<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:x="urn:schemas-microsoft-com:office:excel" xmlns:p="urn:schemas-microsoft-com:office:powerpoint" xmlns:a="urn:schemas-microsoft-com:office:access" xmlns:dt="uuid:C2F41010-65B3-11d1-A29F-00AA00C14882" xmlns:s="uuid:BDC6E3F0-6DA3-11d1-A2A3-00AA00C14882" xmlns:rs="urn:schemas-microsoft-com:rowset" xmlns:z="#RowsetSchema" xmlns:b="urn:schemas-microsoft-com:office:publisher" xmlns:ss="urn:schemas-microsoft-com:office:spreadsheet" xmlns:c="urn:schemas-microsoft-com:office:component:spreadsheet" xmlns:odc="urn:schemas-microsoft-com:office:odc" xmlns:oa="urn:schemas-microsoft-com:office:activation" xmlns:html="http://www.w3.org/TR/REC-html40" xmlns:q="http://schemas.xmlsoap.org/soap/envelope/" xmlns:rtc="http://microsoft.com/officenet/conferencing" xmlns:D="DAV:" xmlns:Repl="http://schemas.microsoft.com/repl/" xmlns:mt="http://schemas.microsoft.com/sharepoint/soap/meetings/" xmlns:x2="http://schemas.microsoft.com/office/excel/2003/xml" xmlns:ppda="http://www.passport.com/NameSpace.xsd" xmlns:ois="http://schemas.microsoft.com/sharepoint/soap/ois/" xmlns:dir="http://schemas.microsoft.com/sharepoint/soap/directory/" xmlns:ds="http://www.w3.org/2000/09/xmldsig#" xmlns:dsp="http://schemas.microsoft.com/sharepoint/dsp" xmlns:udc="http://schemas.microsoft.com/data/udc" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:sub="http://schemas.microsoft.com/sharepoint/soap/2002/1/alerts/" xmlns:ec="http://www.w3.org/2001/04/xmlenc#" xmlns:sp="http://schemas.microsoft.com/sharepoint/" xmlns:sps="http://schemas.microsoft.com/sharepoint/soap/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:udcs="http://schemas.microsoft.com/data/udc/soap" xmlns:udcxf="http://schemas.microsoft.com/data/udc/xmlfile" xmlns:udcp2p="http://schemas.microsoft.com/data/udc/parttopart" xmlns:st="" xmlns:st1="urn:schemas-microsoft-com:office:smarttags" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=us-ascii">
<meta name=Generator content="Microsoft Word 11 (filtered medium)">
<o:SmartTagType namespaceuri="urn:schemas-microsoft-com:office:smarttags"
name="place"/>
<!--[if !mso]>
<style>
st1\:*{behavior:url(#default#ieooui) }
</style>
<![endif]-->
<style>
<!--
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
        {margin:0in;
        margin-bottom:.0001pt;
        font-size:12.0pt;
        font-family:"Times New Roman";}
a:link, span.MsoHyperlink
        {color:blue;
        text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
        {color:purple;
        text-decoration:underline;}
span.EmailStyle17
        {mso-style-type:personal-compose;
        font-family:Arial;
        color:windowtext;}
@page Section1
        {size:8.5in 11.0in;
        margin:1.0in 1.25in 1.0in 1.25in;}
div.Section1
        {page:Section1;}
-->
</style>
</head>
<body lang=EN-US link=blue vlink=purple>
<div class=Section1>
<p class=MsoNormal style='text-autospace:none'><font size=2 face="Courier New"><span
style='font-size:10.0pt;font-family:"Courier New"'>Bigfix has decided to use
download instead of prefetch in the actionscript for the latest Patch Tuesday
released content due to a prefetch feature limitation that didn’t get
fixed until BES 7.2. For more information please go to <a
href="http://forum.bigfix.com/viewtopic.php?pid=21092#p21092">http://forum.bigfix.com/viewtopic.php?pid=21092#p21092</a><o:p></o:p></span></font></p>
<p class=MsoNormal style='text-autospace:none'><font size=2 face="Courier New"><span
style='font-size:10.0pt;font-family:"Courier New"'><o:p> </o:p></span></font></p>
