[BESAdmin-Announcements] Content Modification: Patches for Windows

Announcements for BES Administrators besadmin-announcements at bigmail.bigfix.com
Tue Feb 25 11:46:45 PST 2020


Content in the Patches for Windows site has been modified.

Modified:

[Major] MS13-023: Vulnerability in Microsoft Visio Viewer 2010 Could Allow Remote Code Execution - Visio Viewer 2010 SP1              (ID: 1302301)
[Major] Security advisory: Scripting Engine Memory Corruption Vulnerability - Disable Workaround            (ID: 450033109)
[Major] Security advisory: Scripting Engine Memory Corruption Vulnerability - Disable Workaround (x64) (ID: 286872526)
[Major] Security advisory: Scripting Engine Memory Corruption Vulnerability - Enable Workaround             (ID: 450033110)
[Major] Security advisory: Scripting Engine Memory Corruption Vulnerability - Enable Workaround (x64)  (ID: 286872527)


Reason for Update:

Update relevane in workaround fixlets to account for wow redirection
Fixed hash mismatch issue in fixlet ID: 1302301



Actions to Take:
None


Published site version:
Patches for Windows, version 3483

Additional links:
None

Application Engineering Team
BigFix



-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://bigmail.bigfix.com/pipermail/besadmin-announcements/attachments/20200225/8463e6a5/attachment.html>


More information about the Besadmin-announcements mailing list