[BESAdmin-Announcements] Content Modification Announcement - Patches for Windows (English) / Enterprise Security - MS08-075 (Vista x64)
Announcements for BES Administrators
besadmin-announcements at bigmail.bigfix.com
Thu Dec 11 11:13:56 PST 2008
BigFix has modified content in the Patches for Windows (English) /
Enterprise Security site. Three sets of content have been modified:
1. The relevance for a has been modified in the following MS08-075
Fixlet message to reflect that some files, contrary to Microsoft's
documentation, are not updated by the patch:
ID: 807505 MS08-075: Vulnerabilities in Windows Search Could Allow
Remote Code Execution - Windows Search - Windows Vista (x64)
2. Microsoft has made a major revision to MS08-052 by adding several
entries to the affected software table. The following Fixlet messages
have been added:
ID: 805293 MS08-052: Vulnerabilities in GDI+ Could Allow Remote
Code Execution - Compatibility Pack for Word, Excel, and PowerPoint 2007
File Formats Gold/SP1
ID: 805295 MS08-052: Vulnerabilities in GDI+ Could Allow Remote
Code Execution - Expression Web 1, 2
ID: 805297 MS08-052: Vulnerabilities in GDI+ Could Allow Remote
Code Execution - Groove 2007 Gold/SP1
3. Microsoft has made a major revision to MS08-076. References to
Windows Media Format Runtime 11 on Windows XP (x64) and Windows Server
2003 (x64) were erroneous and have been removed. The following Fixlets
have been modified correspondingly:
ID: 807617 MS08-076: Vulnerabilities in Windows Media Components
Could Allow Remote Code Execution - Windows Media Format Runtime 9.5 -
Windows XP Gold/SP2 (x64)
ID: 807618 MS08-076: Vulnerabilities in Windows Media Components
Could Allow Remote Code Execution - Windows Media Format Runtime 9.5 -
Windows XP Gold/SP2 (x64) - CORRUPT PATCH
BES administrators are encouraged to verify open actions and synchronize
baselines that contain the modified content. Instructions for
synchronizing baselines can be found here:
http://support.bigfix.com/cgi-bin/kbdirect.pl?id=401. Please contact
BigFix Technical Support if you have any questions regarding this
change.
--
BigFix Application Engineering Team
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://bigmail.bigfix.com/pipermail/besadmin-announcements/attachments/20081211/bfe81e3a/attachment.htm
More information about the Besadmin-announcements
mailing list