020878-01

5

Click here to load reader

Transcript of 020878-01

Page 1: 020878-01

BULLETIN ID: 2006007061, Rev 1PUBLISHED: 2006-06-18

STATUS: RetiredREGION: All

PRIORITY: CriticalTYPE: Bulletin

Background:

Before taking any action please ensure that you are viewing the latest official version of this security advisory byreferencing http://www.nortel.com/securityadvisories

============= Source =============

On - Microsoft issued Security Bulletin MS06-023 addressing "Vulnerability in Microsoft JScript Could Allow Remote CodeExecution (917344)". Some Nortel products are potentially affected by this issue.

=============== Overview ===============

Microsoft Bulletin MS06-023 is available at: http://www.microsoft.com/technet/security/Bulletin/MS06-023.mspx

Impact of Vulnerability: Remote Code Execution.

Description: There is a remote code execution vulnerability in JScript. An attacker could exploit the vulnerability byconstructing specially crafted JScript that could potentially allow remote code execution if a user visited a Web site orviewed a specially crafted e-mail message. An attacker who successfully exploited this vulnerability could take completecontrol of an affected system.

Security Update Replacement: This bulletin replaces a prior security update. Please refer to the Microsoft link above foradditional information.

Analysis:

================================= Affected Products and Releases =================================

The following Nortel Generally Available products are potentially vulnerable to the security issue outlined in MicrosoftSecurity Bulletin MS06-023. Please follow Microsoft's recommendation and instruction for installing the Security Update:

.>TECHNICAL SUPPORT. SECURITY ADVISORY BULLETIN.

.Nortel Response to Microsoft Security Bulletin MS06-023

Page 2: 020878-01

CallPilot - 1002rp, 200i, 201i, 702t, 703t. CallPilot releases 1.07, 2.x, 3 and 4 are affected. Testing is in progress. See revised bulletin

P-2006-0011-Global-Rev5_CallPilot Server Security Update for instructions.

CICM. This potential vulnerability affects both the CICM and CICM-EM. Please refer to the CICM product specific bulletin for

further information.

Contact Center - Multimedia. Apply hotfix.

Contact Center - Symposium Agent. Apply hotfix (product had been Manufacturing Discontinued).

The following Nortel Generally Available products are potentially vulnerable to the security issue outlined in MicrosoftSecurity Bulletin MS06-023 in that, while there is no direct dependency with the Nortel product, the affected component isa base component of Windows/OS. Please follow Microsoft's recommendation and instruction for installing the SecurityUpdate:

Contact Center - CCMS

Enterprise NMS

IP Softphone 2050

MCS5100, MCS5200

Self-Service - CCXML, Media Processing Svr 100, Media Processing Svr 500, Media Processing Svr 1000, PeriApplication, Speech Servce, VoiceXML, WVADS

TM-CS1000. Optivity Telephony Manager Version 2.20.78 with Service Update 4 installed (TM).

The following Nortel Generally Available products are not vulnerable to the security issue outlined in the MicrosoftSecurity Bulletin MS06-023:

Contact Center - CCMA, CCMS, Contact Center - Express, NCC. No dependency. IE should not be run on CCMS server.

Contact Center CCT, CallPilot 1001rp. No dependency. IE should not be run on CCT server.

Contact Center - TAPI Server. No dependency. IE should not be run on TAPI SP server (product had been Manufacturing Discontinued).

Enterprise Policy Manager. Not EPM application specific.

IP Address Manager. The component mentioned in the Microsoft Security Bulletin is not used or incorporated in the Nortel product.

Meridian - CS 2100-Compact, CS 2100. The Communication Server 2100 Compact and Communication Server 2100 are Linux based solutions therefore not

vulnerable to Microsoft based vulnerabilities.

Meridian SL100

NORTEL RESPONSE TO MICROSOFT SECURITY BULLETIN MS06-023 2006007061, REV 1

Page: 2 of 5

Page 3: 020878-01

. The Meridian SL-100 platform is not vulnerable to Microsoft specific vulnerabilities . It does not contain anycomponents of Microsoft operating systems nor can any Microsoft software be installed on this platform.

Sun Platform-MCS5100. Software has been disabled or ports have been masked.