<p class=MsoNormal style='text-autospace:none'><font size=2 face="Courier New"><span
style='font-size:10.0pt;font-family:"Courier New"'>The following Fixlet
messages have been modified accordingly:<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 face="Courier New"><span style='font-size:10.0pt;
font-family:"Courier New"'><o:p> </o:p></span></font></p>
<p class=MsoNormal style='text-autospace:none'><font size=2 face="Courier New"><span
style='font-size:10.0pt;font-family:"Courier New"'>ID: 1003001 MS10-030:
Vulnerability in Outlook Express and Windows Mail Could Allow Remote Code
Execution - OE 5.5 SP2 - Windows 2000 SP4 <o:p></o:p></span></font></p>
<p class=MsoNormal style='text-autospace:none'><font size=2 face="Courier New"><span
style='font-size:10.0pt;font-family:"Courier New"'>ID: 1003002 MS10-030:
Vulnerability in Outlook Express and Windows Mail Could Allow Remote Code
Execution - OE 5.5 SP2 - Windows 2000 SP4 - CORRUPT PATCH <o:p></o:p></span></font></p>
<p class=MsoNormal style='text-autospace:none'><font size=2 face="Courier New"><span
style='font-size:10.0pt;font-family:"Courier New"'>ID: 1003003 MS10-030:
Vulnerability in Outlook Express and Windows Mail Could Allow Remote Code
Execution - OE 6 SP1 - Windows 2000 SP4 <o:p></o:p></span></font></p>
<p class=MsoNormal style='text-autospace:none'><font size=2 face="Courier New"><span
style='font-size:10.0pt;font-family:"Courier New"'>ID: 1003004 MS10-030:
Vulnerability in Outlook Express and Windows Mail Could Allow Remote Code
Execution - OE 6 SP1 - Windows 2000 SP4 - CORRUPT PATCH <o:p></o:p></span></font></p>
<p class=MsoNormal style='text-autospace:none'><font size=2 face="Courier New"><span
style='font-size:10.0pt;font-family:"Courier New"'>ID: 1003005 MS10-030:
Vulnerability in Outlook Express and Windows Mail Could Allow Remote Code
Execution - OE 6 - Windows Live Mail - Windows XP SP2/SP3 <o:p></o:p></span></font></p>
<p class=MsoNormal style='text-autospace:none'><font size=2 face="Courier New"><span
style='font-size:10.0pt;font-family:"Courier New"'>ID: 1003006 MS10-030:
Vulnerability in Outlook Express and Windows Mail Could Allow Remote Code
Execution - OE 6 - Windows Live Mail - Windows XP SP2/SP3 - CORRUPT PATCH <o:p></o:p></span></font></p>
<p class=MsoNormal style='text-autospace:none'><font size=2 face="Courier New"><span
style='font-size:10.0pt;font-family:"Courier New"'>ID: 1003007 MS10-030:
Vulnerability in Outlook Express and Windows Mail Could Allow Remote Code
Execution - OE 6 - Windows Live Mail - Windows XP SP2 (x64) <o:p></o:p></span></font></p>
<p class=MsoNormal style='text-autospace:none'><font size=2 face="Courier New"><span
style='font-size:10.0pt;font-family:"Courier New"'>ID: 1003008 MS10-030:
Vulnerability in Outlook Express and Windows Mail Could Allow Remote Code
Execution - OE 6 - Windows Live Mail - Windows XP SP2 (x64) - CORRUPT PATCH <o:p></o:p></span></font></p>
<p class=MsoNormal style='text-autospace:none'><font size=2 face="Courier New"><span
style='font-size:10.0pt;font-family:"Courier New"'>ID: 1003009 MS10-030:
Vulnerability in Outlook Express and Windows Mail Could Allow Remote Code
Execution - OE 6 - Windows Server 2003 SP2 <o:p></o:p></span></font></p>
<p class=MsoNormal style='text-autospace:none'><font size=2 face="Courier New"><span
style='font-size:10.0pt;font-family:"Courier New"'>ID: 1003010 MS10-030:
Vulnerability in Outlook Express and Windows Mail Could Allow Remote Code
