WelcomeEnterpriseSmall BusinessHome & Home OfficePartnersAbout Symantec
10 February 2005
Symantec Enterprise Security Manager™ OS Patches (Patch) module


The OS Patches (Patch) module checks for the presence of operating system and application patches that strengthen system security. Patch information is stored in Patch templates.

Symantec updates Patch templates with the Symantec ESM policy installer. This ensures that updated Patch templates for supported operating systems and applications are available for policies that are delivered with Security Update releases. Installing this update adds or updates the OS Patches policy and associated template files on the Symantec ESM manager.

This rapid response patch update for Symantec Enterprise Security Manager reports operating system and application patches for both Windows and UNIX operating systems. There are a total of 27 updated patch signatures and 162 new patch signatures in 20 templates:

  • patch.ph1
  • patch.ph2
  • patch_su19.ph1
  • patch.plx
  • patch.ps6
  • patch_su19.ps6
  • patch.psl
  • patch.ps4
  • patch.pw5
  • patch.pwx
  • patch.p6s
  • patch.p3i
  • exchg2k.ps5
  • ie.pw4
  • ie.ps4
  • ie.pw5
  • ie.ps5
  • ie.pwx
  • ie.p6s
  • sharepoint.p6s
This rapid response policy includes updates to the OS Patches (Patch) module templates that detect new vendor-released patches dated on or before February 10, 2005:
  • Windows Server 2003 64-bit Edition
  • Windows Server 2003
  • Windows XP Professional
  • Windows 2000 Server
  • Windows 2000 Professional
  • Windows NT 4 Server
  • Windows NT 4 Workstation
  • HP-UX
  • AIX
  • Solaris
  • Red Hat Linux
  • Red Hat Enterprise Linux
  • SUSE Linux Standard Server 8
  • SUSE Linux Enterprise Server 8
The following applications are also supported:
  • Microsoft Internet Explorer (IE)
  • Internet Information Services Web server (IIS)
  • Microsoft SQL Server
  • Microsoft Exchange Server
  • Microsoft Outlook
  • Microsoft Outlook Express
  • Microsoft Visual Studio
This update also includes rapid response support for the detection of vulnerabilities that were disclosed by Microsoft on February 10, 2005.
MS05-006 Vulnerability in Windows SharePoint Services and SharePoint Team Services Could Allow Cross-Site Scripting and Spoofing Attacks (887981)
MS05-007 Vulnerability in Windows Could Allow Information Disclosure (888302)
MS05-008 Vulnerability in Windows Shell Could Allow Remote Code Execution (890047)
MS05-009 Vulnerability in PNG Processing Could Lead to Buffer Overrun (890261)
MS05-010 Vulnerability in the License Logging Service Could Allow Code Execution (885834)
MS05-011 Vulnerability in Server Message Block Could Allow Remote Code Execution (885250)
MS05-012 Vulnerability in OLE and COM Could Allow Remote Code Execution (873333)
MS05-013 Vulnerability in the DHTML Editing Component ActiveX Control Could Allow Code Execution (891781)
MS05-014 Cumulative Security Update for Internet Explorer (867282)
MS05-015 Vulnerability in Hyperlink Object Library Could Allow Remote Code Execution (888113)

This policy is designed for Symantec ESM agents running SU 17 (and later) versions of the OS Patch module. Symantec ESM agents running SU 16 are acceptable but not recommended. Due to a modification in the method used to extract version information, SU 17 or greater is required for Windows NT.

ESM 5.5 & 6.0 users: To automatically install, use the link below or use LiveUpdate.

Download OS Patch Policy: BestPractice_OS_Patch_Updates_20050210.exe Obsoleted

Note: For more information regarding this update, download the OS Patch Policy Release Notes.

Last modified on: Tuesday, 22-Feb-05 17:32:46