<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=us-ascii">
<TITLE></TITLE>
<META content="MSHTML 6.00.2900.3314" name=GENERATOR></HEAD>
<BODY><!-- Converted from text/plain format -->
<P><FONT size=2>BigFix has modified content in the Enterprise Security site.
Several Fixlet messages for Microsoft Security Bulletin MS08-016 have been
modified to avoid conflicts with other Office software:<BR><BR>ID:
801611 MS08-016: Vulnerabilities in Microsoft
Office Could Allow Remote Code Execution - Office XP SP3 (Local/Network
Install)<BR>ID: 801613 MS08-016: Vulnerabilities
in Microsoft Office Could Allow Remote Code Execution - Office XP SP3 - Windows
9x/ME (Administrative Install)<BR>ID: 801615
MS08-016: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution
- Office XP SP3 - Windows NT/2000/XP/2003 (Administrative Install)<BR>ID:
801621 MS08-016: Vulnerabilities in Microsoft
Office Could Allow Remote Code Execution - Office 2003 SP2 (Local/Network
Install)<BR>ID: 801622 MS08-016: Vulnerabilities
in Microsoft Office Could Allow Remote Code Execution - Office 2003 SP2
(Administrative Install)<BR><BR><BR>BES administrators are encouraged to verify
open actions and synchronize baselines that contain the modified content.
Instructions for synchronizing baselines can be found here: <A
href="http://support.bigfix.com/cgi-bin/kbdirect.pl?id=401">http://support.bigfix.com/cgi-bin/kbdirect.pl?id=401</A>.
Please contact BigFix Technical Support if you have any questions regarding this
change.<BR><BR>--<BR>BigFix Product Team</FONT> </P></BODY></HTML>