<html xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:x="urn:schemas-microsoft-com:office:excel" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=Content-Type content="text/html; charset=us-ascii">
<meta name=Generator content="Microsoft Word 11 (filtered medium)">
<style>
<!--
/* Font Definitions */
@font-face
        {font-family:"MS Mincho";
        panose-1:2 2 6 9 4 2 5 8 3 4;}
@font-face
        {font-family:"\@MS Mincho";
        panose-1:2 2 6 9 4 2 5 8 3 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
        {margin:0in;
        margin-bottom:.0001pt;
        font-size:12.0pt;
        font-family:"Times New Roman";}
a:link, span.MsoHyperlink
        {color:blue;
        text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
        {color:purple;
        text-decoration:underline;}
span.EmailStyle17
        {mso-style-type:personal;
        font-family:Arial;
        color:windowtext;}
span.EmailStyle18
        {mso-style-type:personal-reply;
        font-family:Arial;
        color:navy;}
@page Section1
        {size:8.5in 11.0in;
        margin:1.0in 1.25in 1.0in 1.25in;}
div.Section1
        {page:Section1;}
-->
</style>
</head>
<body lang=EN-US link=blue vlink=purple>
<div class=Section1>
<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'>Microsoft updated Security Bulletin MS06-025 on June 27<sup>th</sup>
to notify customers of the availability of revised security patches. The
revised patch resolve known issues caused by the initial version of the patch.
Microsoft recommends installing the new update only if you have not installed
the initial version of the patch or if you are experiencing one of the known
issues fixed by the new patch. New Fixlet messages have been released to the
“Enterprise Security” site. For more information, see the FAQ
section of the security bulletin. (<a
href="http://www.microsoft.com/technet/security/Bulletin/MS06-025.mspx">http://www.microsoft.com/technet/security/Bulletin/MS06-025.mspx</a>)<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'><o:p> </o:p></span></font></p>
<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'>New Fixlet messages:<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'><o:p> </o:p></span></font></p>
<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'>602520 MS06-025: Vulnerability in Routing and Remove
Access Could Allow Remote Code Execution - Windows XP SP1/SP2<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'>602521 MS06-025: CORRUPT PATCH - Windows XP SP1/SP2<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'>602523 MS06-025: Vulnerability in Routing and Remote
Access Could Allow Remote Code Execution - Windows Server 2003<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'>602524 MS06-025: CORRUPT PATCH - Windows Server 2003<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'>602525 MS06-025: Vulnerability in Routing and Remote
Access Could Allow Remote Code Execution - Windows 2000 SP4<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'>602526 MS06-025: CORRUPT PATCH - Windows 2000 SP4<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'>602527 MS06-025: Vulnerability in Routing and Remote
Access Could Allow Remote Code Execution - Windows XP/2003 (x64)<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'>602528 MS06-025: CORRUPT PATCH - Windows XP/2003 (x64)<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'>602512 MS06-025: Vulnerability in Routing and Remote
Access Could Allow Remote Code Execution - Windows XP/2003 (x64) - BES < 6.0<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'><o:p> </o:p></span></font></p>
<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'>The initial version of the security updates is no longer
available for download from Microsoft and the initial Fixlet messages (ID
602501-602508, 602510) have been superseded.<font color=navy><span
style='color:navy'> </span></font>BES Administrators are encouraged to review
open actions involving these updates. Please contact BigFix Technical Support
if you have any questions regarding this change.<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'><o:p> </o:p></span></font></p>
<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'>BigFix Product Team<font color=navy><span style='color:navy'><o:p></o:p></span></font></span></font></p>
</div>
</body>
</html>