<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=us-ascii">
<TITLE></TITLE>
<META content="MSHTML 6.00.2900.3199" name=GENERATOR></HEAD>
<BODY><!-- Converted from text/plain format -->
<P><FONT size=2>BigFix has modified content in the Enterprise Security site.
Microsoft has made minor revisions to Microsoft Security Bulletins MS07-061 and
MS07-030 to include Known Issues. BigFix has modified the following content
accordingly:<BR><BR>ID: 703001 MS07-030:
Vulnerabilities in Microsoft Visio Could Allow Remote Code Execution - Visio
2002 SP2 (Network/Local Install)<BR>ID: 703003
MS07-030: Vulnerabilities in Microsoft Visio Could Allow Remote Code Execution -
Visio 2003 SP2 (Network/Local Install)<BR>ID:
706101 MS07-061: Vulnerability in Windows URI
Handling Could Allow Remote Code Execution - Windows XP SP2<BR>ID:
706102 MS07-061: CORRUPT PATCH - Windows XP
SP2<BR>ID: 706103 MS07-061: Vulnerability in
Windows URI Handling Could Allow Remote Code Execution - Windows XP (x64)<BR>ID:
706104 MS07-061: CORRUPT PATCH - Windows XP
(x64)<BR>ID: 706105 MS07-061: Vulnerability in
Windows URI Handling Could Allow Remote Code Execution - Windows Server 2003
SP1/SP2<BR>ID: 706106 MS07-061: CORRUPT PATCH -
Windows Server 2003 SP1/SP2<BR>ID: 706107
MS07-061: Vulnerability in Windows URI Handling Could Allow Remote Code
Execution - Windows Server 2003 (x64)<BR>ID:
706108 MS07-061: CORRUPT PATCH - Windows Server
2003 (x64)<BR><BR>BES administrators are encouraged to verify open actions and
synchronize baselines that contain the modified content. Instructions for
synchronizing baselines can be found here: <A
href="http://support.bigfix.com/cgi-bin/kbdirect.pl?id=401">http://support.bigfix.com/cgi-bin/kbdirect.pl?id=401</A>.
Please contact BigFix Technical Support if you have any questions regarding this
change.<BR><BR>--<BR>BigFix Product Team</FONT> </P></BODY></HTML>