[BESAdmin-Announcements] Content Modification Announcement

besadmin-announcements at bigmail.bigfix.com besadmin-announcements at bigmail.bigfix.com
Tue Feb 14 23:18:55 PST 2006


A number of security updates have been superseded by new Microsoft Security
Bulletins published on February 14th. The corresponding content in the
"Enterprise Security" site have been modified accordingly.

 

Affected Fixlet messages:

 

500901: "MS05-009: Vulnerability in PNG Processing Could Allow Remote Code
Execution - Windows Media Player 9 Series"

500902: "MS05-009: CORRUPT PATCH - Windows Media Player 9 Series"

500909: "MS05-009: Vulnerability in PNG Processing Could Allow Remote Code
Execution - Windows Media Player 9 Series - Windows 98/ME"

500910: "MS05-009: CORRUPT PATCH - Windows Media Player 9 Series - Windows
98/ME"

501901: "MS05-019: Vulnerabilities in TCP/IP Could Allow Remote Code
Execution and Denial of Service - Windows Server 2003"

501902: "MS05-019: CORRUPT PATCH - Windows Server 2003"

501905: "MS05-019: Vulnerabilities in TCP/IP Could Allow Remote Code
Execution and Denial of Service - Windows XP"

501906: "MS05-019: CORRUPT PATCH - Windows XP"

501907: "MS05-019: REVISED PATCH - Windows XP"

501908: "MS05-019: REVISED PATCH - Windows Server 2003"

502801: "MS05-028: Vulnerability in Web Client Service Could Allow Remote
Code Execution - Windows Server 2003"

502802: "MS05-028: CORRUPT PATCH - Windows Server 2003"

502803: "MS05-028: Vulnerability in Web Client Service Could Allow Remote
Code Execution - Windows XP"

502804: "MS05-028: CORRUPT PATCH - Windows XP"

505401: "MS05-054: Cumulative Security Update for Internet Explorer - IE
5.01 - Windows 2000 SP4"

505402: "MS05-054: CORRUPT PATCH - IE 5.01 - Windows 2000 SP4"

690306: "MS06-003: Vulnerability in TNEF Decoding in Microsoft Outlook Could
Allow Remote Code Execution - Outlook 2003 Korean MUI (Network/Local
Install)"

 

In addition, the initial release of a few Fixlet messages for MS06-005
contained an action script mistake ("action requires restart" instead of
"action may require restart"). BES clients who have executed the initial
version of the action will report back as "Pending Restart" in the BES
Console even if the computer is not in a pending restart state. The content
was corrected within several hours of the initial release.

 

Affected Fixlet messages:

 

600503: "MS06-005: Vulnerability in Windows Media Player Could Allow Remote
Code Execution - Windows Media Player 9 - Windows 2000/XP/2003"

600504: "MS06-005: CORRUPT PATCH - Windows Media Player 9 - Windows
2000/XP/2003"

600505: "MS06-005: Vulnerability in Windows Media Player Could Allow Remote
Code Execution - Windows Media Player 10 - Windows XP SP1/SP2"

600506: "MS06-005: CORRUPT PATCH - Windows Media Player 10 - Windows XP
SP1/SP2"

 

BES administrators are encouraged to verify open policy actions that involve
these updates. If you have any questions regarding this change, please
contact BigFix Technical Support (enterprisesupport at bigfix.com).

BigFix Product Team

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://bigmail.bigfix.com/pipermail/besadmin-announcements/attachments/20060214/8012b521/attachment.html


More information about the Besadmin-announcements mailing list