[BESAdmin-Announcements] Content Modification in Patches for Windows (English)

Announcements for BES Administrators besadmin-announcements at bigmail.bigfix.com
Mon Jul 7 01:26:48 PDT 2014


Content in the Patches for Windows (English) has been modified:


Modified Fixlet Messages:
[Minor] MS14-019: Vulnerability in Windows File Handling Component Could
Allow Remote Code Execution - Windows 7 SP1    (ID: 1401917)
[Minor] MS14-019: Vulnerability in Windows File Handling Component Could
Allow Remote Code Execution - Windows 7 SP1 (x64)    (ID: 1401919)
[Minor] MS14-019: Vulnerability in Windows File Handling Component Could
Allow Remote Code Execution - Windows 8 Gold    (ID: 1401923)
[Minor] MS14-019: Vulnerability in Windows File Handling Component Could
Allow Remote Code Execution - Windows 8 Gold (x64)    (ID: 1401925)
[Minor] MS14-019: Vulnerability in Windows File Handling Component Could
Allow Remote Code Execution - Windows 8.1 Gold    (ID: 1401927)
[Minor] MS14-019: Vulnerability in Windows File Handling Component Could
Allow Remote Code Execution - Windows 8.1 Gold (x64)    (ID: 1401929)
[Minor] MS14-019: Vulnerability in Windows File Handling Component Could
Allow Remote Code Execution - Windows Server 2003 SP2    (ID: 1401905)
[Minor] MS14-019: Vulnerability in Windows File Handling Component Could
Allow Remote Code Execution - Windows Server 2003 SP2 (x64)    (ID:
1401907)
[Minor] MS14-019: Vulnerability in Windows File Handling Component Could
Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - CORRUPT PATCH
(ID: 1401908)
[Minor] MS14-019: Vulnerability in Windows File Handling Component Could
Allow Remote Code Execution - Windows Server 2003 SP2 - CORRUPT PATCH
(ID: 1401906)
[Minor] MS14-019: Vulnerability in Windows File Handling Component Could
Allow Remote Code Execution - Windows Server 2008 R2 SP1 (x64)    (ID:
1401921)
[Minor] MS14-019: Vulnerability in Windows File Handling Component Could
Allow Remote Code Execution - Windows Server 2008 SP2    (ID: 1401913)
[Minor] MS14-019: Vulnerability in Windows File Handling Component Could
Allow Remote Code Execution - Windows Server 2008 SP2 (x64)    (ID:
1401915)
[Minor] MS14-019: Vulnerability in Windows File Handling Component Could
Allow Remote Code Execution - Windows Server 2012 Gold (x64)    (ID:
1401931)
[Minor] MS14-019: Vulnerability in Windows File Handling Component Could
Allow Remote Code Execution - Windows Server 2012 R2 Gold (x64)    (ID:
1401933)
[Minor] MS14-019: Vulnerability in Windows File Handling Component Could
Allow Remote Code Execution - Windows Vista SP2    (ID: 1401909)
[Minor] MS14-019: Vulnerability in Windows File Handling Component Could
Allow Remote Code Execution - Windows Vista SP2 (x64)    (ID: 1401911)
[Minor] MS14-019: Vulnerability in Windows File Handling Component Could
Allow Remote Code Execution - Windows XP SP2 (x64)    (ID: 1401903)
[Minor] MS14-019: Vulnerability in Windows File Handling Component Could
Allow Remote Code Execution - Windows XP SP2 (x64) - CORRUPT PATCH    (ID:
1401904)
[Minor] MS14-019: Vulnerability in Windows File Handling Component Could
Allow Remote Code Execution - Windows XP SP3    (ID: 1401901)
[Minor] MS14-019: Vulnerability in Windows File Handling Component Could
Allow Remote Code Execution - Windows XP SP3 - CORRUPT PATCH    (ID:
1401902)


Fully Superseded Fixlet Messages:
[Major] 2760587: Update 2760587 for Outlook 2013 Junk Email Filter -
Outlook 2013 (Superseded)    (ID: 276058701)
[Major] 2760587: Update 2760587 for Outlook 2013 Junk Email Filter -
Outlook 2013 (x64) (Superseded)    (ID: 276058703)
[Major] 982726: Description of the Outlook 2010 Junk Email Filter update
982726 [Jun 2014] - Outlook 2010 (Superseded)    (ID: 98272605)
[Major] 982726: Description of the Outlook 2010 Junk Email Filter update
982726 [Jun 2014] - Outlook 2010 (x64) (Superseded)    (ID: 98272607)


Reason for Update:
Fixlet messages for MS14-019 were updated because Microsoft has issued a
minor revision to security bulletin MS14-019.
Fixlet messages for KB2760587 and KB982726 were superseded because
Microsoft has stopped offering the deployed binary.


Actions to Take:

None


Published site version:

Patches for Windows (English), version 2026.


Additional links:

None


Application Engineering Team
IBM Endpoint Manager
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://bigmail.bigfix.com/pipermail/besadmin-announcements/attachments/20140707/01310b5a/attachment.html>


More information about the Besadmin-announcements mailing list