[BESAdmin-Announcements] [Patches for Windows (English)] Content Modification Announcement - MS09-061, MS09-062
Announcements for BES Administrators
besadmin-announcements at bigmail.bigfix.com
Fri Oct 16 18:47:50 PDT 2009
Bigfix has modified content in the Patches for Windows (English) / Enterprise Security Site.
The following fixlets have modified detection for .NET framework for clarity:
ID: 906131 MS09-061: Vulnerabilities in the Microsoft .NET Common Language Runtime Could Allow Remote Code Execution - .NET Framework 2.0 - Windows Vista Gold
ID: 906103 MS09-061: Vulnerabilities in the Microsoft .NET Common Language Runtime Could Allow Remote Code Execution - .NET Framework 2.0 SP1/3.5 - Windows 2000 SP4 / XP SP2/SP3 / Server 2003 SP2
ID: 906104 MS09-061: Vulnerabilities in the Microsoft .NET Common Language Runtime Could Allow Remote Code Execution - .NET Framework 2.0 SP1/3.5 - Windows 2000 SP4 / XP SP2/SP3 / Server 2003 SP2 - CORRUPT PATCH
The following fixlets have modified relevance to eliminate false negatives in specific configurations of SQL Server 2005:
ID: 906295 MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - SQL Server 2005 SP2 - GDR Branch (x64)
ID: 906298 MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - SQL Server 2005 SP3 - GDR Branch (x64)
The following fixlet has modified relevance to eliminate false negatives:
ID: 906293 MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Visio 2002 SP2 (Local/Network Install)
The following fixlets have revised fixlet names for clarity:
ID: 906297 MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - SQL Server 2005 SP2 - GDR Branch
ID: 906299 MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - SQL Server 2005 SP3 - GDR Branch
ID: 9062127 MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - SQL Server 2005 SP3 - QFE Branch (x64)
ID: 9062128 MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - SQL Server 2005 SP3 - QFE Branch
Patches for Windows (English) / Enterprise Security published version: 1268
BES administrators are encouraged to verify open actions and synchronize baselines that contain the modified content. Instructions for synchronizing baselines can be found here: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=401. Please contact BigFix Technical Support if you have any questions regarding this change.
--
BigFix Application Engineering Team
More information about the Besadmin-announcements
mailing list