Windows Security Updates for February 2006 - (MS06-004 to MS06-010)

Original Release Date: February 14, 2006
Last Revised: February 14, 2006
Number: ASA-2006-047
Risk Level: Low
Advisory Version: 1.0
Advisory Status: Final

1. Overview:

Microsoft issued a security bulletin summary for February 2006 which contained seven security advisories: MS06-004, MS06-005, MS06-006, MS06-007, MS06-008, MS06-009, and MS06-010. The advisories describe vulnerabilities in the Microsoft Operating System. A description of the vulnerabilities can be found at:

http://www.microsoft.com/technet/security/bulletin/ms06-feb.mspx

Certain Avaya products utilize Microsoft Operating Systems and may be affected by these vulnerabilities.

2. Avaya Software-Only Products:

Avaya software-only products operate on general-purpose Operating Systems. Occasionally vulnerabilities may be discovered in the underlying Operating System or applications which come with the Operating System. These vulnerabilities often do not impact the software-only product directly but may threaten the integrity of the underlying platform.

In the case of this advisory Avaya software-only products are not affected by this vulnerability by the vulnerabilities directly but the underlying Microsoft platform may be impacted. For affected Microsoft Operating Systems, Microsoft recommends installing patches. Detailed instructions for patching the Operating System are given by Microsoft at the following links:

The following Avaya software-only products run on Microsoft Operating Systems and may have been installed on a vulnerable Microsoft Operating System. Customers should determine on which Microsoft Operating System the product was installed and then follow Microsoft's guidance for applying patches:

Software-Only Products

Product: Software Version(s):
Avaya Agent Access All Versions
Avaya Basic Call Management System Reporting Desktop - server All Versions
Avaya Basic Call Management System Reporting Desktop - client All Versions
Avaya CMS Supervisor All Versions
Avaya Computer Telephony All Versions
Avaya CVLAN Client All Versions
Avaya Enterprise Manager All Versions
Avaya Integrated Management All Versions
Avaya Interaction Center (IC) All Versions
Avaya Interaction Center - Voice Quick Start All Versions
Avaya IP Agent All Versions
Avaya IP Softphone All Versions
Avaya Modular Messaging All Versions
Avaya Network Reporting All Versions
Avaya OctelAccess(r) Server All Versions
Avaya OctelDesignerTM All Versions
Avaya Operational Analyst All Versions
Avaya Outbound Contact Management> All Versions
Avaya Speech Access All Versions
Avaya Unified Communication Center (UCC) All Versions
Avaya Unified Messenger (r) All Versions
Avaya Visual Messenger TM All Versions
Avaya Visual Vector Client All Versions
Avaya VPNmanagerTM Console All Versions
Avaya Web Messenger All Versions

3. Avaya System Products

Avaya system products include an Operating System with the product when it is delivered. The system products described below are delivered with a Microsoft Operating System. Actions to be taken with these products are also described below.

Product: Affected S/W Version(s):

Recommended Actions:
Unified Communications Center (UCC) - S3400 All Versions Follow Microsoft's recommendation for installing the Operating System patch:

MS06-004

The Unified Communications Center product is deployed with the Microsoft Windows 2000 Operating System.
Modular Messaging - Messaging Application Server (MAS) All Versions Follow Microsoft's recommendation for installing the Operating System patch:

MS06-004

The Modular Messaging - Messaging Application Server (MAS) is deployed with the Microsoft Windows 2000 or Microsoft Windows 2003 Operating System.
S8100/DefinityOne/IP600 Media Servers> All Versions Follow Microsoft's recommendation for installing the Operating System patch:

MS06-004

These products are deployed with either the Microsoft Windows 2000 Operating System or the Microsoft Windows NT Operating System.

4. Recommended Actions:

Avaya recommends that the Microsoft patches and/or workaround solutions are applied for the vulnerability outlined in the above system product table. Although certain Avaya system products utilize Microsoft Operating Systems and may be affected by these vulnerabilities, Avaya recommends that the use of e-mail clients and Internet browsers be restricted on Avaya system products (i.e. Outlook Express and Internet Explorer). The use of browsers should be restricted to authorized users-only as well as limited to the operational-needs of the product. Unrestricted access to the Intranet or Internet should be prohibited beyond the necessary functions of the product's web administration interface and to obtaining patches. This reduces the risk of vulnerabilities in these applications.

Further information regarding the Microsoft patches on Avaya system products is below:

MS06-004 Cumulative Security Update for Internet Explorer (910620): A vulnerability has been reported in Microsoft's WMF parser. An attacker could potentially trick a user into opening a malicious file, that could then allow the hacker to view the file system, and execute arbitrary code. If the user logged into the system does not have administrative privileges, the ability of a hacker to exploit this vulnerability is much more limited. This vulnerability impacts S8100/DefinityOne/IP600 Media Servers, Modular Messaging Message Application Server (MAS), and Unified Communication Center. The Common Vulnerabilities and Exposures project (cve.mitre.org) had assigned the name CVE-2006-0020 to this issue.

