<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=us-ascii">
<TITLE></TITLE>
<META content="MSHTML 6.00.6000.16640" name=GENERATOR></HEAD>
<BODY><!-- Converted from text/plain format -->
<P><FONT size=2>BigFix has modified content in the Enterprise Security site.
Microsoft has made major revisions to MS06-078 and MS07-068, adding Windows XP
SP3 to the Affected Software list. BigFix has accordingly modified the following
content:<BR><BR>ID: 607814 MS06-078: Vulnerability
in Windows Media Format Could Allow Remote Code Execution - Windows XP SP2/SP3
(re-released 7/10/2007)<BR>ID: 607816 MS06-078:
Vulnerability in Windows Media Format Could Allow Remote Code Execution -
Windows Media Player 6.4 (re-released 7/10/2007)<BR>ID:
607820 MS06-078: CORRUPT PATCH - Windows XP
SP2/SP3 (re-released 7/10/2007)<BR>ID: 607821
MS06-078: CORRUPT PATCH - Windows Media Player 6.4 (re-released
7/10/2007)<BR>ID: 706803 MS07-068: Vulnerability
in Windows Media File Format Could Allow Remote Code Execution - Windows Media
Format Runtime 9/9.5/11 - Windows XP SP2/SP3<BR>ID:
706804 MS07-068: CORRUPT PATCH - Windows XP
SP2/SP3<BR><BR>BES administrators are encouraged to verify open actions and
synchronize baselines that contain the modified content. Instructions for
synchronizing baselines can be found here: <A
href="http://support.bigfix.com/cgi-bin/kbdirect.pl?id=401">http://support.bigfix.com/cgi-bin/kbdirect.pl?id=401</A>.
Please contact BigFix Technical Support if you have any questions regarding this
change.<BR><BR>--<BR>BigFix Product Team</FONT> </P></BODY></HTML>