<div class="socmaildefaultfont" dir="ltr" style="font-family:Arial;font-size:10.5pt" ><div dir="ltr" style="font-family:Arial;font-size:10.5pt" ><div dir="ltr" ><div>Content in the Patches for Windows (English) has been released:</div>
<div> </div>
<div><br>New Fixlets:<br>[Major] MS15-124: Vulnerability in Internet Explorer could lead to ASLR bypass - Enable the User32 Exception Handler Hardening Feature - KB3125869 (ID: 1512461)<br>[Major] MS15-124: Vulnerability in Internet Explorer could lead to ASLR bypass - Disable the User32 Exception Handler Hardening Feature - KB3125869 (ID: 1512463)</div>
<div> </div>
<div><br>Reason for Update:<br>Microsoft has announced additional steps users must take to be protected from vulnerability CVE-2015-6161 (Internet Explorer ASLR Bypass).</div>
<div> </div>
<div><br>Actions to Take:</div>
<div>None</div>
<div> </div>
<div><br>Published site version:</div>
<div>Patches for Windows (English), version 2399.</div>
<div> </div>
<div><br>Additional links:</div>
<div>None</div>
<div> </div>
<div><br>Application Engineering Team<br>IBM BigFix</div>
<div> </div>
<div><br> </div></div></div></div><BR>