[BESAdmin-Announcements] Content Modification Announcement - Enterprise Security - Minor Revisions to Security Bulletins
Announcements for BES Administrators
besadmin-announcements at bigmail.bigfix.com
Thu Apr 10 10:59:00 PDT 2008
Microsoft has made several minor revisions to several Security
Bulletins.
1. Microsoft has made a minor revision to MS08-021. A known issues link
has been added to the security bulletin. The following content has been
modified:
ID: 802101 MS08-021: Vulnerabilities in GDI Could Allow Remote Code
Execution - Windows 2000 SP4
ID: 802102 MS08-021: CORRUPT PATCH - Windows 2000 SP4
ID: 802103 MS08-021: Vulnerabilities in GDI Could Allow Remote Code
Execution - Windows XP SP2
ID: 802104 MS08-021: CORRUPT PATCH - Windows XP SP2
ID: 802105 MS08-021: Vulnerabilities in GDI Could Allow Remote Code
Execution - Windows XP (x64)
ID: 802106 MS08-021: CORRUPT PATCH - Windows XP (x64)
ID: 802107 MS08-021: Vulnerabilities in GDI Could Allow Remote Code
Execution - Windows Server 2003 SP1/SP2
ID: 802108 MS08-021: CORRUPT PATCH - Windows Server 2003 SP1/SP2
ID: 802109 MS08-021: Vulnerabilities in GDI Could Allow Remote Code
Execution - Windows Server 2003 (x64)
ID: 802110 MS08-021: CORRUPT PATCH - Windows Server 2003 (x64)
ID: 802111 MS08-021: Vulnerabilities in GDI Could Allow Remote Code
Execution - Windows Vista Gold/SP1
ID: 802113 MS08-021: Vulnerabilities in GDI Could Allow Remote Code
Execution - Windows Vista (x64)
ID: 802115 MS08-021: Vulnerabilities in GDI Could Allow Remote Code
Execution - Windows Server 2008
ID: 802117 MS08-021: Vulnerabilities in GDI Could Allow Remote Code
Execution - Windows Server 2008 (x64)
2. Microsoft has made a minor revision to MS08-018. A known issues link
has been added to the security bulletin. The following content has been
modified:
ID: 801801 MS08-018: Vulnerability in Microsoft Project Could Allow
Remote Code Execution - Project 2000 SR-1
ID: 801811 MS08-018: Vulnerability in Microsoft Project Could Allow
Remote Code Execution - Project 2002 SP1
ID: 801821 MS08-018: Vulnerability in Microsoft Project Could Allow
Remote Code Execution - Project 2003 SP2
3. Microsoft has made a minor revision to MS08-015. A known issues link
has been added to the security bulletin. The following content has been
modified:
ID: 801501 MS08-015: Vulnerability in Microsoft Outlook Could Allow
Remote Code Execution - Outlook 2000 SP3 (Local Install)
ID: 801503 MS08-015: Vulnerability in Microsoft Outlook Could Allow
Remote Code Execution - Outlook 2000 SP3 - Windows NT/2000/XP 2003
(Network Install)
ID: 801505 MS08-015: Vulnerability in Microsoft Outlook Could Allow
Remote Code Execution - Outlook 2000 SP3 - Windows NT/2000/XP 2003
(Admin Install)
ID: 801507 MS08-015: Vulnerability in Microsoft Outlook Could Allow
Remote Code Execution - Outlook 2000 SP3 - Windows 9x/ME (Admin Install)
ID: 801509 MS08-015: Vulnerability in Microsoft Outlook Could Allow
Remote Code Execution - Outlook 2000 SP3 - Windows 9x/ME (Network
Install)
ID: 801511 MS08-015: Vulnerability in Microsoft Outlook Could Allow
Remote Code Execution - Outlook 2002 SP3 (Local/Network Install)
ID: 801515 MS08-015: Vulnerability in Microsoft Outlook Could Allow
Remote Code Execution - Outlook 2002 SP3 - Windows NT/2000/XP/2003
(Administrative Install)
ID: 801517 MS08-015: Vulnerability in Microsoft Outlook Could Allow
Remote Code Execution - Outlook 2002 SP3 - Windows 9x/ME (Administrative
Install)
ID: 801521 MS08-015: Vulnerability in Microsoft Outlook Could Allow
Remote Code Execution - Outlook 2003 SP2/SP3 (Local/Network Install)
ID: 801522 MS08-015: Vulnerability in Microsoft Outlook Could Allow
Remote Code Execution - Outlook 2003 SP2/SP3 (Administrative Install)
ID: 801531 MS08-015: Vulnerability in Microsoft Outlook Could Allow
Remote Code Execution - Outlook 2007
BES administrators are encouraged to verify open actions and synchronize
baselines that contain the modified content. Instructions for
synchronizing baselines can be found here:
http://support.bigfix.com/cgi-bin/kbdirect.pl?id=401. Please contact
BigFix Technical Support if you have any questions regarding this
change.
--
BigFix Product Team
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://bigmail.bigfix.com/pipermail/besadmin-announcements/attachments/20080410/8ce31687/attachment.htm
More information about the Besadmin-announcements
mailing list