Hi,

This has been talked about before, so I looked at the archive.  Here's what
I found...

I have a new install of Win2000 server, sp4, Imail 6.06 and the screen
offset issue is already there...how do I roll back the patch that causes the
offset issue, and exactley what is the knowledge base number... is it
Q328310?


Subject: RE: [IMail Forum] Another Screen Offset problem like Q328310 in
IMAIL 6.x!!!!!


My error and apology- I totally misread the hotfix number.

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Stanley Lyzak
Sent: Monday, November 10, 2003 11:06 PM
To: [EMAIL PROTECTED]
Subject: RE: [IMail Forum] Another Screen Offset problem like Q328310 in
IMAIL 6.x!!!!!


Cute.

Let's see...since KB824141 just came out on 10/29/2003, I'd say I have
waited long
enough to install it (i.e. standard wait time for others to blow up).

Maybe your confused.

I am not talking about Q328310.
----- Original Message -----
From: "Vincent Jordan" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Tuesday, November 11, 2003 7:52 PM
Subject: [IMail Forum] FW: Microsoft Windows Security Bulletin Summary for
November 2003


> Title: Microsoft Windows Security Bulletin Summary for
>        November 2003
> Issued: November 11, 2003
> Version Number: 1.0
> Bulletin:
> http://www.microsoft.com/technet/security/bulletin/winnov03.asp
> - --------------------------------------------------------------------
>
> Summary:
> ========
> Included in this advisory are three updates describing newly
> discovered vulnerabilities in Microsoft Windows. These
> vulnerabilities, broken down by severity are:
>
> ** Critical Security Bulletins
>
>     MS03-048 - Cumulative Update for Internet Explorer (824145)
>
>              - Affected Software:
>                - Microsoft Windows Millennium Edition
>                - Microsoft Windows NT Workstation 4.0,
>                  Service Pack 6a
>                - Microsoft Windows NT Server 4.0, Service Pack 6a
>                - Microsoft Windows NT Server 4.0, Terminal Server
>                  Edition, Service Pack 6
>                - Microsoft Windows 2000 Service Pack 2, Service
>                  Pack 3, and Service Pack 4
>                - Microsoft Windows XP,
>                  Microsoft Windows XP Service Pack 1
>                - Microsoft Windows XP 64-Bit Edition
>                - Microsoft Windows XP 64-Bit Edition Version 2003
>                - Microsoft Windows Server 2003
>                - Microsoft Windows Server 2003 64 bit Edition
>
>              - Impact: Remote Code Execution
>              - Version Number: 1.0
>
>     MS03-049 - Buffer Overrun in the Workstation Service Could Allow
>                Code Execution (828749)
>
>              - Affected Software:
>                - Microsoft Windows 2000 Service Pack 2, Service
>                  Pack 3, and Service Pack 4
>                - Microsoft Windows XP,
>                  Microsoft Windows XP Service Pack 1
>                - Microsoft Windows XP 64-Bit Edition
>
>              - Impact: Remote Code Execution
>              - Version Number: 1.0
>
>     MS03-051 - Buffer Overrun in Microsoft FrontPage Server
>                Extensions Could Allow Code Execution (813360)
>
>              - Affected Software:
>                - Microsoft Windows 2000 Service Pack 2, Service
>                  Pack 3
>                - Microsoft Windows XP,
>                  Microsoft Windows XP Service Pack 1
>                - Microsoft Office XP,
>                  Microsoft Office Service Release 1
>
>              - Impact: Remote Code Execution
>              - Version Number: 1.0
>
> Patch Availability:
> ===================
> Patches are available to fix these vulnerabilities.
> For a11itional information, including Technical Details,
> Workarounds, answers to Frequently Asked Questions, and Patch
> Deployment Information please read the Microsoft Windows Security
> Bulletin Summary for November 2003 at:
> http://www.microsoft.com/technet/security/bulletin/winnov03.asp
>
> Acknowledgments:
> ================
> Microsoft thanks the following for working with us to protect
> customers:
>
> - - jelmer
>      ([EMAIL PROTECTED])
>      for reporting the issue described in MS03-048.
>
> - - eEye Digital Security
>      (http://www.eeye.com/)
>      for reporting the issue described in MS03-049.
>
> - - Brett Moore of Security-Assessment.com
>      (http://www.security-assessment.com/)
>      for reporting the issue described in MS03-051.
>
> Support:
> ========
> Technical support is available from Microsoft Product Support
> Services at 1-866-PCSAFETY (1-866-727-2338). There is no charge
> for support calls associated with security patches.
>
> International customers can get support from their local Microsoft
> subsidiaries. There is no charge for support associated
> with security updates. Information on how to contact Microsoft
> support is available at
> http://support.microsoft.com/common/international.aspx.
>
> Revisions:
> ==========
> * V1.0 November 2003: Bulletin Created.
>


To Unsubscribe: http://www.ipswitch.com/support/mailing-lists.html
List Archive: http://www.mail-archive.com/imail_forum%40list.ipswitch.com/
Knowledge Base/FAQ: http://www.ipswitch.com/support/IMail/

Reply via email to