[BESAdmin-Announcements] [Patches for Windows (English)] Content Modification Announcement - MS09-003 Microsoft Exchange and MS09-045 Windows XP SP2/SP3
Announcements for BES Administrators
besadmin-announcements at bigmail.bigfix.com
Fri Oct 9 11:04:45 PDT 2009
Bigfix has modified content in the Patches for Windows (English) / Enterprise Security Site. Microsoft has changed the binary used in the following Fixlet. The sha1 values have been changed to reflect this:
900309 MS09-003: Vulnerabilities in Microsoft Exchange Could Allow Remote Code Execution - Exchange Server MAPI Client and Collaboration Data Objects 1.2.1 Fixlet
The relevance in the following Fixlet messages have been modified to remove false negatives when a client has IE6 and XP SP3:
904505 MS09-045: Vulnerability in JScript Scripting Engine Could Allow Remote Code Execution - JScript 5.7 - Windows XP SP2/SP3 Fixlet
904506 MS09-045: Vulnerability in JScript Scripting Engine Could Allow Remote Code Execution - JScript 5.7 - Windows XP SP2/SP3 - CORRUPT PATCH Fixlet
BES administrators are encouraged to verify open actions and BES administrators are encouraged to verify open actions and synchronize baselines that contain the modified content. Instructions for synchronizing baselines can be found here: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=401. Please contact BigFix Technical Support if you have any questions regarding this change.
--
BigFix Application Engineering Team
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://bigmail.bigfix.com/pipermail/besadmin-announcements/attachments/20091009/65897807/attachment.htm
More information about the Besadmin-announcements
mailing list