VPN Client

The following Nortel Generally Available products have not yet completed investigation to determine Vulnerability Statusrelative to the security issues outlined in Microsoft Security Bulletin MS06-023 It is not recommended to apply securityupdate until investigation is complete, and vulnerability known. Upon completion of investigation, an up-issue ofTechnical Bulletin / Security Advisory will be released:

MDMW-NMS-CNM, W-NMS-UMTS

Recommendations:Prevention and mitigation recommendations may differ depending on the Nortel product. Please see the Analysis sectionfor a detailed overview and breakdown per product.

Required Actions:Resolution is provided in the Microsoft Security Update, please see the Analysis section for a product breakdown todetermine if any action is required.

Attachments:There are no attachments for this bulletin

Footer Information:

Retirement Reason:This multi-product consolidated response bulletin has exceeded it's planned active period and is no longer needed.

For Additional Information:For more information please contact your next level of support or visit http://www.nortel.com/contact for support numberswithin your region.

Nortel security advisories: http://nortel.com/securityadvisoriesNortel Partner Information Center (PIC) website: http://www.nortelnetworks.com/pic

Products and Releases:The information in this bulletin is intended to be used with the following products and associated releases:

PRODUCT RELEASE

CDMA-Network Management-W-NMS-CNM

CICM-CICM-CICM

CallPilot-CallPilot-CallPilot 1001rp

CallPilot-CallPilot-CallPilot 1002rp

CallPilot-CallPilot-CallPilot 200i

CallPilot-CallPilot-CallPilot 201i

CallPilot-CallPilot-CallPilot 702t

NORTEL RESPONSE TO MICROSOFT SECURITY BULLETIN MS06-023 2006007061, REV 1

Page: 3 of 5

Page 4: 020878-01

CallPilot-CallPilot-CallPilot 703t

Contact Center-Administration-CCMA

Contact Center-Manager-CCMS

Contact Center-CTI-CCT

Contact Center-Manager-Contact Center - Express

Contact Center-Multimedia-Contact Center - Multimedia

Contact Center-Manager-NCC

Contact Center-CTI-Symposium Agent

Contact Center-CTI-TAPI Server

ENSM-NMS-Enterprise NMS

ENSM-Policy Services-Enterprise Policy Manager

ENSM-IP Address Manager-IP Address Manager

Enterprise VoIP-Applications-TM-CS1000

Meridian-SL100-CS 2100

Meridian-SL100-CS 2100-Compact

Meridian-SL100-SL100

Multimedia Comm.-MCS5100-MCS5100

Multimedia Comm.-MCS5200-MCS5200

Multimedia Comm.-OEM-Sun Platform-MCS5100

Multiservice Switch-Network Management-MDM

Phones & Accessories-IP-IP Softphone 2050

Self-Service-Web Centric Self-Svc-CCXML

Self-Service-Media Processing Svr-Media Processing Svr 100

Self-Service-Media Processing Svr-Media Processing Svr 1000

Self-Service-Media Processing Svr-Media Processing Svr 500

Self-Service-Self-Service-Peri Application

Self-Service-Self-Service-Speech Server

Self-Service-Web Centric Self-Svc-VoiceXML

Self-Service-Web Centric Self-Svc-WVADS

UMTS-Network Management-W-NMS-UMTS

VPN Router-Client-VPN Client

To view the most recent version of this bulletin, access technical documentation, searchour knowledge base, or to contact a Technical Support Representative, please visitNortel Technical Support on the web at: http://support.nortel.com/. You may also signup to receive automatic email alerts when new bulletins are published.

REFERENCE: MS06-023PRE-REQUIRED PATCH:

PATCH ID:

Copyright 2007 Nortel Networks. All rights reserved. Information in this document is subject to change without notice. Nortel assumes no responsibilityfor any errors that may appear in this document. The information in this document is proprietary to Nortel Networks.

Nortel recommends any maintenance activities, such as those outlined in this bulletin, be completed during a local maintenance window.

NORTEL RESPONSE TO MICROSOFT SECURITY BULLETIN MS06-023 2006007061, REV 1

Page: 4 of 5

Page 5: 020878-01

Nortel, the Nortel logo, and the Globemark design are trademarks of Nortel Networks. All other trademarks are the property of their respective owners.

NORTEL RESPONSE TO MICROSOFT SECURITY BULLETIN MS06-023 2006007061, REV 1

Page: 5 of 5