<html xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=us-ascii">
<meta name=Generator content="Microsoft Word 11 (filtered medium)">
<style>
<!--
/* Font Definitions */
@font-face
        {font-family:"MS Mincho";
        panose-1:2 2 6 9 4 2 5 8 3 4;}
@font-face
        {font-family:"\@MS Mincho";
        panose-1:2 2 6 9 4 2 5 8 3 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
        {margin:0in;
        margin-bottom:.0001pt;
        font-size:12.0pt;
        font-family:"Times New Roman";}
a:link, span.MsoHyperlink
        {color:blue;
        text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
        {color:purple;
        text-decoration:underline;}
span.EmailStyle17
        {mso-style-type:personal-compose;
        font-family:Arial;
        color:windowtext;}
@page Section1
        {size:8.5in 11.0in;
        margin:1.0in 1.25in 1.0in 1.25in;}
div.Section1
        {page:Section1;}
-->
</style>
</head>
<body lang=EN-US link=blue vlink=purple>
<div class=Section1>
<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'>The relevance for MS06-061 Fixlet messages in the “Enterprise
Security” site has been modified. Previous versions of the Fixlet
messages did not distinguish between different localized versions of MSXML. Computers
with a non-English version of MSXML installed may report relevant for the
English update, and the action will report back “Failed”. An
additional relevance has been added to the following Fixlet messages to correct
this issue:<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'><o:p> </o:p></span></font></p>
<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'>ID 606101: “MS06-061: Vulnerabilities in Microsoft XML
Core Services Could Allow Remote Code Execution - XML Core Parser 2.6 / XML
Core Services 3.0 - Windows 2000 SP4”<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'>ID 606102: “MS06-061: CORRUPT PATCH - XML Core Parser
2.6 / XML Core Services 3.0 - Windows 2000 SP4”<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'>ID 606103: “MS06-061: Vulnerabilities in Microsoft XML
Core Services Could Allow Remote Code Execution - XML Core Parser 2.6 / XML
Core Services 3.0 - Windows Server 2003”<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'>ID 606104: “MS06-061: CORRUPT PATCH - XML Core Parser
2.6 / XML Core Services 3.0 - Windows Server 2003”<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'>ID 606105: “MS06-061: Vulnerabilities in Microsoft XML
Core Services Could Allow Remote Code Execution - XML Core Parser 2.6 / XML
Core Services 3.0 - Windows XP/2003 (x64) ”<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'>ID 606106: “MS06-061: CORRUPT PATCH - XML Core Parser
2.6 / XML Core Services 3.0 - Windows XP/2003 (x64) ”<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'>ID 606107: “MS06-061: Vulnerabilities in Microsoft XML
Core Services Could Allow Remote Code Execution - XML Core Parser 2.6 / XML Core
Services 3.0 - Windows XP SP1/SP2”<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'>ID 606108: “MS06-061: CORRUPT PATCH - XML Core Parser
2.6 / XML Core Services 3.0 - Windows XP SP1/SP2”<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'>ID 606110: “MS06-061: Vulnerabilities in Microsoft XML
Core Services Could Allow Remote Code Execution - XML Core Parser 2.6 / XML
Core Services 3.0 - Windows XP/2003 (x64) - BES < 6.0”<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'>ID 606111: “MS06-061: Vulnerabilities in Microsoft XML
Core Services Could Allow Remote Code Execution - XML Core Services 4.0”<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'>ID 606112: “MS06-061: CORRUPT PATCH - XML Core
Services 4.0”<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'>ID 606113: “MS06-061: Vulnerabilities in Microsoft XML
Core Services Could Allow Remote Code Execution - XML Core Services 6.0”<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'>ID 606115: “MS06-061: CORRUPT PATCH - XML Core
Services 6.0”<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'><o:p> </o:p></span></font></p>
<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'>BES administrators are encouraged to verify any open actions
involving these updates. <o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'><o:p> </o:p></span></font></p>
<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'>BigFix Product Team</span></font><o:p></o:p></p>
</div>
</body>
</html>