[BESAdmin-Announcements] Content Modification Announcement - Enterprise Security
Announcements for BES Administrators
besadmin-announcements at bigmail.bigfix.com
Mon Dec 18 15:21:03 PST 2006
Last Friday, the MS06-078 file check relevance for Windows XP SP2 was
modified to more precisely identify vulnerable versions of the file
"wmvcore.dll." Similar modifications have been made for some of the
other MS06-078 updates:
607801 MS06-078: Vulnerability in Windows Media Format Could Allow
Remote Code Execution - Windows 2000 SP4
607802 MS06-078: CORRUPT PATCH - Windows 2000 SP4
607809 MS06-078: Vulnerability in Windows Media Format Could Allow
Remote Code Execution - Windows Media Player 6.4
607810 MS06-078: CORRUPT PATCH - Windows Media Player 6.4
607811 MS06-078: Vulnerability in Windows Media Format Could Allow
Remote Code Execution - Windows Media Player 6.4 (x64)
607812 MS06-078: CORRUPT PATCH - Windows Media Player 6.4 (x64)
607815 MS06-078: Vulnerability in Windows Media Format Could Allow
Remote Code Execution - Windows Media Player 6.4 (x64) - BES < 6.0
607817 MS06-078: Vulnerability in Windows Media Format Could Allow
Remote Code Execution - Windows Media Format 9.5 Series Runtime x64
Edition (x64)
607818 MS06-078: CORRUPT PATCH - Windows Media Format 9.5 Series
Runtime x64 Edition (x64)
BES Administrators are encouraged to verify open actions involving this
update. Please contact BigFix Technical Support if you have any
questions regarding this change.
BigFix Product Team
Questions / Comments? Use the BigFix User Forum at
http://forum.bigfix.com <http://forum.bigfix.com> .
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://bigmail.bigfix.com/pipermail/besadmin-announcements/attachments/20061218/b263bd2d/attachment.htm
More information about the Besadmin-announcements
mailing list