[BESAdmin-Announcements] Content Modification in Patches for Windows (English)
Announcements for BES Administrators
besadmin-announcements at bigmail.bigfix.com
Sat Jun 21 19:53:52 PDT 2014
Content in the Patches for Windows (English) has been modified:
Fully Superseded Fixlet Messages:
[Major] MS99-033: "Malformed Telnet Argument" Patch for Windows 98 Telnet
Client - CORRUPT PATCH (Superseded) (ID: 9903302)
[Major] MS01-012: "Malformed vCard" Vulnerability in Outlook/Outlook
Express - CORRUPT PATCH (Superseded) (ID: 101202)
[Major] MS01-041: Malformed RPC Request Vulnerability in Exchange 5.5 -
CORRUPT PATCH (Superseded) (ID: 104102)
[Major] MS01-047: OWA Function Allows Unauthenticated User to Enumerate
Global Address List - CORRUPT PATCH (Superseded) (ID: 104702)
[Major] MS02-003: Exchange 2000 System Attendant Incorrectly Sets Remote
Registry Permissions - CORRUPT PATCH (Superseded) (ID: 200302)
[Major] MS02-033: Unchecked Buffer in Profile Service in Commerce Server
2002 - CORRUPT PATCH (Superseded) (ID: 203304)
[Major] MS02-057: Flaw in Services for Unix 3.0 Interix SDK Could Allow
Code Execution - CORRUPT PATCH (Superseded) (ID: 205702)
[Major] MS03-030: Unchecked Buffer in DirectX Could Enable System
Compromise - DirectX 9.0a - CORRUPT PATCH (Superseded) (ID: 303010)
[Major] MS04-024: Vulnerability in Windows Shell Could Allow Remote Code
Execution - Windows NT with Active Desktop - CORRUPT PATCH (Superseded)
(ID: 402414)
Reason for Update:
Microsoft has stopped offering the deployed binary for these Fixlets.
Actions to Take:
None
Published site version:
Patches for Windows (English), version 2019.
Additional links:
None
Application Engineering Team
IBM Endpoint Manager
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://bigmail.bigfix.com/pipermail/besadmin-announcements/attachments/20140622/e66562f7/attachment.html>
More information about the Besadmin-announcements
mailing list