<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=us-ascii">
<TITLE></TITLE>
<META content="MSHTML 6.00.2900.3199" name=GENERATOR></HEAD>
<BODY><!-- Converted from text/plain format -->
<P><FONT size=2>BigFix has modified content in the Enterprise Security site for
the Microsoft January Patch Release.<BR><BR>The following Fixlet messages have
been completely superseded by the release of MS08-001:<BR><BR>ID:
603201 MS06-032: Vulnerability in TCP/IP Could
Allow Remote Code Execution - Windows 2000 SP4<BR>ID:
603202 MS06-032: CORRUPT PATCH - Windows 2000
SP4<BR>ID: 603207 MS06-032: Vulnerability in
TCP/IP Could Allow Remote Code Execution - Windows XP/2003 (x64)<BR>ID:
603208 MS06-032: CORRUPT PATCH - Windows XP/2003
(x64)<BR><BR>The following Fixlet messages have been partially superseded by the
release of MS08-001:<BR><BR>ID: 603203 MS06-032:
Vulnerability in TCP/IP Could Allow Remote Code Execution - Windows XP
SP1<BR>ID: 603204 MS06-032: CORRUPT PATCH -
Windows XP SP1<BR>ID: 603205 MS06-032:
Vulnerability in TCP/IP Could Allow Remote Code Execution - Windows Server 2003
Gold<BR>ID: 603206 MS06-032: CORRUPT PATCH -
Windows Server 2003 Gold<BR><BR><BR>BES administrators are encouraged to verify
open actions and synchronize baselines that contain the modified content.
Instructions for synchronizing baselines can be found here: <A
href="http://support.bigfix.com/cgi-bin/kbdirect.pl?id=401">http://support.bigfix.com/cgi-bin/kbdirect.pl?id=401</A>.
Please contact BigFix Technical Support if you have any questions regarding this
change.<BR><BR>--<BR>BigFix Product Team<BR><BR></FONT></P></BODY></HTML>