[Bigfix-announcements-french] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (French)'

autonotify at us.ibm.com autonotify at us.ibm.com
Thu Nov 15 04:54:49 PST 2012


Fixlet Site - 'Patches for Windows (French)'
Current Version: 445	Published: Thu, 15 Nov 2012 08:46:12  GMT

New Fixlets:
============

***************************************************************
Title: MS12-046: Vulnerability in Visual Basic for Applications Could Allow Remote Code Execution - Office 2003 SP3 (Local/Network Installation) (French)
Severity: Important
Fixlet ID: 1204606
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-046
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability in Microsoft Visual Basic for Applications. The vulnerability could allow remote code execution if a user opens a legitimate Microsoft Office file (such as a .docx file) that is located in the same directory as a specially crafted dynamic link library (DLL) file. An attacker could then install programs; view, change, or delete data; or create new accounts that have full user rights. If a user is logged on with administrative user rights, an attacker could take complete control of the affected system. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false;  document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" +  link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS12-046: Vulnerability in Visual Basic for Applications Could Allow Remote Code Execution - Office 2003 SP3 (Administrative Installation) (French)
Severity: Important
Fixlet ID: 1204608
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS12-046
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability in Microsoft Visual Basic for Applications. The vulnerability could allow remote code execution if a user opens a legitimate Microsoft Office file (such as a .docx file) that is located in the same directory as a specially crafted dynamic link library (DLL) file. An attacker could then install programs; view, change, or delete data; or create new accounts that have full user rights. If a user is logged on with administrative user rights, an attacker could take complete control of the affected system. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false;  document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" +  link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS12-064: Vulnerabilities in Microsoft Word Could Allow Remote Code Execution - Office 2010 SP1 (x64) (French)
Severity: Critical
Fixlet ID: 1206407
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-064

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Office. The more severe vulnerability could allow remote code execution if a user opens or previews a specially crafted RTF file. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-064: Vulnerabilities in Microsoft Word Could Allow Remote Code Execution - SharePoint Server 2010 SP1 - Word Automation Services (x64) (French)
Severity: Important
Fixlet ID: 1206413
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-064

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Office. The more severe vulnerability could allow remote code execution if a user opens or previews a specially crafted RTF file. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-064: Vulnerabilities in Microsoft Word Could Allow Remote Code Execution - Office Web Apps 2010 SP1  (x64) (French)
Severity: Important
Fixlet ID: 1206415
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-064

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Office. The more severe vulnerability could allow remote code execution if a user opens or previews a specially crafted RTF file. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-066: Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege - InfoPath 2010 SP1 (x64) (KB2687436) (French)
Severity: Important
Fixlet ID: 1206609
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-066

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Office, Microsoft Communications Platforms, Microsoft Server software, and Microsoft Office Web Apps. The vulnerability could allow elevation of privilege if an attacker sends specially crafted content to a user. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-066: Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege - InfoPath 2010 SP1 (x64) (KB2687417) (French)
Severity: Important
Fixlet ID: 1206611
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-066

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Office, Microsoft Communications Platforms, Microsoft Server software, and Microsoft Office Web Apps. The vulnerability could allow elevation of privilege if an attacker sends specially crafted content to a user. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-066: Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege - Lync 2010 (x64) (French)
Severity: Important
Fixlet ID: 1206617
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-066

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Office, Microsoft Communications Platforms, Microsoft Server software, and Microsoft Office Web Apps. The vulnerability could allow elevation of privilege if an attacker sends specially crafted content to a user. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-066: Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege - SharePoint Server 2007 Gold/SP2/SP3 (x64) (French)
Severity: Important
Fixlet ID: 1206625
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-066

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Office, Microsoft Communications Platforms, Microsoft Server software, and Microsoft Office Web Apps. The vulnerability could allow elevation of privilege if an attacker sends specially crafted content to a user. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-066: Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege - SharePoint Server 2010 SP1 (wosrv) (x64) (French)
Severity: Important
Fixlet ID: 1206627
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-066

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Office, Microsoft Communications Platforms, Microsoft Server software, and Microsoft Office Web Apps. The vulnerability could allow elevation of privilege if an attacker sends specially crafted content to a user. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-066: Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege - SharePoint Server 2010 SP1 (x64) (French)
Severity: Important
Fixlet ID: 1206629
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-066

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Office, Microsoft Communications Platforms, Microsoft Server software, and Microsoft Office Web Apps. The vulnerability could allow elevation of privilege if an attacker sends specially crafted content to a user. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-066: Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege - Groove Server 2010 SP1 (x64) (French)
Severity: Important
Fixlet ID: 1206631
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-066

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Office, Microsoft Communications Platforms, Microsoft Server software, and Microsoft Office Web Apps. The vulnerability could allow elevation of privilege if an attacker sends specially crafted content to a user. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-066: Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege - Windows SharePoint Services 3.0 SP2 (x64) (French)
Severity: Important
Fixlet ID: 1206635
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-066

