[BESAdmin-Announcements] [Patches for Windows (English)] Content Modification Announcement - MS09-062, MS09-013, MS09-056
Announcements for BES Administrators
besadmin-announcements at bigmail.bigfix.com
Tue Nov 3 16:25:49 PST 2009
BigFix has modified content in the Patches for Windows (English) / Enterprise Security site:
1. The following fixlet's evaluation time has been adjusted to once every 24 hours:
ID: 906205 MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Windows Server 2003 SP2
ID: 906208 MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Windows Server 2003 SP2 - CORRUPT PATCH
ID: 906207 MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64)
ID: 906210 MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - CORRUPT PATCH
ID: 906213 MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Windows Server 2008
ID: 906215 MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Windows Server 2008 (x64)
ID: 906209 MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Windows Vista Gold/SP1
ID: 906211 MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Windows Vista Gold/SP1(x64)
ID: 906203 MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Windows XP SP2 (x64)
ID: 906204 MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Windows XP SP2 (x64) - CORRUPT PATCH
ID: 906201 MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Windows XP SP2/SP3
ID: 906202 MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Windows XP SP2/SP3 - CORRUPT PATCH
ID: 901309 MS09-013: Vulnerabilities in Windows HTTP Services Could Allow Remote Code Execution - Windows Server 2003 Gold/SP2 (x64)
ID: 901305 MS09-013: Vulnerabilities in Windows HTTP Services Could Allow Remote Code Execution - Windows XP Gold/SP2 (x64)
ID: 901307 MS09-013: Vulnerabilities in Windows HTTP Services Could Allow Remote Code Execution - Windows Server 2003 SP1/SP2
2. The following Fixlet descriptions have been updated to advise customers about known issues running this patch.
ID: 905623 MS09-056: Vulnerabilities in Windows CryptoAPI Could Allow Spoofing - Windows Server 2008 R2 (x64)
ID: 905621 MS09-056: Vulnerabilities in Windows CryptoAPI Could Allow Spoofing - Windows 7 (x64)
ID: 905619 MS09-056: Vulnerabilities in Windows CryptoAPI Could Allow Spoofing - Windows 7
ID: 905617 MS09-056: Vulnerabilities in Windows CryptoAPI Could Allow Spoofing - Windows Server 2008 Gold/SP2 (x64)
ID: 905615 MS09-056: Vulnerabilities in Windows CryptoAPI Could Allow Spoofing - Windows Server 2008 Gold/SP2
ID: 905613 MS09-056: Vulnerabilities in Windows CryptoAPI Could Allow Spoofing - Windows Vista Gold/SP1/SP2 (x64)
ID: 905611 MS09-056: Vulnerabilities in Windows CryptoAPI Could Allow Spoofing - Windows Vista Gold/SP1/SP2
ID: 905610 MS09-056: Vulnerabilities in Windows CryptoAPI Could Allow Spoofing - Windows Server 2003 SP2 (x64) - CORRUPT PATCH
ID: 905609 MS09-056: Vulnerabilities in Windows CryptoAPI Could Allow Spoofing - Windows Server 2003 SP2 (x64)
ID: 905608 MS09-056: Vulnerabilities in Windows CryptoAPI Could Allow Spoofing - Windows Server 2003 SP2 - CORRUPT PATCH
ID: 905607 MS09-056: Vulnerabilities in Windows CryptoAPI Could Allow Spoofing - Windows Server 2003 SP2
ID: 905606 MS09-056: Vulnerabilities in Windows CryptoAPI Could Allow Spoofing - Windows XP Pro SP2 (x64) - CORRUPT PATCH
ID: 905605 MS09-056: Vulnerabilities in Windows CryptoAPI Could Allow Spoofing - Windows XP Pro SP2 (x64)
ID: 905604 MS09-056: Vulnerabilities in Windows CryptoAPI Could Allow Spoofing - Windows XP SP2/SP3 - CORRUPT PATCH
ID: 905602 MS09-056: Vulnerabilities in Windows CryptoAPI Could Allow Spoofing - Windows 2000 SP4 - CORRUPT PATCH
ID: 905601 MS09-056: Vulnerabilities in Windows CryptoAPI Could Allow Spoofing - Windows 2000 SP4
ID: 905603 MS09-056: Vulnerabilities in Windows CryptoAPI Could Allow Spoofing - Windows XP SP2/SP3
Patches for Windows (English) / Enterprise Security published version: 1278
BES administrators are encouraged to verify open actions and synchronize baselines that contain the modified content. Instructions for synchronizing baselines can be found here: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=401. Please contact BigFix Technical Support if you have any questions regarding this change.
--
BigFix Application Engineering Team
More information about the Besadmin-announcements
mailing list