<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=us-ascii">
<TITLE></TITLE>
<META content="MSHTML 6.00.2900.3199" name=GENERATOR></HEAD>
<BODY><!-- Converted from text/plain format -->
<P><FONT size=2>BigFix has modified content in the Enterprise Security site.
Microsoft has made a major revision to Microsoft Security Bulletin MS07-064 that
extends the scope of the update to DirectX 9.0a and 9.0b. The existing BigFix
content already takes these versions into account, but the title has been
modified for the following Fixlet messages:<BR><BR>ID:
706405 MS07-064: Vulnerabilities in DirectX Could
Allow Remote Code Execution - DirectX 9.0 - Windows 2000 SP4<BR>ID:
706407 MS07-064: Vulnerabilities in DirectX Could
Allow Remote Code Execution - DirectX 9.0 - Windows XP SP2<BR>ID:
706409 MS07-064: Vulnerabilities in DirectX Could
Allow Remote Code Execution - DirectX 9.0 - Windows XP/2003 (x64)<BR>ID:
706411 MS07-064: Vulnerabilities in DirectX Could
Allow Remote Code Execution - DirectX 9.0 - Windows Server 2003
SP1/SP2<BR><BR>BES administrators are encouraged to verify open actions and
synchronize baselines that contain the modified content. Instructions for
synchronizing baselines can be found here: <A
href="http://support.bigfix.com/cgi-bin/kbdirect.pl?id=401">http://support.bigfix.com/cgi-bin/kbdirect.pl?id=401</A>.
Please contact BigFix Technical Support if you have any questions regarding this
change.<BR><BR>--<BR>BigFix Product Team</FONT> </P></BODY></HTML>