WelcomeEnterpriseSmall BusinessHome & Home OfficePartnersAbout Symantec
16 June 2006
Symantec Enterprise Security Manager™ OS Patches (Patch) module

Description

The Patches module checks for the presence of operating system and application patches that strengthen system security. Patch information is stored in Patch templates.

Symantec updates Patch templates with the Symantec ESM policy installer. This ensures that updated Patch templates for supported operating systems and applications are available for policies that are delivered with Security Update releases. Installing this update adds or updates the Patches policy and associated template files on the Symantec ESM manager.

This rapid response patch update for Symantec Enterprise Security Manager reports operating system and application patches for both Windows and UNIX operating systems. There are a total of 107 new patch signatures and 2 updated patch signatures in 19 templates.

  • exchg2k.ps5 (Microsoft Exchange Server 2000 on Microsoft Windows 2000 Server - 1 new)
  • exchg2k3.p6s (Microsoft Exchange Server 2003 on Microsoft Windows Server 2003 - 2 new)
  • exchg2k3.ps5 (Microsoft Exchange Server 2003 on Microsoft Windows 2000 Server - 2 new)
  • ie.ps5 (Microsoft Internet Explorer on Microsoft Windows 2000 Server - 4 new)
  • ie.pw5 (Microsoft Internet Explorer on Microsoft Windows 2000 Professional - 4 new)
  • ie.pwx (Microsoft Internet Explorer on Microsoft Windows XP Professional - 2 new)
  • patch.p3i (Microsoft Windows Server 2003 for 64-Bit Itanium-based Systems - 10 new)
  • patch.p64 (Microsoft Windows Server 2003 x64 Editions - 4 new)
  • patch.p6s (Microsoft Windows Server 2003 - 10 new)
  • patch.plx (RedHat Linux and Enterprise Linux - 22 new)
  • patch.ps5 (Microsoft Windows 2000 Server - 5 new)
  • patch.psl (SUSE Linux - 17 new)
  • patch.pw5 (Microsoft Windows 2000 Professional - 5 new)
  • patch.pwx (Microsoft Windows XP Professional - 9 new)
  • wmplayer.p64 (Microsoft Windows Media Player on Microsoft Windows Server 2003 x64 Editions - 1 new)
  • wmplayer.p6s (Microsoft Windows Media Player on Microsoft Windows Server 2003 - 2 new)
  • wmplayer.ps5 (Microsoft Windows Media Player on Microsoft Windows 2000 Server - 2 new)
  • wmplayer.pw5 (Microsoft Windows Media Player on Microsoft Windows 2000 Professional - 2 new)
  • wmplayer.pwx (Microsoft Windows Media Player on Microsoft Windows XP Professional - 3 new, 2 updated)
This rapid response policy includes updates to the Patches module templates that detect new vendor-released patches dated on or before June 16, 2006:
  • Windows Server 2003 64-bit Edition
  • Windows Server 2003
  • Windows XP Professional
  • Windows 2000 Server
  • Windows 2000 Professional
  • Windows NT 4 Server
  • Windows NT 4 Workstation
  • HP-UX
  • AIX
  • Solaris
  • Red Hat Linux
  • Red Hat Enterprise Linux
  • SUSE Linux Standard Server 8
  • SUSE Linux Enterprise Server 8 and 9
  • SUSE Linux Enterprise Server 9 for Itanium Processor Family
The following applications are also supported:
  • Microsoft Internet Explorer (IE)
  • Internet Information Services Web server (IIS)
  • Microsoft SQL Server
  • Microsoft Exchange Server
  • Microsoft Outlook
  • Microsoft Outlook Express
  • Microsoft Visual Studio
This update also includes rapid response support for the detection of vulnerabilities that were disclosed by Microsoft on June 16, 2006.

MS06-021Cumulative Security Update for Internet Explorer (916281)
MS06-022Vulnerability in ART Image Rendering Could Allow Remote Code Execution (918439)
MS06-023Vulnerability in Microsoft JScript Could Allow Remote Code Execution (917344)
MS06-024Vulnerability in Windows Media Player Could Allow Remote Code Execution (917734)
MS06-025Vulnerability in Routing and Remote Access Could Allow Remote Code Execution (911280)
MS06-029Vulnerability in Microsoft Exchange Server Running Outlook Web Access Could Allow Script Injection (912442)
MS06-030Vulnerability in Server Message Block Could Allow Elevation of Privilege (914389)
MS06-031Vulnerability in RPC Mutual Authentication Could Allow Spoofing (917736)
MS06-032Vulnerability in TCP/IP Could Allow Remote Code Execution (917953)


This policy is designed for Symantec ESM agents running SU 21 (and later) versions of the Patch module.

This policy is designed for Symantec ESM agents running SU 21 (and later) versions of the Patch module.

ESM 6.0, 6.1.1, and 6.5 users: To automatically install, use the link below or use LiveUpdate.

Download OS Patch Policy BestPractice_OS_Patch_Updates_20060616.exe Obsoleted

For agents earlier than 6.5, use the LiveUpdate package entitled, Patch Policies - OS Patches for 5.5/ 6.0
For 6.5 agents and later, use the LiveUpdate package entitled, Patch Policies - OS Comprehensive

Note: For more information regarding this update, download the OS Patch Policy Release Notes.


Initial Post on: Friday, 16-Jun-06 11:30:00
Last modified on: Wednesday, 28-Jun-06 22:50:05