Execution - OE 6 - Windows Server 2003 SP2 - CORRUPT PATCH <o:p></o:p></span></font></p>
<p class=MsoNormal style='text-autospace:none'><font size=2 face="Courier New"><span
style='font-size:10.0pt;font-family:"Courier New"'>ID: 1003011 MS10-030:
Vulnerability in Outlook Express and Windows Mail Could Allow Remote Code
Execution - OE 6 - Windows Server 2003 SP2 (x64) <o:p></o:p></span></font></p>
<p class=MsoNormal style='text-autospace:none'><font size=2 face="Courier New"><span
style='font-size:10.0pt;font-family:"Courier New"'>ID: 1003012 MS10-030:
Vulnerability in Outlook Express and Windows Mail Could Allow Remote Code
Execution - OE 6 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH <o:p></o:p></span></font></p>
<p class=MsoNormal style='text-autospace:none'><font size=2 face="Courier New"><span
style='font-size:10.0pt;font-family:"Courier New"'>ID: 1003013 MS10-030:
Vulnerability in Outlook Express and Windows Mail Could Allow Remote Code
Execution - Windows Mail - Windows Live Mail - Windows <st1:place w:st="on">Vista</st1:place>
SP1/SP2 <o:p></o:p></span></font></p>
<p class=MsoNormal style='text-autospace:none'><font size=2 face="Courier New"><span
style='font-size:10.0pt;font-family:"Courier New"'>ID: 1003015 MS10-030:
Vulnerability in Outlook Express and Windows Mail Could Allow Remote Code
Execution - Windows Mail - Windows Live Mail - Windows <st1:place w:st="on">Vista</st1:place>
SP1/SP2 (x64) <o:p></o:p></span></font></p>
<p class=MsoNormal style='text-autospace:none'><font size=2 face="Courier New"><span
style='font-size:10.0pt;font-family:"Courier New"'>ID: 1003017 MS10-030:
Vulnerability in Outlook Express and Windows Mail Could Allow Remote Code
Execution - Windows Mail - Windows Live Mail - Windows Server 2008 Gold/SP2 <o:p></o:p></span></font></p>
<p class=MsoNormal style='text-autospace:none'><font size=2 face="Courier New"><span
style='font-size:10.0pt;font-family:"Courier New"'>ID: 1003019 MS10-030:
Vulnerability in Outlook Express and Windows Mail Could Allow Remote Code
Execution - Windows Mail - Windows Live Mail - Windows Server 2008 Gold/SP2
(x64) <o:p></o:p></span></font></p>
<p class=MsoNormal style='text-autospace:none'><font size=2 face="Courier New"><span
style='font-size:10.0pt;font-family:"Courier New"'>ID: 1003021 MS10-030:
Vulnerability in Outlook Express and Windows Mail Could Allow Remote Code
Execution - Windows Mail - Windows Live Mail - Windows 7 <o:p></o:p></span></font></p>
<p class=MsoNormal style='text-autospace:none'><font size=2 face="Courier New"><span
style='font-size:10.0pt;font-family:"Courier New"'>ID: 1003023 MS10-030:
Vulnerability in Outlook Express and Windows Mail Could Allow Remote Code
Execution - Windows Mail - Windows Live Mail - Windows 7 (x64) <o:p></o:p></span></font></p>
<p class=MsoNormal style='text-autospace:none'><font size=2 face="Courier New"><span
style='font-size:10.0pt;font-family:"Courier New"'>ID: 1003025 MS10-030:
Vulnerability in Outlook Express and Windows Mail Could Allow Remote Code
Execution - Windows Mail - Windows Live Mail - Windows Server 2008 R2 (x64) <o:p></o:p></span></font></p>
<p class=MsoNormal style='text-autospace:none'><font size=2 face="Courier New"><span
style='font-size:10.0pt;font-family:"Courier New"'>ID: 1003101 MS10-031:
Vulnerability in Microsoft Visual Basic for Applications Could Allow Remote
Code Execution - Office XP SP3 (Local/Network Install) <o:p></o:p></span></font></p>
<p class=MsoNormal style='text-autospace:none'><font size=2 face="Courier New"><span
