[BESAdmin-Announcements] [Patches for Windows (English)] Content Modification Announcement - MS09-003 Microsoft Exchange and MS09-045 Windows XP SP2/SP3

Announcements for BES Administrators besadmin-announcements at bigmail.bigfix.com
Fri Oct 9 11:04:45 PDT 2009


Bigfix has modified content in the Patches for Windows (English) / Enterprise Security Site. Microsoft has changed the binary used in the following Fixlet. The sha1 values have been changed to reflect this:

900309  MS09-003: Vulnerabilities in Microsoft Exchange Could Allow Remote Code Execution - Exchange Server MAPI Client and Collaboration Data Objects 1.2.1          Fixlet


The relevance in the following Fixlet messages have been modified to remove false negatives when a client has IE6 and XP SP3:

904505  MS09-045: Vulnerability in JScript Scripting Engine Could Allow Remote Code Execution - JScript 5.7 - Windows XP SP2/SP3               Fixlet
904506  MS09-045: Vulnerability in JScript Scripting Engine Could Allow Remote Code Execution - JScript 5.7 - Windows XP SP2/SP3 - CORRUPT PATCH         Fixlet

BES administrators are encouraged to verify open actions and BES administrators are encouraged to verify open actions and synchronize baselines that contain the modified content.  Instructions for synchronizing baselines can be found here: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=401.  Please contact BigFix Technical Support if you have any questions regarding this change.

--
BigFix Application Engineering Team
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://bigmail.bigfix.com/pipermail/besadmin-announcements/attachments/20091009/65897807/attachment.htm 


More information about the Besadmin-announcements mailing list