[BESAdmin-Announcements] Content Modification: Patches for Windows

Announcements for BES Administrators besadmin-announcements at bigmail.bigfix.com
Wed Jan 29 17:10:16 PST 2020


Content in the Patches for Windows site has been modified.





New:

[Major] Security advisory: Scripting Engine Memory Corruption Vulnerability - Disable Workaround    (ID: 450033109)

[Major] Security advisory: Scripting Engine Memory Corruption Vulnerability - Disable Workaround (x64)       (ID: 286872526)

[Major] Security advisory: Scripting Engine Memory Corruption Vulnerability - Enable Workaround     (ID: 450033110)

[Major] Security advisory: Scripting Engine Memory Corruption Vulnerability - Enable Workaround (x64)        (ID: 286872527)





Modified:

[Major] Microsoft Unsupported: Windows 7      (ID: 612)

[Major] Microsoft Unsupported: Windows Server 2008 R2       (ID: 613)

[Major] Microsoft Unsupported: Windows Server 2008 (ID: 599)

[Major] MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2016 Gold - KB3085538      (ID: 1508195)





Removed:

[Major] Microsoft Visual Studio 2008 Service Pack 1 Update    (ID: 97447901)





Reason for Update:

Fixlets released to enable/disable the workaround described in Microsoft Advisory ADV200001.

Updated file details in KB3085538 fixlet to address a hash mismatch issue.

Unsupported fixlets for Windows 7 and Windows Server 2008 have been updated to be relevant for all systems that have reached end support as of Jan 14, 2020.

Dummy fixlet ID 97447901 was erroneously published and has now been removed from the site.





Actions to Take:

None





Published site version:

Patches for Windows, version 3462



Additional links:

None



Application Engineering Team

BigFix







-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://bigmail.bigfix.com/pipermail/besadmin-announcements/attachments/20200130/847fbd37/attachment.html>


More information about the Besadmin-announcements mailing list