style='font-size:10.0pt;font-family:"Courier New"'>ID: 1003105 MS10-031:
Vulnerability in Microsoft Visual Basic for Applications Could Allow Remote
Code Execution - Microsoft VBA <o:p></o:p></span></font></p>
<p class=MsoNormal style='text-autospace:none'><font size=2 face="Courier New"><span
style='font-size:10.0pt;font-family:"Courier New"'>ID: 1003106 MS10-031:
Vulnerability in Microsoft Visual Basic for Applications Could Allow Remote
Code Execution - Office 2003 SP3 (Local/Network Install) <o:p></o:p></span></font></p>
<p class=MsoNormal style='text-autospace:none'><font size=2 face="Courier New"><span
style='font-size:10.0pt;font-family:"Courier New"'>ID: 1003111 MS10-031:
Vulnerability in Microsoft Visual Basic for Applications Could Allow Remote
Code Execution - Office 2007 SP1/SP2 <o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 face="Courier New"><span style='font-size:10.0pt;
font-family:"Courier New"'><o:p> </o:p></span></font></p>
<p class=MsoNormal><font size=2 face="Courier New"><span style='font-size:10.0pt;
font-family:"Courier New"'><o:p> </o:p></span></font></p>
<p class=MsoNormal><font size=2 face="Courier New"><span style='font-size:10.0pt;
font-family:"Courier New"'>Patches for Windows (English) / Enterprise Security
published version: 1360<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 face="Courier New"><span style='font-size:10.0pt;
font-family:"Courier New"'><o:p> </o:p></span></font></p>
<p class=MsoNormal><font size=2 face="Courier New"><span style='font-size:10.0pt;
font-family:"Courier New"'>BES administrators are encouraged to verify open
actions and synchronize baselines that contain the modified content.
Instructions for synchronizing baselines can be found here: <a
href="http://support.bigfix.com/cgi-bin/kbdirect.pl?id=401"
title="blocked::http://support.bigfix.com/cgi-bin/kbdirect.pl?id=401">http://support.bigfix.com/cgi-bin/kbdirect.pl?id=401</a>.
Please contact BigFix Technical Support if you have any questions regarding
this change.<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 face="Courier New"><span style='font-size:10.0pt;
font-family:"Courier New"'><o:p> </o:p></span></font></p>
<p class=MsoNormal><font size=2 face="Courier New"><span style='font-size:10.0pt;
font-family:"Courier New"'>--<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 face="Courier New"><span style='font-size:10.0pt;
font-family:"Courier New"'>BigFix Application Engineering Team<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 face="Courier New"><span style='font-size:10.0pt;
font-family:"Courier New"'>_______________________________________________<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 face="Courier New"><span style='font-size:10.0pt;
font-family:"Courier New"'>Besadmin-announcements mailing list<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 face="Courier New"><span style='font-size:10.0pt;
font-family:"Courier New"'>Besadmin-announcements@bigmail.bigfix.com<o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 face="Courier New"><span style='font-size:10.0pt;
font-family:"Courier New"'><a
href="http://bigmail.bigfix.com/mailman/listinfo/besadmin-announcements"
title="blocked::http://bigmail.bigfix.com/mailman/listinfo/besadmin-announcements">http://bigmail.bigfix.com/mailman/listinfo/besadmin-announcements</a><o:p></o:p></span></font></p>
<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'><o:p> </o:p></span></font></p>
<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'><o:p> </o:p></span></font></p>
</div>
</body>
</html>