<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=us-ascii">
<TITLE></TITLE>
<META content="MSHTML 6.00.2900.3199" name=GENERATOR></HEAD>
<BODY><!-- Converted from text/plain format -->
<P><FONT size=2>BigFix has modified content in the Enterprise Security site.
Microsoft made a minor revision to Security Bulletin MS07-064, which no longer
contains any known issues. BigFix has modified the description in the following
Fixlet messages accordingly:<BR><BR>ID: 706401
MS07-064: Vulnerabilities in DirectX Could Allow Remote Code Execution - DirectX
7.0 - Windows 2000 SP4<BR>ID: 706402 MS07-064:
CORRUPT PATCH - Windows 2000 SP4<BR>ID: 706403
MS07-064: Vulnerabilities in DirectX Could Allow Remote Code Execution - DirectX
8.1 - Windows 2000 SP4<BR>ID: 706404 MS07-064:
CORRUPT PATCH - Windows 2000 SP4<BR>ID: 706405
MS07-064: Vulnerabilities in DirectX Could Allow Remote Code Execution - DirectX
9.0c - Windows 2000 SP4<BR>ID: 706406 MS07-064:
CORRUPT PATCH - Windows 2000 SP4<BR>ID: 706407
MS07-064: Vulnerabilities in DirectX Could Allow Remote Code Execution - DirectX
9.0c - Windows XP SP2<BR>ID: 706408 MS07-064:
CORRUPT PATCH - Windows XP SP2<BR>ID: 706409
MS07-064: Vulnerabilities in DirectX Could Allow Remote Code Execution - DirectX
9.0c - Windows XP/2003 (x64)<BR>ID: 706410
MS07-064: CORRUPT PATCH - Windows XP/2003 (x64)<BR>ID:
706411 MS07-064: Vulnerabilities in DirectX Could
Allow Remote Code Execution - DirectX 9.0c - Windows Server 2003 SP1/SP2<BR>ID:
706412 MS07-064: CORRUPT PATCH - Windows Server
2003 SP1/SP2<BR>ID: 706415 MS07-064:
Vulnerabilities in DirectX Could Allow Remote Code Execution - DirectX 10.0 -
Windows Vista<BR>ID: 706417 MS07-064:
Vulnerabilities in DirectX Could Allow Remote Code Execution - DirectX 10.0 -
Windows Vista (x64)<BR><BR><BR>BES administrators are encouraged to verify open
actions and synchronize baselines that contain the modified content.
Instructions for synchronizing baselines can be found here: <A
href="http://support.bigfix.com/cgi-bin/kbdirect.pl?id=401">http://support.bigfix.com/cgi-bin/kbdirect.pl?id=401</A>.
Please contact BigFix Technical Support if you have any questions regarding this
change.<BR><BR>--<BR>BigFix Product Team<BR></FONT></P></BODY></HTML>