<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=Content-Type content="text/html; charset=us-ascii">
<meta name=Generator content="Microsoft Word 11 (filtered medium)">
<title>Content Modification Announcement</title>
<style>
<!--
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
        {margin:0in;
        margin-bottom:.0001pt;
        font-size:12.0pt;
        font-family:"Times New Roman";}
a:link, span.MsoHyperlink
        {color:blue;
        text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
        {color:purple;
        text-decoration:underline;}
p
        {mso-margin-top-alt:auto;
        margin-right:0in;
        mso-margin-bottom-alt:auto;
        margin-left:0in;
        font-size:12.0pt;
        font-family:"Times New Roman";}
span.EmailStyle18
        {mso-style-type:personal-reply;
        font-family:Arial;
        color:navy;}
@page Section1
        {size:8.5in 11.0in;
        margin:1.0in 1.25in 1.0in 1.25in;}
div.Section1
        {page:Section1;}
-->
</style>
</head>
<body lang=EN-US link=blue vlink=purple>
<div class=Section1>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>Microsoft published Security Advisory
912840 (<a href="http://www.microsoft.com/technet/security/advisory/912840.mspx"
title="http://www.microsoft.com/technet/security/advisory/912840.mspx">http://www.microsoft.com/technet/security/advisory/912840.mspx</a>)
on December 28<sup>th</sup>, 2005 to warn users of a newly discovered security vulnerability
in the Windows Meta File (WMF) code area in the Windows platform. Microsoft is planning
to release a patch that corrects the underlying vulnerability on Tuesday,
January 10<sup>th</sup>, 2006 as part of the regular monthly security bulletin
release.<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'><o:p> </o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>To help customers address this issue
before a patch is available, BigFix has published two tasks in the
“Enterprise Security” site that implements the current workaround
suggested by Microsoft: <o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'><o:p> </o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>Task ID 91284001: “Security Advisory
912840: Vulnerability in Graphics Rendering Engine Could Allow Remote Code
Execution - Un-register Shimgvw.dll”<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>Task ID 91284002: “Security Advisory
912840: Vulnerability in Graphics Rendering Engine Could Allow Remote Code
Execution - Re-register Shimgvw.dll”<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'><o:p> </o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>These tasks allow BES Administrators to
un-register and re-register “Windows Picture and Fax Viewer” on
Windows XP SP1/SP2 and Windows Server 2003. Please contact BigFix Technical
Support (<a href="mailto:enterprisesupport@bigfix.com">enterprisesupport@bigfix.com</a>)
if you have any questions regarding the advisory or these tasks.<o:p></o:p></span></font></p>
<p><font size=2 color=navy face=Arial><span style='font-size:10.0pt;font-family:
Arial;color:navy'>BigFix Product Team<o:p></o:p></span></font></p>
</div>
</body>
</html>