<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:x="urn:schemas-microsoft-com:office:excel" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=Content-Type content="text/html; charset=us-ascii">
<meta name=Generator content="Microsoft Word 11 (filtered medium)">
<style>
<!--
/* Font Definitions */
@font-face
        {font-family:"MS Mincho";
        panose-1:2 2 6 9 4 2 5 8 3 4;}
@font-face
        {font-family:"\@MS Mincho";
        panose-1:2 2 6 9 4 2 5 8 3 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
        {margin:0in;
        margin-bottom:.0001pt;
        font-size:12.0pt;
        font-family:"Times New Roman";}
a:link, span.MsoHyperlink
        {color:blue;
        text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
        {color:purple;
        text-decoration:underline;}
span.EmailStyle17
        {mso-style-type:personal-compose;
        font-family:Arial;
        color:windowtext;}
@page Section1
        {size:8.5in 11.0in;
        margin:1.0in 1.25in 1.0in 1.25in;}
div.Section1
        {page:Section1;}
-->
</style>
</head>
<body lang=EN-US link=blue vlink=purple>
<div class=Section1>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>The relevance for several MS06-045 and
MS06-049 Fixlet messages has been modified in the “Enterprise Security”
site. The original release of MS06-045 verified the versions of all files
updated by the patch, including the files “W03a2409.dll” on Windows
Server 2003 and “Xpsp3res.dll” on Windows XP SP2. These DLL files
are included only in the “QFE” folders and not in the
“GDR” folders within the update package and thus will not be
updated on all computers. The inclusion of these files in the file check
relevance causes the “CORRUPT PATCH” Fixlet message to become
relevant on some computers and subsequent actions will report back “Failed”
on these machines. These files have been removed from the file check relevance,
and affected clients should no longer report relevant for the “CORRUPT
PATCH” Fixlet messages. For more information about Microsoft software update
packages, see Microsoft Knowledge Base article 824994: <a
href="http://support.microsoft.com/kb/824994"
title="http://support.microsoft.com/kb/824994"><font color=navy
title="http://support.microsoft.com/kb/824994"><span
title="http://support.microsoft.com/kb/824994"><span style='color:navy;
text-decoration:none'>http://support.microsoft.com/kb/824994</span></span></font></a><o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'><o:p> </o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>In addition to the changes to MS06-045, the
relevance for MS06-049 was also modified. The original release of MS06-049
contained a file check relevance that detected the versions of several files
under the folder “%WinDir%\ServicePackFiles\i386”. Although the
MS06-049 security patch does update the files in this location, those files are
not directly used by the Windows kernel. The file check relevance has been
modified to correctly detect those files under the system folder instead. The
original file check relevance does contain detection for other files in the
correct location, so this change should not affect the number of relevant
computers for these Fixlet messages.<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'><o:p> </o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>Affected Fixlet messages:<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'><o:p> </o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>604503: “MS06-045: Vulnerability
in Windows Explorer Could Allow Remote Code Execution - Windows Server 2003”<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>604504: “MS06-045: CORRUPT
PATCH - Windows Server 2003”<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>604505: “MS06-045: Vulnerability
in Windows Explorer Could Allow Remote Code Execution - Windows XP SP1/SP2”<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>604506: “MS06-045: CORRUPT
PATCH - Windows XP SP1/SP2”<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>604507: “MS06-045: Vulnerability
in Windows Explorer Could Allow Remote Code Execution - Windows XP/2003 (x64)”<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>604508: “MS06-045: CORRUPT
PATCH - Windows XP/2003 (x64)”<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>604509: “MS06-045: Vulnerability
in Windows Explorer Could Allow Remote Code Execution - Windows XP/2003 (x64) -
BES < 6.0”<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>604901: “MS06-049: Vulnerability
in Windows Kernel Could Result in Elevation of Privilege - Windows 2000 SP4”<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>604902: “MS06-049: CORRUPT
PATCH - Windows 2000 SP4”<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'><o:p> </o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>BES Administrators are encouraged to
verify any open actions involving these updates. Please contact BigFix
Technical Support if you have any questions regarding this change.<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'><o:p> </o:p></span></font></p>
<p class=MsoNormal><font size=2 color=navy face=Arial><span style='font-size:
10.0pt;font-family:Arial;color:navy'>BigFix Product Team</span></font><font
color=navy face=Arial><span style='font-family:Arial;color:navy'><o:p></o:p></span></font></p>
</div>
</body>
</html>