[BESAdmin-Announcements] Content Modification Announcement - Enterprise Security

Announcements for BES Administrators besadmin-announcements at bigmail.bigfix.com
Mon Dec 18 15:21:03 PST 2006


Last Friday, the MS06-078 file check relevance for Windows XP SP2 was
modified to more precisely identify vulnerable versions of the file
"wmvcore.dll."  Similar modifications have been made for some of the
other MS06-078 updates:

 

607801  MS06-078: Vulnerability in Windows Media Format Could Allow
Remote Code Execution - Windows 2000 SP4

607802  MS06-078: CORRUPT PATCH - Windows 2000 SP4

607809  MS06-078: Vulnerability in Windows Media Format Could Allow
Remote Code Execution - Windows Media Player 6.4

607810  MS06-078: CORRUPT PATCH - Windows Media Player 6.4

607811  MS06-078: Vulnerability in Windows Media Format Could Allow
Remote Code Execution - Windows Media Player 6.4 (x64)

607812  MS06-078: CORRUPT PATCH - Windows Media Player 6.4 (x64)

607815  MS06-078: Vulnerability in Windows Media Format Could Allow
Remote Code Execution - Windows Media Player 6.4 (x64) - BES < 6.0

607817  MS06-078: Vulnerability in Windows Media Format Could Allow
Remote Code Execution - Windows Media Format 9.5 Series Runtime x64
Edition (x64)

607818  MS06-078: CORRUPT PATCH - Windows Media Format 9.5 Series
Runtime x64 Edition (x64)

 

BES Administrators are encouraged to verify open actions involving this
update.  Please contact BigFix Technical Support if you have any
questions regarding this change.

 

BigFix Product Team

 

Questions / Comments? Use the BigFix User Forum at
http://forum.bigfix.com <http://forum.bigfix.com> .

 

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://bigmail.bigfix.com/pipermail/besadmin-announcements/attachments/20061218/b263bd2d/attachment.htm 


More information about the Besadmin-announcements mailing list