MS06-005 Vulnerability in Windows Media Player Could Allow Remote Code Execution (911565): A vulnerability has been discovered in Windows Media Player. An attacker could potentially trick a user into opening a malicious file, that could then allow the hacker to view the file system, and execute arbitrary code. If the user logged into the system does not have administrative privileges, the ability of a hacker to exploit this vulnerability is much more limited. Avaya system products do not ship with Windows Media Player, and are therefore not affected by this vulnerability by this vulnerability. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2006-0006 to this issue.

MS06-006 Vulnerability in Windows Media Player Plug-in with Non-Microsoft Internet Browsers Could Allow Remote Code Execution (911564): A Vulnerability has been discovered using the Windows Media Player Plug-in with non-Microsoft browsers (e.g. Mozilla, Firefox, etc...). An attacker could potentially trick a user into opening a malicious file, that could then allow the hacker to view the file system, and execute arbitrary code. If the user logged into the system does not have administrative privileges, the ability of a hacker to exploit this vulnerability is much more limited. Avaya system products do not ship with non-Microsoft internet browser programs using the Windows Media Player Plug-in, and are therefore not affected by this vulnerability by this vulnerability. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2006-0005 to this issue.

MS06-007 Vulnerability in TCP/IP Could Allow Denial of Service (913446): A possible Denial of Service (DoS) has been discovered in the Internet Group Management Protocol version 3 (IGMP v3). An attacker could send a carefully crafted IGMP v3 packet that could cause the system to stop responding. No Avaya system products ship with IGMP v3 enabled, and are therefore not affected by this vulnerability. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2006-0021 to this issue.

MS06-008 Vulnerability in Web Client Service Could Allow Remote Code Execution (911927): A local vulnerability has been discovered in Microsoft's Web Client Service. A local attacker with a valid login and password could potentially take complete control of a system. No Avaya system products ship with Web Client Services running, and are therefore not affected by this vulnerability. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2006-0013 to this issue.

MS06-009 Vulnerability in the Korean Input Method Editor Could Allow Elevation of Privilege (901190): A vulnerability has been discovered in the Microsoft Windows and Office Korean Input Method Editor. An attacker who could interactively log into a system could potentially exploit this vulnerability to take complete control of the affected system. The attacker must either be local, or the Remote Desktop Protocol (RDP) must be enabled on a system to exploit this vulnerability, this service, as well as the port it utilizes are both off by default. No Avaya System products ship with the Korean Input Method Editor installed, and are therefore not affected by this vulnerability. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2006-0008 to this issue.

MS06-010 Vulnerability in PowerPoint 2000 Could Allow Information Disclosure (889167): A vulnerability has been discovered in Microsoft Office PowerPoint 2000. An attacker could exploit this vulnerability to view files in the Temporary Internet Files Folder (TIFF) explicitly by name. This information could potentially be used to further compromise a system. No Avaya system products ship with Microsoft Office PowerPoint 2000, and are therefore not affected by this vulnerability. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2006-0004 to this issue.

5. Disclaimer:

ALL INFORMATION IS BELIEVED TO BE CORRECT AT THE TIME OF PUBLICATION AND IS PROVIDED "AS IS". AVAYA INC., ON BEHALF ITSELF AND ITS SUBSIDIARIES AND AFFILIATES (HEREINAFTER COLLECTIVELY REFERRED TO AS "AVAYA"), DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE AND FURTHERMORE, AVAYA MAKES NO REPRESENTATIONS OR WARRANTIES THAT THE STEPS RECOMMENDED WILL ELIMINATE SECURITY OR VIRUS THREATS TO CUSTOMERS' SYSTEMS. IN NO EVENT SHALL AVAYA BE LIABLE FOR ANY DAMAGES WHATSOEVER ARISING OUT OF OR IN CONNECTION WITH THE INFORMATION OR RECOMMENDED ACTIONS PROVIDED HEREIN, INCLUDING DIRECT, INDIRECT, CONSEQUENTIAL DAMAGES, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF AVAYA HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

THE INFORMATION PROVIDED HERE DOES NOT AFFECT THE SUPPORT AGREEMENTS IN PLACE FOR AVAYA PRODUCTS. SUPPORT FOR AVAYA PRODUCTS CONTINUES TO BE EXECUTED AS PER EXISTING AGREEMENTS WITH AVAYA.

6. Revision History:

V 1.0 - February 14, 2006 - Initial Statement issued.

Send information regarding any discovered security problems with Avaya products to either the contact noted in the product's documentation or securityalerts@avaya.com.

© 2005 Avaya Inc. All Rights Reserved. All trademarks identified by the ® or ™ are registered trademarks or trademarks, respectively, of Avaya Inc. All other trademarks are the property of their respective owners.