<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=Content-Type content="text/html; charset=us-ascii">
<meta name=Generator content="Microsoft Word 11 (filtered medium)">
<title>Content Modification Announcement</title>
<style>
<!--
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
        {margin:0in;
        margin-bottom:.0001pt;
        font-size:12.0pt;
        font-family:"Times New Roman";}
a:link, span.MsoHyperlink
        {color:blue;
        text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
        {color:purple;
        text-decoration:underline;}
p
        {mso-margin-top-alt:auto;
        margin-right:0in;
        mso-margin-bottom-alt:auto;
        margin-left:0in;
        font-size:12.0pt;
        font-family:"Times New Roman";}
span.EmailStyle18
        {mso-style-type:personal-reply;
        font-family:Arial;
        color:navy;}
@page Section1
        {size:8.5in 11.0in;
        margin:1.0in 1.25in 1.0in 1.25in;}
div.Section1
        {page:Section1;}
-->
</style>
</head>
<body lang=EN-US link=blue vlink=purple>
<div class=Section1>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>A number of security updates have been
superseded by new Microsoft Security Bulletins published on February 14<sup>th</sup>.
The corresponding content in the “Enterprise Security” site have
been modified accordingly.<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'><o:p> </o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>Affected Fixlet messages:<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'><o:p> </o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>500901: "MS05-009: Vulnerability in
PNG Processing Could Allow Remote Code Execution - Windows Media Player 9
Series"<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>500902: "MS05-009: CORRUPT PATCH -
Windows Media Player 9 Series"<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>500909: "MS05-009: Vulnerability in
PNG Processing Could Allow Remote Code Execution - Windows Media Player 9
Series - Windows 98/ME"<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>500910: "MS05-009: CORRUPT PATCH -
Windows Media Player 9 Series - Windows 98/ME"<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>501901: "MS05-019: Vulnerabilities in
TCP/IP Could Allow Remote Code Execution and Denial of Service - Windows Server
2003"<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>501902: "MS05-019: CORRUPT PATCH -
Windows Server 2003"<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>501905: "MS05-019: Vulnerabilities in
TCP/IP Could Allow Remote Code Execution and Denial of Service - Windows
XP"<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>501906: "MS05-019: CORRUPT PATCH -
Windows XP"<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>501907: "MS05-019: REVISED PATCH -
Windows XP"<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>501908: "MS05-019: REVISED PATCH -
Windows Server 2003"<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>502801: "MS05-028: Vulnerability in
Web Client Service Could Allow Remote Code Execution - Windows Server
2003"<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>502802: "MS05-028: CORRUPT PATCH -
Windows Server 2003"<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>502803: "MS05-028: Vulnerability in
Web Client Service Could Allow Remote Code Execution - Windows XP"<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>502804: "MS05-028: CORRUPT PATCH -
Windows XP"<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>505401: "MS05-054: Cumulative
Security Update for Internet Explorer - IE 5.01 - Windows 2000 SP4"<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>505402: "MS05-054: CORRUPT PATCH - IE
5.01 - Windows 2000 SP4"<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>690306: "MS06-003: Vulnerability in
TNEF Decoding in Microsoft Outlook Could Allow Remote Code Execution - Outlook
2003 Korean MUI (Network/Local Install)"<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'><o:p> </o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>In addition, the initial release of a few Fixlet
messages for MS06-005 contained an action script mistake (“action
requires restart” instead of “action may require restart”).
BES clients who have executed the initial version of the action will report
back as “Pending Restart” in the BES Console even if the computer
is not in a pending restart state. The content was corrected within several
hours of the initial release.<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'><o:p> </o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>Affected Fixlet messages:<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'><o:p> </o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>600503: "MS06-005: Vulnerability in
Windows Media Player Could Allow Remote Code Execution - Windows Media Player 9
- Windows 2000/XP/2003"<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>600504: "MS06-005: CORRUPT PATCH -
Windows Media Player 9 - Windows 2000/XP/2003"<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>600505: "MS06-005: Vulnerability in
Windows Media Player Could Allow Remote Code Execution - Windows Media Player
10 - Windows XP SP1/SP2"<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>600506: "MS06-005: CORRUPT PATCH -
Windows Media Player 10 - Windows XP SP1/SP2"<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'><o:p> </o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>BES administrators are encouraged to verify
open policy actions that involve these updates. If you have any questions
regarding this change, please contact BigFix Technical Support (<a
href="mailto:enterprisesupport@bigfix.com">enterprisesupport@bigfix.com</a>).<o:p></o:p></span></font></p>
<p><font size=2 color=navy face=Arial><span style='font-size:10.0pt;font-family:
Arial;color:navy'>BigFix Product Team</span></font><o:p></o:p></p>
</div>
</body>
</html>