[BESAdmin-Announcements] Content Modification Announcement - Enterprise Security

Announcements for BES Administrators besadmin-announcements at bigmail.bigfix.com
Wed Aug 15 18:41:25 PDT 2007


1. Microsoft released 9 bulletins and re-released 1 bulletin on Tuesday.
Several sets of updates have been replaced by the newly released and
re-released bulletins. Affected content has been modified accordingly:

 

Completely superseded by the re-release of MS07-038: 703801, 703802

 

Completely superseded by MS07-042: 606105, 606106, 606109, 606114,
606116, 606117, 606118

Completely superseded by MS07-044: 703601, 703602, 703603, 703604,
703605, 703606, 703607, 703609, 703610, 703613, 703614, 703615

Completely superseded by MS07-045: 703301, 703303, 703304, 703305,
703306, 703307, 703308, 703309, 703310, 703311, 703312, 703313, 703314,
703315, 703319, 703320, 703321, 703322

Completely superseded by MS07-047: 602403, 602404, 602407, 602408,
602411, 602412

Completely superseded by MS07-050: 700401, 700402, 700405, 700406,
700407, 700408, 700409, 700410, 700413, 700414, 700415, 700416

 

Partially superseded by MS07-042: 606103, 606104, 606107, 606108,
607101, 607102, 607104, 607105

Partially superseded by MS07-044: 602405, 602406, 602409, 602410

Partially superseded by MS07-050: 700411, 700412, 700417, 700418

 

2. Microsoft has removed patches for security bulletin MS01-015 from the
Microsoft Download Center. Fixlet content has been modified accordingly.


 

Affected Fixlet message: 

ID101501: MS01-015: Windows Script Host 5.1 Vulnerability for Windows
2000

ID101502: MS01-015: Windows Script Host 5.5 Vulnerability for Windows
2000

ID101503: MS01-015: Windows Script Host 5.1 Vulnerability for Windows NT
and 9x

ID101504: MS01-015: Windows Script Host 5.5 Vulnerability for Windows NT
and 9x

 

3. Microsoft has revised MS07-042 and corrected file manifest
information for Microsoft XML Core Services 4.0. Fixlet content has been
modified accordingly.

 

Affected Fixlet message: 

ID704231 MS07-042: Vulnerability in Microsoft XML Core Services Could
Allow Remote Code Execution - XML Core Services 4.0 SP2


ID704233 MS07-042: Vulnerability in Microsoft XML Core Services Could
Allow Remote Code Execution - XML Core Services 4.0 SP2 (x64)


 


4. There are several registry key verification discrepancies between
what is stated on MS bulletins and what is actually updated by the
patch. BigFix has modified MS07-045 and MS07-047 content to use the
registry key information provided by the actual patches.

 

Affected Fixlet message: 

ID704511 MS07-045: Cumulative Security Update for Internet Explorer - IE
7 - Windows Server 2003 SP1/SP2


ID704512 MS07-045: CORRUPT PATCH - IE 7 - Windows Server 2003 SP1/SP2

 

ID704701 MS07-047: Vulnerabilities in Windows Media Player Could Allow
Remote Code Execution - Windows Media Player 9 - Windows 2000/XP

ID704702 MS07-047: CORRUPT PATCH - Windows Media Player 9 - Windows
2000/XP

ID704703 MS07-047: Vulnerabilities in Windows Media Player Could Allow
Remote Code Execution - Windows Media Player 7.1 - Windows 2000 SP4

ID704704 MS07-047: CORRUPT PATCH - Windows Media Player 7.1 - Windows
2000 SP4

ID704713 MS07-047: Vulnerabilities in Windows Media Player Could Allow
Remote Code Execution - Windows Media Player 10 - Windows XP/2003 (x64)


ID704714 MS07-047: CORRUPT PATCH - Windows Media Player 10 - Windows
XP/2003 (x64)   

ID704717 MS07-047: Vulnerabilities in Windows Media Player Could Allow
Remote Code Execution - Windows Media Player 11 - Windows XP (x64) 

ID704718 MS07-047: CORRUPT PATCH - Windows Media Player 11 - Windows XP
(x64)

 

5. BigFix has corrected the registry key verification information for
security bulletin MS07-045, IE 6 for Windows Server 2003.

 

Affected Fixlet message: 

ID704507 MS07-045: Cumulative Security Update for Internet Explorer - IE
6 - Windows Server 2003 SP1/SP2                  

ID704508 MS07-045: CORRUPT PATCH - IE 6 - Windows Server 2003 SP1/SP2

 

 

BES administrators are encouraged to verify open actions and synchronize
baselines that contain the modified content.  Instructions for
synchronizing baselines can be found here:
http://support.bigfix.com/cgi-bin/kbdirect.pl?id=401.  Please contact
BigFix Technical Support if you have any questions regarding this
change.

 

 

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://bigmail.bigfix.com/pipermail/besadmin-announcements/attachments/20070815/f4be3cad/attachment.htm 


More information about the Besadmin-announcements mailing list