The OS Patches (Patch) module checks for the presence of operating system and application patches that strengthen system security. Patch information is stored in Patch templates.
Symantec updates Patch templates with the Symantec ESM policy installer. This ensures that updated Patch templates for supported operating systems and applications are available for policies that are delivered with Security Update releases. Installing this update adds or updates the OS Patches policy and associated template files on the Symantec ESM manager.
This patch update for Symantec Enterprise Security Manager reports operating system and application patches for Windows and UNIX operating systems. There are a total of 5 updated patch signatures and 57 new patch signatures in 4 UNIX templates. There are a total of 26 new patch signatures in 6 Windows templates:
This rapid response policy includes updates to the OS Patches (Patch) module templates that detect new vendor-released patches dated on or before December 15, 2004:
- patch.ps4 (Windows NT 4 Server)
- patch.pw5 (Windows 2000 Professional)
- patch.ps5 (Windows 2000 Server)
- patch.pwx (Windows XP Professional)
- patch.p6s (Windows Server 2003)
- patch.p3i (Windows Server 2003 64-Bit Edition)
- patch.ph1 (HPUX)
- patch_su19.ph1 (HPUX - SU19)
- patch.plx (RedHat Linux)
- patch.psl (SUSE Linux)
The following applications are also supported:
- Windows Server 2003 64-bit Edition
- Windows Server 2003
- Windows XP Professional
- Windows 2000 Server
- Windows 2000 Professional
- Windows NT 4 Server
- Windows NT 4 Workstation
- Red Hat Linux
- Red Hat Enterprise Linux
- SUSE Linux Standard Server 8
- SUSE Linux Enterprise Server 8
This update also includes rapid response support for the detection of vulnerabilities that were disclosed by Microsoft on December 14, 2004.
- Microsoft Internet Explorer (IE)
- Internet Information Services Web server (IIS)
- Microsoft SQL Server
- Microsoft Exchange Server
- Microsoft Outlook
- Microsoft Outlook Express
- Microsoft Visual Studio
MS04-041 Vulnerability in WordPad Could Allow Code Execution (885836)
MS04-042 Vulnerability in DHCP Could Allow Remote Code Execution and Denial of Service (885249)
MS04-043 Vulnerability in HyperTerminal Could Allow Code Execution (873339)
MS04-043 Vulnerabilities in Windows Kernel and LSASS Could Allow Elevation of Privilege (885835)
MS04-044 Vulnerability in WINS Could Allow Remote Code Execution (870763)
This policy is designed for Symantec ESM agents running SU 17 (and later) versions of the OS Patch module. Symantec ESM agents running SU 16 are acceptable but not recommended. Due to a modification in the method used to extract version information, SU 17 or greater is required for Windows NT.
ESM 5.5 & 6.0 users: To automatically install, use the link below or use LiveUpdate.
Download OS Patch Policy: BestPractice_OS_Patch_Updates_20041215.exeObsoleted
Note: For more information regarding this update, download the OS Patch Policy Release Notes.
Last modified on: Wednesday, 22-Dec-04 16:14:37
©1995 - Symantec Corporation