<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD><TITLE></TITLE>
<META http-equiv=Content-Type content="text/html; charset=us-ascii">
<META content="MSHTML 6.00.6000.16640" name=GENERATOR></HEAD>
<BODY><!-- Converted from text/plain format -->
<P><FONT size=2>BigFix has modified two sets of content in the Enterprise
Security site.<BR><BR>1. Microsoft has made a major revision to MS07-078,
removing Windows XP Service Pack 3 from the Affected Software list for Windows
Media Player 6.4. BigFix has modified the following content
accordingly:<BR><BR>ID: 607816 MS06-078:
Vulnerability in Windows Media Format Could Allow Remote Code Execution -
Windows Media Player 6.4 (re-released 7/10/2007)<BR>ID:
607821 MS06-078: CORRUPT PATCH - Windows Media
Player 6.4 (re-released 7/10/2007)<BR><BR><BR>2. BigFix has modified the
following Fixlet message to no longer apply to Windows Vista Service Pack
1:<BR><BR>ID: 706817 MS07-068: Vulnerability in
Windows Media File Format Could Allow Remote Code Execution - Windows Media
Format Runtime 11 - Windows Vista (x64)<BR><BR><BR>BES administrators are
encouraged to verify open actions and synchronize baselines that contain the
modified content. Instructions for synchronizing baselines can be found
here: <A
href="http://support.bigfix.com/cgi-bin/kbdirect.pl?id=401">http://support.bigfix.com/cgi-bin/kbdirect.pl?id=401</A>.
Please contact BigFix Technical Support if you have any questions regarding this
change.<BR><BR>--<BR>BigFix Product Team<BR><BR></FONT></P></BODY></HTML>