should be restricted to authorized users-only as well as limited to the operational-needs of the product. Unrestricted access to the Intranet or Internet should be prohibited beyond the necessary functions of the product's web administration interface and to obtaining patches. This reduces the risk of vulnerabilities in these applications.

Further information regarding the Microsoft patches on Avaya system products is below:

MS06-002 Vulnerability in Embedded Web Fonts Could Allow Remote Code Execution (908519): A vulnerability has been discovered that could allow an attacker to take control of an affected system. A local user must open an e-mail or web site for this vulnerability to be exploited. This vulnerability impacts S8100/DefinityOne/IP600 Media Servers, Modular Messaging Message Application Server (MAS), and Unified Communication Center. The Common Vulnerabilities and Exposures project (cve.mitre.org) had assigned the name C VE-2006-0010 to this issue.

MS06-003 Vulnerability in TNEF Decoding in Microsoft Outlook and Microsoft Exchange Could Allow Remote Code Execution (902412): A vulnerability has been discovered that affects Outlook, Office Language Interface Packs, Office MultiLanguage Packs or Office Multilingual User Interface Packs. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of the client workstation. Avaya system products do not ship with Outlook, Exchange, or any Office Language Packs installed, and are therefore not vulnerable. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE -2006-0002 to this issue.

5. Disclaimer:

ALL INFORMATION IS BELIEVED TO BE CORRECT AT THE TIME OF PUBLICATION AND IS PROVIDED "AS IS". AVAYA INC., ON BEHALF ITSELF AND ITS SUBSIDIARIES AND AFFILIATES (HEREINAFTER COLLECTIVELY REFERRED TO AS "AVAYA"), DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE AND FURTHERMORE, AVAYA MAKES NO REPRESENTATIONS OR WARRANTIES THAT THE STEPS RECOMMENDED WILL ELIMINATE SECURITY OR VIRUS THREATS TO CUSTOMERS' SYSTEMS. IN NO EVENT SHALL AVAYA BE LIABLE FOR ANY DAMAGES WHATSOEVER ARISING OUT OF OR IN CONNECTION WITH THE INFORMATION OR RECOMMENDED ACTIONS PROVIDED HEREIN, INCLUDING DIRECT, INDIRECT, CONSEQUENTIAL DAMAGES, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF AVAYA HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

THE INFORMATION PROVIDED HERE DOES NOT AFFECT THE SUPPORT AGREEMENTS IN PLACE FOR AVAYA PRODUCTS. SUPPORT FOR AVAYA PRODUCTS CONTINUES TO BE EXECUTED AS PER EXISTING AGREEMENTS WITH AVAYA.

6. Revision History:

V 1.0 - January 10, 2006 - Initial Statement issued.

Send information regarding any discovered security problems with Avaya products to either the contact noted in the product's documentation or securityalerts@avaya.com.

2005 Avaya Inc. All Rights Reserved. All trademarks identified by the or are registered trademarks or trademarks, respectively, of Avaya Inc. All other trademarks are the property of their respective owners.