<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=us-ascii">
<TITLE></TITLE>
<META content="MSHTML 6.00.2900.3199" name=GENERATOR></HEAD>
<BODY><!-- Converted from text/plain format -->
<P><FONT size=2>Microsoft has made several minor revisions to several Security
Bulletins.<BR><BR>1. Microsoft has made a minor revision to MS08-021. A known
issues link has been added to the security bulletin. The following content has
been modified:<BR><BR>ID: 802101 MS08-021:
Vulnerabilities in GDI Could Allow Remote Code Execution - Windows 2000
SP4<BR>ID: 802102 MS08-021: CORRUPT PATCH -
Windows 2000 SP4<BR>ID: 802103 MS08-021:
Vulnerabilities in GDI Could Allow Remote Code Execution - Windows XP SP2<BR>ID:
802104 MS08-021: CORRUPT PATCH - Windows XP
SP2<BR>ID: 802105 MS08-021: Vulnerabilities in GDI
Could Allow Remote Code Execution - Windows XP (x64)<BR>ID:
802106 MS08-021: CORRUPT PATCH - Windows XP
(x64)<BR>ID: 802107 MS08-021: Vulnerabilities in
GDI Could Allow Remote Code Execution - Windows Server 2003 SP1/SP2<BR>ID:
802108 MS08-021: CORRUPT PATCH - Windows Server
2003 SP1/SP2<BR>ID: 802109 MS08-021:
Vulnerabilities in GDI Could Allow Remote Code Execution - Windows Server 2003
(x64)<BR>ID: 802110 MS08-021: CORRUPT PATCH -
Windows Server 2003 (x64)<BR>ID: 802111 MS08-021:
Vulnerabilities in GDI Could Allow Remote Code Execution - Windows Vista
Gold/SP1<BR>ID: 802113 MS08-021: Vulnerabilities
in GDI Could Allow Remote Code Execution - Windows Vista (x64)<BR>ID:
802115 MS08-021: Vulnerabilities in GDI Could
Allow Remote Code Execution - Windows Server 2008<BR>ID:
802117 MS08-021: Vulnerabilities in GDI Could
Allow Remote Code Execution - Windows Server 2008 (x64)<BR><BR><BR>2. Microsoft
has made a minor revision to MS08-018. A known issues link has been added to the
security bulletin. The following content has been modified:<BR><BR>ID:
801801 MS08-018: Vulnerability in Microsoft
Project Could Allow Remote Code Execution - Project 2000 SR-1<BR>ID:
801811 MS08-018: Vulnerability in Microsoft
Project Could Allow Remote Code Execution - Project 2002 SP1<BR>ID:
801821 MS08-018: Vulnerability in Microsoft
Project Could Allow Remote Code Execution - Project 2003 SP2<BR><BR><BR>3.
Microsoft has made a minor revision to MS08-015. A known issues link has been
added to the security bulletin. The following content has been
modified:<BR><BR>ID: 801501 MS08-015:
Vulnerability in Microsoft Outlook Could Allow Remote Code Execution - Outlook
2000 SP3 (Local Install)<BR>ID: 801503 MS08-015:
Vulnerability in Microsoft Outlook Could Allow Remote Code Execution - Outlook
2000 SP3 - Windows NT/2000/XP 2003 (Network Install)<BR>ID:
801505 MS08-015: Vulnerability in Microsoft
Outlook Could Allow Remote Code Execution - Outlook 2000 SP3 - Windows
NT/2000/XP 2003 (Admin Install)<BR>ID: 801507
MS08-015: Vulnerability in Microsoft Outlook Could Allow Remote Code Execution -
Outlook 2000 SP3 - Windows 9x/ME (Admin Install)<BR>ID:
801509 MS08-015: Vulnerability in Microsoft
Outlook Could Allow Remote Code Execution - Outlook 2000 SP3 - Windows 9x/ME
(Network Install)<BR>ID: 801511 MS08-015:
Vulnerability in Microsoft Outlook Could Allow Remote Code Execution - Outlook
2002 SP3 (Local/Network Install)<BR>ID: 801515
MS08-015: Vulnerability in Microsoft Outlook Could Allow Remote Code Execution -
Outlook 2002 SP3 - Windows NT/2000/XP/2003 (Administrative Install)<BR>ID:
801517 MS08-015: Vulnerability in Microsoft
Outlook Could Allow Remote Code Execution - Outlook 2002 SP3 - Windows 9x/ME
(Administrative Install)<BR>ID: 801521 MS08-015:
Vulnerability in Microsoft Outlook Could Allow Remote Code Execution - Outlook
2003 SP2/SP3 (Local/Network Install)<BR>ID: 801522
MS08-015: Vulnerability in Microsoft Outlook Could Allow Remote Code Execution -
Outlook 2003 SP2/SP3 (Administrative Install)<BR>ID:
801531 MS08-015: Vulnerability in Microsoft
Outlook Could Allow Remote Code Execution - Outlook 2007<BR><BR><BR>BES
administrators are encouraged to verify open actions and synchronize baselines
that contain the modified content. Instructions for synchronizing
baselines can be found here: <A
href="http://support.bigfix.com/cgi-bin/kbdirect.pl?id=401">http://support.bigfix.com/cgi-bin/kbdirect.pl?id=401</A>.
Please contact BigFix Technical Support if you have any questions regarding this
change.<BR><BR>--<BR>BigFix Product Team<BR></FONT></P></BODY></HTML>