[BESAdmin-Announcements] Content Released in Patches for Windows (English) - January 2012 Security Bulletins - 2 of 2 Publishings

Announcements for BES Administrators besadmin-announcements at bigmail.bigfix.com
Wed Jan 11 00:16:59 PST 2012


Content in the Patches for Windows (English) Fixlet Site has been released.



New Fixlet Messages:

Fixlet messages for Microsoft Security Bulletins:
      MS12-001*
      MS12-002*
      MS12-003*
      MS12-004*
      MS12-005*
      MS12-006*
      MS12-007

* This is publication 2 of 2. The noted bulletins are included in the first
publishing. This publishing contains the localization for all the
bulletins.


Partially Superseded Fixlets:

MS10-085: Vulnerability in SChannel Could Allow Denial of Service - Windows
Vista SP1    (ID: 1008501)
MS10-085: Vulnerability in SChannel Could Allow Denial of Service - Windows
Vista SP1 (x64)    (ID: 1008503)
MS10-085: Vulnerability in SChannel Could Allow Denial of Service - Windows
Server 2008 Gold    (ID: 1008505)
MS10-085: Vulnerability in SChannel Could Allow Denial of Service - Windows
Server 2008 Gold (x64)    (ID: 1008507)
MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code
Execution - Quartz.dll (DirectShow) - Windows XP SP2    (ID: 1003309)
MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code
Execution - Quartz.dll (DirectShow) - Windows XP SP2 - CORRUPT PATCH
(ID: 1003310)

Fully Superseded Fixlets:

MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code
Execution - Quartz.dll (DirectShow) - Windows XP SP2 (x64) (Superseded)
(ID: 1003317)
MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code
Execution - Quartz.dll (DirectShow) - Windows XP SP2 (x64) - CORRUPT PATCH
(Superseded)    (ID: 1003318)
MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code
Execution - Quartz.dll (DirectShow) - Windows Server 2003 SP2 (Superseded)
(ID: 1003331)
MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code
Execution - Quartz.dll (DirectShow) - Windows Server 2003 SP2 - CORRUPT
PATCH (Superseded)    (ID: 1003332)
MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code
Execution - Quartz.dll (DirectShow) - Windows Server 2003 SP2 (x64)
(Superseded)    (ID: 1003337)
MS10-033: Vulnerabilities in Media Decompression Could Allow Remote Code
Execution - Quartz.dll (DirectShow) - Windows Server 2003 SP2 (x64) -
CORRUPT PATCH (Superseded)    (ID: 1003338)
MS10-049: Vulnerabilities in SChannel could allow Remote Code Execution -
Windows XP SP3 (Superseded)    (ID: 1004901)
MS10-049: Vulnerabilities in SChannel could allow Remote Code Execution -
Windows XP SP3 - CORRUPT PATCH (Superseded)    (ID: 1004902)
MS10-049: Vulnerabilities in SChannel could allow Remote Code Execution -
Windows XP SP2 (x64) (Superseded)    (ID: 1004903)
MS10-049: Vulnerabilities in SChannel could allow Remote Code Execution -
Windows XP SP2 (x64) - CORRUPT PATCH (Superseded)    (ID: 1004904)
MS10-049: Vulnerabilities in SChannel could allow Remote Code Execution -
Windows Server 2003 SP2 (Superseded)    (ID: 1004905)
MS10-049: Vulnerabilities in SChannel could allow Remote Code Execution -
Windows Server 2003 SP2 - CORRUPT PATCH (Superseded)    (ID: 1004906)
MS10-049: Vulnerabilities in SChannel could allow Remote Code Execution -
Windows Server 2003 SP2 (x64) (Superseded)    (ID: 1004907)
MS10-095: Vulnerability in Microsoft Windows Could Allow Remote Code
Execution - Windows 7 (Superseded)    (ID: 1009501)
MS10-095: Vulnerability in Microsoft Windows Could Allow Remote Code
Execution - Windows 7 (x64) (Superseded)    (ID: 1009503)
MS10-095: Vulnerability in Microsoft Windows Could Allow Remote Code
Execution - Windows Server 2008 R2 (x64) (Superseded)    (ID: 1009505)
MS11-063: Vulnerability in Windows Client/Server Run-time Subsystem Could
Allow Elevation of Privilege - Windows XP SP3 (Superseded)    (ID: 1106301)
MS11-063: Vulnerability in Windows Client/Server Run-time Subsystem Could
Allow Elevation of Privilege - Windows XP SP3 - CORRUPT PATCH (Superseded)
(ID: 1106302)
MS11-063: Vulnerability in Windows Client/Server Run-time Subsystem Could
Allow Elevation of Privilege - Windows XP SP2 (x64) (Superseded)    (ID:
1106303)
MS11-063: Vulnerability in Windows Client/Server Run-time Subsystem Could
Allow Elevation of Privilege - Windows XP SP2 (x64) - CORRUPT PATCH
(Superseded)    (ID: 1106304)
MS11-063: Vulnerability in Windows Client/Server Run-time Subsystem Could
Allow Elevation of Privilege - Windows Server 2003 SP2 (Superseded)    (ID:
1106305)
MS11-063: Vulnerability in Windows Client/Server Run-time Subsystem Could
Allow Elevation of Privilege - Windows Server 2003 SP2 - CORRUPT PATCH
(Superseded)    (ID: 1106306)
MS11-063: Vulnerability in Windows Client/Server Run-time Subsystem Could
Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) (Superseded)
(ID: 1106307)
MS11-063: Vulnerability in Windows Client/Server Run-time Subsystem Could
Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) - CORRUPT
PATCH (Superseded)    (ID: 1106308)
MS11-063: Vulnerability in Windows Client/Server Run-time Subsystem Could
Allow Elevation of Privilege - Windows Vista SP2 (Superseded)    (ID:
1106309)
MS11-063: Vulnerability in Windows Client/Server Run-time Subsystem Could
Allow Elevation of Privilege - Windows Vista SP2 (x64) (Superseded)    (ID:
1106311)
MS11-063: Vulnerability in Windows Client/Server Run-time Subsystem Could
Allow Elevation of Privilege - Windows Server 2008 SP2 (Superseded)    (ID:
1106313)
MS11-063: Vulnerability in Windows Client/Server Run-time Subsystem Could
Allow Elevation of Privilege - Windows Server 2008 SP2 (x64) (Superseded)
(ID: 1106315)


Reason for Update:

Microsoft has released 7 Security Bulletins for January 2012.
MS12-003 supersedes MS11-063; MS12-004 supersedes MS10-033; MS12-006
supersedes MS10-049, MS10-085, MS10-095.

Actions to Take:

None


Published site version:

Patches for Windows (English), version 1558


Additional links:

Microsoft Security Bulletin Summary:
http://technet.microsoft.com/en-us/security/bulletin/ms12-jan


Application Engineering Team
Tivoli Endpoint Manager
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://bigmail.bigfix.com/pipermail/besadmin-announcements/attachments/20120111/3ef4002e/attachment.html 


More information about the Besadmin-announcements mailing list