<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns="http://www.w3.org/TR/REC-html40">

<head>
<meta http-equiv=Content-Type content="text/html; charset=us-ascii">
<meta name=Generator content="Microsoft Word 11 (filtered medium)">
<title>Content Modification Announcement</title>
<style>
<!--
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
        {margin:0in;
        margin-bottom:.0001pt;
        font-size:12.0pt;
        font-family:"Times New Roman";}
a:link, span.MsoHyperlink
        {color:blue;
        text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
        {color:purple;
        text-decoration:underline;}
p
        {mso-margin-top-alt:auto;
        margin-right:0in;
        mso-margin-bottom-alt:auto;
        margin-left:0in;
        font-size:12.0pt;
        font-family:"Times New Roman";}
span.EmailStyle18
        {mso-style-type:personal-reply;
        font-family:Arial;
        color:navy;}
@page Section1
        {size:8.5in 11.0in;
        margin:1.0in 1.25in 1.0in 1.25in;}
div.Section1
        {page:Section1;}
-->
</style>

</head>

<body lang=EN-US link=blue vlink=purple>

<div class=Section1>

<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>A number of security updates have been
superseded by new Microsoft Security Bulletins published on February 14<sup>th</sup>.
The corresponding content in the &#8220;Enterprise Security&#8221; site have
been modified accordingly.<o:p></o:p></span></font></p>

<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>Affected Fixlet messages:<o:p></o:p></span></font></p>

<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>500901: &quot;MS05-009: Vulnerability in
PNG Processing Could Allow Remote Code Execution - Windows Media Player 9
Series&quot;<o:p></o:p></span></font></p>

<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>500902: &quot;MS05-009: CORRUPT PATCH -
Windows Media Player 9 Series&quot;<o:p></o:p></span></font></p>

<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>500909: &quot;MS05-009: Vulnerability in
PNG Processing Could Allow Remote Code Execution - Windows Media Player 9
Series - Windows 98/ME&quot;<o:p></o:p></span></font></p>

<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>500910: &quot;MS05-009: CORRUPT PATCH -
Windows Media Player 9 Series - Windows 98/ME&quot;<o:p></o:p></span></font></p>

<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>501901: &quot;MS05-019: Vulnerabilities in
TCP/IP Could Allow Remote Code Execution and Denial of Service - Windows Server
2003&quot;<o:p></o:p></span></font></p>

<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>501902: &quot;MS05-019: CORRUPT PATCH -
Windows Server 2003&quot;<o:p></o:p></span></font></p>

<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>501905: &quot;MS05-019: Vulnerabilities in
TCP/IP Could Allow Remote Code Execution and Denial of Service - Windows
XP&quot;<o:p></o:p></span></font></p>

<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>501906: &quot;MS05-019: CORRUPT PATCH -
Windows XP&quot;<o:p></o:p></span></font></p>

<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>501907: &quot;MS05-019: REVISED PATCH -
Windows XP&quot;<o:p></o:p></span></font></p>

<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>501908: &quot;MS05-019: REVISED PATCH -
Windows Server 2003&quot;<o:p></o:p></span></font></p>

<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>502801: &quot;MS05-028: Vulnerability in
Web Client Service Could Allow Remote Code Execution - Windows Server
2003&quot;<o:p></o:p></span></font></p>

<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>502802: &quot;MS05-028: CORRUPT PATCH -
Windows Server 2003&quot;<o:p></o:p></span></font></p>

<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>502803: &quot;MS05-028: Vulnerability in
Web Client Service Could Allow Remote Code Execution - Windows XP&quot;<o:p></o:p></span></font></p>

<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>502804: &quot;MS05-028: CORRUPT PATCH -
Windows XP&quot;<o:p></o:p></span></font></p>

<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>505401: &quot;MS05-054: Cumulative
Security Update for Internet Explorer - IE 5.01 - Windows 2000 SP4&quot;<o:p></o:p></span></font></p>

<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>505402: &quot;MS05-054: CORRUPT PATCH - IE
5.01 - Windows 2000 SP4&quot;<o:p></o:p></span></font></p>

<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>690306: &quot;MS06-003: Vulnerability in
TNEF Decoding in Microsoft Outlook Could Allow Remote Code Execution - Outlook
2003 Korean MUI (Network/Local Install)&quot;<o:p></o:p></span></font></p>

<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>In addition, the initial release of a few Fixlet
messages for MS06-005 contained an action script mistake (&#8220;action
requires restart&#8221; instead of &#8220;action may require restart&#8221;).
BES clients who have executed the initial version of the action will report
back as &#8220;Pending Restart&#8221; in the BES Console even if the computer
is not in a pending restart state. The content was corrected within several
hours of the initial release.<o:p></o:p></span></font></p>

<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>Affected Fixlet messages:<o:p></o:p></span></font></p>

<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>600503: &quot;MS06-005: Vulnerability in
Windows Media Player Could Allow Remote Code Execution - Windows Media Player 9
- Windows 2000/XP/2003&quot;<o:p></o:p></span></font></p>

<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>600504: &quot;MS06-005: CORRUPT PATCH -
Windows Media Player 9 - Windows 2000/XP/2003&quot;<o:p></o:p></span></font></p>

<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>600505: &quot;MS06-005: Vulnerability in
Windows Media Player Could Allow Remote Code Execution - Windows Media Player
10 - Windows XP SP1/SP2&quot;<o:p></o:p></span></font></p>

<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>600506: &quot;MS06-005: CORRUPT PATCH -
Windows Media Player 10 - Windows XP SP1/SP2&quot;<o:p></o:p></span></font></p>

<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>BES administrators are encouraged to verify
open policy actions that involve these updates. If you have any questions
regarding this change, please contact BigFix Technical Support (<a
href="mailto:enterprisesupport@bigfix.com">enterprisesupport@bigfix.com</a>).<o:p></o:p></span></font></p>

<p><font size=2 color=navy face=Arial><span style='font-size:10.0pt;font-family:
Arial;color:navy'>BigFix Product Team</span></font><o:p></o:p></p>

</div>

</body>

</html>