[BESAdmin-Announcements] Content Modification Announcement - Enterprise Security
Announcements for BES Administrators
besadmin-announcements at bigmail.bigfix.com
Wed Aug 15 18:41:25 PDT 2007
1. Microsoft released 9 bulletins and re-released 1 bulletin on Tuesday.
Several sets of updates have been replaced by the newly released and
re-released bulletins. Affected content has been modified accordingly:
Completely superseded by the re-release of MS07-038: 703801, 703802
Completely superseded by MS07-042: 606105, 606106, 606109, 606114,
606116, 606117, 606118
Completely superseded by MS07-044: 703601, 703602, 703603, 703604,
703605, 703606, 703607, 703609, 703610, 703613, 703614, 703615
Completely superseded by MS07-045: 703301, 703303, 703304, 703305,
703306, 703307, 703308, 703309, 703310, 703311, 703312, 703313, 703314,
703315, 703319, 703320, 703321, 703322
Completely superseded by MS07-047: 602403, 602404, 602407, 602408,
602411, 602412
Completely superseded by MS07-050: 700401, 700402, 700405, 700406,
700407, 700408, 700409, 700410, 700413, 700414, 700415, 700416
Partially superseded by MS07-042: 606103, 606104, 606107, 606108,
607101, 607102, 607104, 607105
Partially superseded by MS07-044: 602405, 602406, 602409, 602410
Partially superseded by MS07-050: 700411, 700412, 700417, 700418
2. Microsoft has removed patches for security bulletin MS01-015 from the
Microsoft Download Center. Fixlet content has been modified accordingly.
Affected Fixlet message:
ID101501: MS01-015: Windows Script Host 5.1 Vulnerability for Windows
2000
ID101502: MS01-015: Windows Script Host 5.5 Vulnerability for Windows
2000
ID101503: MS01-015: Windows Script Host 5.1 Vulnerability for Windows NT
and 9x
ID101504: MS01-015: Windows Script Host 5.5 Vulnerability for Windows NT
and 9x
3. Microsoft has revised MS07-042 and corrected file manifest
information for Microsoft XML Core Services 4.0. Fixlet content has been
modified accordingly.
Affected Fixlet message:
ID704231 MS07-042: Vulnerability in Microsoft XML Core Services Could
Allow Remote Code Execution - XML Core Services 4.0 SP2
ID704233 MS07-042: Vulnerability in Microsoft XML Core Services Could
Allow Remote Code Execution - XML Core Services 4.0 SP2 (x64)
4. There are several registry key verification discrepancies between
what is stated on MS bulletins and what is actually updated by the
patch. BigFix has modified MS07-045 and MS07-047 content to use the
registry key information provided by the actual patches.
Affected Fixlet message:
ID704511 MS07-045: Cumulative Security Update for Internet Explorer - IE
7 - Windows Server 2003 SP1/SP2
ID704512 MS07-045: CORRUPT PATCH - IE 7 - Windows Server 2003 SP1/SP2
ID704701 MS07-047: Vulnerabilities in Windows Media Player Could Allow
Remote Code Execution - Windows Media Player 9 - Windows 2000/XP
ID704702 MS07-047: CORRUPT PATCH - Windows Media Player 9 - Windows
2000/XP
ID704703 MS07-047: Vulnerabilities in Windows Media Player Could Allow
Remote Code Execution - Windows Media Player 7.1 - Windows 2000 SP4
ID704704 MS07-047: CORRUPT PATCH - Windows Media Player 7.1 - Windows
2000 SP4
ID704713 MS07-047: Vulnerabilities in Windows Media Player Could Allow
Remote Code Execution - Windows Media Player 10 - Windows XP/2003 (x64)
ID704714 MS07-047: CORRUPT PATCH - Windows Media Player 10 - Windows
XP/2003 (x64)
ID704717 MS07-047: Vulnerabilities in Windows Media Player Could Allow
Remote Code Execution - Windows Media Player 11 - Windows XP (x64)
ID704718 MS07-047: CORRUPT PATCH - Windows Media Player 11 - Windows XP
(x64)
5. BigFix has corrected the registry key verification information for
security bulletin MS07-045, IE 6 for Windows Server 2003.
Affected Fixlet message:
ID704507 MS07-045: Cumulative Security Update for Internet Explorer - IE
6 - Windows Server 2003 SP1/SP2
ID704508 MS07-045: CORRUPT PATCH - IE 6 - Windows Server 2003 SP1/SP2
BES administrators are encouraged to verify open actions and synchronize
baselines that contain the modified content. Instructions for
synchronizing baselines can be found here:
http://support.bigfix.com/cgi-bin/kbdirect.pl?id=401. Please contact
BigFix Technical Support if you have any questions regarding this
change.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://bigmail.bigfix.com/pipermail/besadmin-announcements/attachments/20070815/f4be3cad/attachment.htm
More information about the Besadmin-announcements
mailing list