<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=us-ascii">
<TITLE></TITLE>
<META content="MSHTML 6.00.6000.16640" name=GENERATOR></HEAD>
<BODY><!-- Converted from text/plain format -->
<P><FONT size=2>BigFix has modified content in the Enterprise Security site.
Microsoft has made a major revision to MS07-042. The following Fixlet messages
have been modified:<BR><BR>704211 MS07-042: Vulnerability in Microsoft XML
Core Services Could Allow Remote Code Execution - XML Core Services 5.0 - Office
2007/Expression Web/Microsoft Office Compatibility Pack for Word, Excel, and
PowerPoint 2007 File Formats<BR>704213 MS07-042: Vulnerability in
Microsoft XML Core Services Could Allow Remote Code Execution - XML Core
Services 5.0 - SharePoint Server 2007<BR>704215 MS07-042: Vulnerability in
Microsoft XML Core Services Could Allow Remote Code Execution - XML Core
Services 5.0 - SharePoint Server 2007/Groove Server 2007 (x64)<BR>704231
MS07-042: Vulnerability in Microsoft XML Core Services Could Allow Remote Code
Execution - XML Core Services 4.0 SP2<BR><BR><BR>BES administrators are
encouraged to verify open actions and synchronize baselines that contain the
modified content. Instructions for synchronizing baselines can be found
here: <A
href="http://support.bigfix.com/cgi-bin/kbdirect.pl?id=401">http://support.bigfix.com/cgi-bin/kbdirect.pl?id=401</A>.
Please contact BigFix Technical Support if you have any questions regarding this
change.<BR><BR>--<BR>BigFix Product Team</FONT> </P></BODY></HTML>