Content Modification: Patches for Windows published 2020-01-29

Content in the Patches for Windows site has been modified.

New:
[Major] Security advisory: Scripting Engine Memory Corruption Vulnerability - Disable Workaround (ID: 450033109)
[Major] Security advisory: Scripting Engine Memory Corruption Vulnerability - Disable Workaround (x64) (ID: 286872526)
[Major] Security advisory: Scripting Engine Memory Corruption Vulnerability - Enable Workaround (ID: 450033110)
[Major] Security advisory: Scripting Engine Memory Corruption Vulnerability - Enable Workaround (x64) (ID: 286872527)

Modified:
[Major] Microsoft Unsupported: Windows 7 (ID: 612)
[Major] Microsoft Unsupported: Windows Server 2008 R2 (ID: 613)
[Major] Microsoft Unsupported: Windows Server 2008 (ID: 599)
[Major] MS15-081: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - Office 2016 Gold - KB3085538 (ID: 1508195)

Removed:
[Major] Microsoft Visual Studio 2008 Service Pack 1 Update (ID: 97447901)

Reason for Update:
Fixlets released to enable/disable the workaround described in Microsoft Advisory ADV200001.
Updated file details in KB3085538 fixlet to address a hash mismatch issue.
Unsupported fixlets for Windows 7 and Windows Server 2008 have been updated to be relevant for all systems that have reached end support as of Jan 14, 2020.
Dummy fixlet ID 97447901 was erroneously published and has now been removed from the site.

Actions to Take:
None

Published site version:
Patches for Windows, version 3462

Additional links:
None

Application Engineering Team
BigFix

1 Like

This topic was automatically closed after 30 days. New replies are no longer allowed.