[BESAdmin-Announcements] Content Modification Announcement

Annoucements for BES Administrators besadmin-announcements at bigmail.bigfix.com
Wed Aug 9 14:01:14 PDT 2006


The relevance for several MS06-045 and MS06-049 Fixlet messages has been
modified in the "Enterprise Security" site. The original release of
MS06-045 verified the versions of all files updated by the patch,
including the files "W03a2409.dll" on Windows Server 2003 and
"Xpsp3res.dll" on Windows XP SP2. These DLL files are included only in
the "QFE" folders and not in the "GDR" folders within the update package
and thus will not be updated on all computers. The inclusion of these
files in the file check relevance causes the "CORRUPT PATCH" Fixlet
message to become relevant on some computers and subsequent actions will
report back "Failed" on these machines. These files have been removed
from the file check relevance, and affected clients should no longer
report relevant for the "CORRUPT PATCH" Fixlet messages. For more
information about Microsoft software update packages, see Microsoft
Knowledge Base article 824994: http://support.microsoft.com/kb/824994
<http://support.microsoft.com/kb/824994> 

 

In addition to the changes to MS06-045, the relevance for MS06-049 was
also modified. The original release of MS06-049 contained a file check
relevance that detected the versions of several files under the folder
"%WinDir%\ServicePackFiles\i386". Although the MS06-049 security patch
does update the files in this location, those files are not directly
used by the Windows kernel. The file check relevance has been modified
to correctly detect those files under the system folder instead. The
original file check relevance does contain detection for other files in
the correct location, so this change should not affect the number of
relevant computers for these Fixlet messages.

 

Affected Fixlet messages:

 

604503:  "MS06-045: Vulnerability in Windows Explorer Could Allow Remote
Code Execution - Windows Server 2003"

604504:  "MS06-045: CORRUPT PATCH - Windows Server 2003"

604505:  "MS06-045: Vulnerability in Windows Explorer Could Allow Remote
Code Execution - Windows XP SP1/SP2"

604506:  "MS06-045: CORRUPT PATCH - Windows XP SP1/SP2"

604507:  "MS06-045: Vulnerability in Windows Explorer Could Allow Remote
Code Execution - Windows XP/2003 (x64)"

604508:  "MS06-045: CORRUPT PATCH - Windows XP/2003 (x64)"

604509:  "MS06-045: Vulnerability in Windows Explorer Could Allow Remote
Code Execution - Windows XP/2003 (x64) - BES < 6.0"

604901:  "MS06-049: Vulnerability in Windows Kernel Could Result in
Elevation of Privilege - Windows 2000 SP4"

604902:  "MS06-049: CORRUPT PATCH - Windows 2000 SP4"

 

BES Administrators are encouraged to verify any open actions involving
these updates. Please contact BigFix Technical Support if you have any
questions regarding this change.

 

BigFix Product Team

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://bigmail.bigfix.com/pipermail/besadmin-announcements/attachments/20060809/c1844de4/attachment.htm 


More information about the Besadmin-announcements mailing list