[BESAdmin-Announcements] Content Modification in Patches for Windows (English)

Announcements for BES Administrators besadmin-announcements at bigmail.bigfix.com
Fri Jan 23 00:40:41 PST 2015


Content in the Patches for Windows (English) has been modified:


New Fixlet Messages:
[Major] 3025945: Internet Explorer 9 stops working after you install update
3008923 in Windows - Windows Server 2008 SP2    (ID: 302594501)
[Major] 3025945: Internet Explorer 9 stops working after you install update
3008923 in Windows - Windows 7 SP1    (ID: 302594503)
[Major] 3025945: Internet Explorer 9 stops working after you install update
3008923 in Windows - Windows Server 2008 SP2 (x64)    (ID: 302594505)
[Major] 3025945: Internet Explorer 9 stops working after you install update
3008923 in Windows - Windows 7 SP1 / Windows Server 2008 R2 SP1 (x64)
(ID: 302594507)
[Major] 3033408: Security advisory: Update for vulnerabilities in Adobe
Flash Player in Internet Explorer - Windows 8.1 Gold    (ID: 303340811)
[Major] 3033408: Security advisory: Update for vulnerabilities in Adobe
Flash Player in Internet Explorer - Windows 8 Gold    (ID: 303340809)
[Major] 3033408: Security advisory: Update for vulnerabilities in Adobe
Flash Player in Internet Explorer - Windows Server 2012 R2 Gold (x64)
(ID: 303340807)
[Major] 3033408: Security advisory: Update for vulnerabilities in Adobe
Flash Player in Internet Explorer - Windows 8 Gold (x64)    (ID: 303340805)
[Major] 3033408: Security advisory: Update for vulnerabilities in Adobe
Flash Player in Internet Explorer - Windows Server 2012 Gold (x64)    (ID:
303340803)
[Major] 3033408: Security advisory: Update for vulnerabilities in Adobe
Flash Player in Internet Explorer - Windows 8.1 Gold (x64)    (ID:
303340801)


Modified Fixlet Messages:
[Major] MS08-062: Vulnerability in Windows Internet Printing Service Could
Allow Remote Code Execution - Windows Server 2003 SP1/SP2    (ID: 806207)
[Major] MS08-062: Vulnerability in Windows Internet Printing Service Could
Allow Remote Code Execution - Windows Server 2003 SP1/SP2 - CORRUPT PATCH
(ID: 806208)
[Major] MS08-062: Vulnerability in Windows Internet Printing Service Could
Allow Remote Code Execution - Windows Server 2003 Gold/SP2 (x64)    (ID:
806209)
[Major] MS08-062: Vulnerability in Windows Internet Printing Service Could
Allow Remote Code Execution - Windows Server 2003 Gold/SP2 (x64) - CORRUPT
PATCH    (ID: 806210)
[Major] MS08-062: Vulnerability in Windows Internet Printing Service Could
Allow Remote Code Execution - Windows Server 2008    (ID: 806215)
[Major] MS08-062: Vulnerability in Windows Internet Printing Service Could
Allow Remote Code Execution - Windows Server 2008 (x64)    (ID: 806217)


Fully Superseded Fixlet Messagess:
[Major] 3024663: Security advisory: Update for vulnerabilities in Adobe
Flash Player in Internet Explorer - Windows 8 Gold (x64) (Superseded)
(ID: 302466301)
[Major] 3024663: Security advisory: Update for vulnerabilities in Adobe
Flash Player in Internet Explorer - Windows 8.1 Gold (Superseded)    (ID:
302466303)
[Major] 3024663: Security advisory: Update for vulnerabilities in Adobe
Flash Player in Internet Explorer - Windows Server 2012 Gold (x64)
(Superseded)    (ID: 302466305)
[Major] 3024663: Security advisory: Update for vulnerabilities in Adobe
Flash Player in Internet Explorer - Windows 8 Gold (Superseded)    (ID:
302466307)
[Major] 3024663: Security advisory: Update for vulnerabilities in Adobe
Flash Player in Internet Explorer - Windows Server 2012 R2 Gold (x64)
(Superseded)    (ID: 302466309)
[Major] 3024663: Security advisory: Update for vulnerabilities in Adobe
Flash Player in Internet Explorer - Windows 8.1 Gold (x64) (Superseded)
(ID: 302466311)


Reason for Update:
Microsoft has released KB3025945, KB3033408.
Fixlet messages for MS08-062 were updated due to relevance false positive.


Actions to Take:

None


Published site version:

Patches for Windows (English), version 2162.


Additional links:

None


Application Engineering Team
IBM Endpoint Manager
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://bigmail.bigfix.com/pipermail/besadmin-announcements/attachments/20150123/4ddce839/attachment.html>


More information about the Besadmin-announcements mailing list