[BESAdmin-Announcements] Content Modification in Patches for Windows (English)
Announcements for BES Administrators
besadmin-announcements at bigmail.bigfix.com
Mon Jun 27 11:18:30 PDT 2011
Content in the Patches for Windows (English) Fixlet Site has been
modified.
Modified Fixlets:
MS10-031: Vulnerability in Microsoft Visual Basic for Applications Could
Allow Remote Code Execution - Microsoft VBA (ID: 1003105)
MS10-039: Vulnerabilities in Microsoft SharePoint Could Allow Elevation of
Privilege - Office InfoPath 2007 SP1/SP2 (ID: 1003906)
MS11-043: Vulnerability in SMB Client Could Allow Remote Code Execution -
Windows XP SP3 (ID: 1104301)
MS11-043: Vulnerability in SMB Client Could Allow Remote Code Execution -
Windows XP SP3 - CORRUPT PATCH (ID: 1104302)
MS11-043: Vulnerability in SMB Client Could Allow Remote Code Execution -
Windows XP SP2 (x64) (ID: 1104303)
MS11-043: Vulnerability in SMB Client Could Allow Remote Code Execution -
Windows XP SP2 (x64) - CORRUPT PATCH (ID: 1104304)
MS11-043: Vulnerability in SMB Client Could Allow Remote Code Execution -
Windows Server 2003 SP2 (ID: 1104305)
MS11-043: Vulnerability in SMB Client Could Allow Remote Code Execution -
Windows Server 2003 SP2 - CORRUPT PATCH (ID: 1104306)
MS11-043: Vulnerability in SMB Client Could Allow Remote Code Execution -
Windows Server 2003 SP2 (x64) (ID: 1104307)
MS11-043: Vulnerability in SMB Client Could Allow Remote Code Execution -
Windows Server 2003 SP2 (x64) - CORRUPT PATCH (ID: 1104308)
MS11-043: Vulnerability in SMB Client Could Allow Remote Code Execution -
Windows Vista SP1/SP2 (ID: 1104309)
MS11-043: Vulnerability in SMB Client Could Allow Remote Code Execution -
Windows Vista SP1/SP2 (x64) (ID: 1104311)
MS11-043: Vulnerability in SMB Client Could Allow Remote Code Execution -
Windows Server 2008 Gold/SP2 (ID: 1104313)
MS11-043: Vulnerability in SMB Client Could Allow Remote Code Execution -
Windows Server 2008 Gold/SP2 (x64) (ID: 1104315)
MS11-043: Vulnerability in SMB Client Could Allow Remote Code Execution -
Windows 7 Gold/SP1 (ID: 1104317)
MS11-043: Vulnerability in SMB Client Could Allow Remote Code Execution -
Windows 7 Gold/SP1 (x64) (ID: 1104319)
MS11-043: Vulnerability in SMB Client Could Allow Remote Code Execution -
Windows Server 2008 R2 Gold/SP1 (x64) (ID: 1104321)
MS11-045: Vulnerabilities in Microsoft Excel Could Allow Remote Code
Execution - Microsoft Excel 2002 SP3 - Office XP SP3 (Local/Network
Installation) (ID: 1104501)
MS11-045: Vulnerabilities in Microsoft Excel Could Allow Remote Code
Execution - Microsoft Excel 2002 SP3 - Office XP SP3 (Administrative
Installation) (ID: 1104503)
MS11-045: Vulnerabilities in Microsoft Excel Could Allow Remote Code
Execution - Microsoft Excel 2003 SP3 - Office 2003 SP3 (Local/Network
Installation) (ID: 1104506)
MS11-045: Vulnerabilities in Microsoft Excel Could Allow Remote Code
Execution - Microsoft Excel 2003 SP3 - Office 2003 SP3 (Administrative
Installation) (ID: 1104508)
MS11-049: Vulnerability in the Microsoft XML Editor Could Allow
Information Disclosure - SQL Server 2008 R2 - QFE Branch (ID: 1104941)
MS11-049: Vulnerability in the Microsoft XML Editor Could Allow
Information Disclosure - SQL Server 2008 R2 - QFE Branch (x64) (ID:
1104945)
MS11-049: Vulnerability in the Microsoft XML Editor Could Allow
Information Disclosure - SQL Server 2008 R2 - GDR Branch (x64) (ID:
1104947)
Reason for Update:
Fixlets 1003105, 1104941, 1104945, and 1104947 have had their actions
removed as these are audit fixlets and should not have had an action.
Fixlet 1003906 has had it's incorrect partial supersedence undone.
MS11-043 has had a known issues note added and MS11-045 has had minor text
changes in the titles of the fixlets.
Actions to Take:
None
Published site version:
Patches for Windows (English), version 1498
Additional links:
None
Application Engineering Team
Tivoli Endpoint Manager
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://bigmail.bigfix.com/pipermail/besadmin-announcements/attachments/20110627/8c6294b8/attachment.htm
More information about the Besadmin-announcements
mailing list