[BESAdmin-Announcements] Content Modification Announcement - Enterprise Security - Minor Revisions to Security Bulletins

Announcements for BES Administrators besadmin-announcements at bigmail.bigfix.com
Thu Apr 10 10:59:00 PDT 2008


Microsoft has made several minor revisions to several Security
Bulletins.

1. Microsoft has made a minor revision to MS08-021. A known issues link
has been added to the security bulletin. The following content has been
modified:

ID: 802101      MS08-021: Vulnerabilities in GDI Could Allow Remote Code
Execution - Windows 2000 SP4
ID: 802102      MS08-021: CORRUPT PATCH - Windows 2000 SP4
ID: 802103      MS08-021: Vulnerabilities in GDI Could Allow Remote Code
Execution - Windows XP SP2
ID: 802104      MS08-021: CORRUPT PATCH - Windows XP SP2
ID: 802105      MS08-021: Vulnerabilities in GDI Could Allow Remote Code
Execution - Windows XP (x64)
ID: 802106      MS08-021: CORRUPT PATCH - Windows XP (x64)
ID: 802107      MS08-021: Vulnerabilities in GDI Could Allow Remote Code
Execution - Windows Server 2003 SP1/SP2
ID: 802108      MS08-021: CORRUPT PATCH - Windows Server 2003 SP1/SP2
ID: 802109      MS08-021: Vulnerabilities in GDI Could Allow Remote Code
Execution - Windows Server 2003 (x64)
ID: 802110      MS08-021: CORRUPT PATCH - Windows Server 2003 (x64)
ID: 802111      MS08-021: Vulnerabilities in GDI Could Allow Remote Code
Execution - Windows Vista Gold/SP1
ID: 802113      MS08-021: Vulnerabilities in GDI Could Allow Remote Code
Execution - Windows Vista (x64)
ID: 802115      MS08-021: Vulnerabilities in GDI Could Allow Remote Code
Execution - Windows Server 2008
ID: 802117      MS08-021: Vulnerabilities in GDI Could Allow Remote Code
Execution - Windows Server 2008 (x64)


2. Microsoft has made a minor revision to MS08-018. A known issues link
has been added to the security bulletin. The following content has been
modified:

ID: 801801      MS08-018: Vulnerability in Microsoft Project Could Allow
Remote Code Execution - Project 2000 SR-1
ID: 801811      MS08-018: Vulnerability in Microsoft Project Could Allow
Remote Code Execution - Project 2002 SP1
ID: 801821      MS08-018: Vulnerability in Microsoft Project Could Allow
Remote Code Execution - Project 2003 SP2


3. Microsoft has made a minor revision to MS08-015. A known issues link
has been added to the security bulletin. The following content has been
modified:

ID: 801501      MS08-015: Vulnerability in Microsoft Outlook Could Allow
Remote Code Execution - Outlook 2000 SP3 (Local Install)
ID: 801503      MS08-015: Vulnerability in Microsoft Outlook Could Allow
Remote Code Execution - Outlook 2000 SP3 - Windows NT/2000/XP 2003
(Network Install)
ID: 801505      MS08-015: Vulnerability in Microsoft Outlook Could Allow
Remote Code Execution - Outlook 2000 SP3 - Windows NT/2000/XP 2003
(Admin Install)
ID: 801507      MS08-015: Vulnerability in Microsoft Outlook Could Allow
Remote Code Execution - Outlook 2000 SP3 - Windows 9x/ME (Admin Install)
ID: 801509      MS08-015: Vulnerability in Microsoft Outlook Could Allow
Remote Code Execution - Outlook 2000 SP3 - Windows 9x/ME (Network
Install)
ID: 801511      MS08-015: Vulnerability in Microsoft Outlook Could Allow
Remote Code Execution - Outlook 2002 SP3 (Local/Network Install)
ID: 801515      MS08-015: Vulnerability in Microsoft Outlook Could Allow
Remote Code Execution - Outlook 2002 SP3 - Windows NT/2000/XP/2003
(Administrative Install)
ID: 801517      MS08-015: Vulnerability in Microsoft Outlook Could Allow
Remote Code Execution - Outlook 2002 SP3 - Windows 9x/ME (Administrative
Install)
ID: 801521      MS08-015: Vulnerability in Microsoft Outlook Could Allow
Remote Code Execution - Outlook 2003 SP2/SP3 (Local/Network Install)
ID: 801522      MS08-015: Vulnerability in Microsoft Outlook Could Allow
Remote Code Execution - Outlook 2003 SP2/SP3 (Administrative Install)
ID: 801531      MS08-015: Vulnerability in Microsoft Outlook Could Allow
Remote Code Execution - Outlook 2007


BES administrators are encouraged to verify open actions and synchronize
baselines that contain the modified content.  Instructions for
synchronizing baselines can be found here:
http://support.bigfix.com/cgi-bin/kbdirect.pl?id=401.  Please contact
BigFix Technical Support if you have any questions regarding this
change.

--
BigFix Product Team


-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://bigmail.bigfix.com/pipermail/besadmin-announcements/attachments/20080410/8ce31687/attachment.htm 


More information about the Besadmin-announcements mailing list