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Office, Microsoft Communications Platforms, Microsoft Server software, and Microsoft Office Web Apps. The vulnerability could allow elevation of privilege if an attacker sends specially crafted content to a user. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-066: Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege - SharePoint Foundation 2010 SP1(x64) (French)
Severity: Important
Fixlet ID: 1206637
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-066

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Office, Microsoft Communications Platforms, Microsoft Server software, and Microsoft Office Web Apps. The vulnerability could allow elevation of privilege if an attacker sends specially crafted content to a user. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-066: Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege - Office Web Apps 2010 SP1(x64) (French)
Severity: Important
Fixlet ID: 1206639
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-066

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Office, Microsoft Communications Platforms, Microsoft Server software, and Microsoft Office Web Apps. The vulnerability could allow elevation of privilege if an attacker sends specially crafted content to a user. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-067: Vulnerabilities in FAST Search Server 2010 for SharePoint Parsing Could Allow Remote Code Execution - FAST Search Server 2010 for SharePoint SP1 (x64) (French)
Severity: Important
Fixlet ID: 1206701
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-067

Fixlet Description: Microsoft has released a security update that resolves publicly disclosed vulnerabilities in Microsoft FAST Search Server 2010 for SharePoint. The vulnerabilities could allow remote code execution in the security context of a user account with a restricted token. FAST Search Server for SharePoint is only affected by this issue when Advanced Filter Pack is enabled. By default, Advanced Filter Pack is disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-068: Vulnerability in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) (French)
Severity: Important
Fixlet ID: 1206807
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-068

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in all supported releases of Microsoft Windows except Windows 8 and Windows Server 2012. This security update is rated Important for all supported editions of Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-068: Vulnerability in Windows Kernel Could Allow Elevation of Privilege - Windows Vista SP2 (x64) (French)
Severity: Important
Fixlet ID: 1206811
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-068

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in all supported releases of Microsoft Windows except Windows 8 and Windows Server 2012. This security update is rated Important for all supported editions of Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-068: Vulnerability in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2008 SP2 (x64) (French)
Severity: Important
Fixlet ID: 1206815
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-068

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in all supported releases of Microsoft Windows except Windows 8 and Windows Server 2012. This security update is rated Important for all supported editions of Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-068: Vulnerability in Windows Kernel Could Allow Elevation of Privilege - Windows 7 Gold/SP1 (x64) (French)
Severity: Important
Fixlet ID: 1206819
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-068

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in all supported releases of Microsoft Windows except Windows 8 and Windows Server 2012. This security update is rated Important for all supported editions of Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-068: Vulnerability in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2008 R2 Gold/SP1 (x64) (French)
Severity: Important
Fixlet ID: 1206821
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-068

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in all supported releases of Microsoft Windows except Windows 8 and Windows Server 2012. This security update is rated Important for all supported editions of Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-069: Vulnerability in Kerberos Could Allow Denial of Service - Windows 7 Gold/SP1 (x64) (French)
Severity: Important
Fixlet ID: 1206903
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-069

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if a remote attacker sends a specially crafted session request to the Kerberos server. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-069: Vulnerability in Kerberos Could Allow Denial of Service - Windows Server 2008 R2 Gold/SP1 (x64) (French)
Severity: Important
Fixlet ID: 1206905
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-069

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if a remote attacker sends a specially crafted session request to the Kerberos server. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-070: Vulnerability in SQL Server Could Allow Elevation of Privilege - SQL Server 2005 SP4 - QFE Branch (x64) (French)
Severity: Important
Fixlet ID: 1207007
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-070

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft SQL Server on systems running SQL Server Reporting Services (SSRS). The vulnerability is a cross-site-scripting (XSS) vulnerability that could allow elevation of privilege, enabling an attacker to execute arbitrary commands on the SSRS site in the context of the targeted user. An attacker could exploit this vulnerability by sending a specially crafted link to the user and convincing the user to click the link. An attacker could also host a website that contains a webpage designed to exploit the vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-070: Vulnerability in SQL Server Could Allow Elevation of Privilege - SQL Server 2005 SP4 - GDR Branch (x64) (French)
Severity: Important
Fixlet ID: 1207009
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-070

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft SQL Server on systems running SQL Server Reporting Services (SSRS). The vulnerability is a cross-site-scripting (XSS) vulnerability that could allow elevation of privilege, enabling an attacker to execute arbitrary commands on the SSRS site in the context of the targeted user. An attacker could exploit this vulnerability by sending a specially crafted link to the user and convincing the user to click the link. An attacker could also host a website that contains a webpage designed to exploit the vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-070: Vulnerability in SQL Server Could Allow Elevation of Privilege - SQL Server 2008 SP2 - QFE Branch (x64) (French)
Severity: Important
Fixlet ID: 1207019
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-070

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft SQL Server on systems running SQL Server Reporting Services (SSRS). The vulnerability is a cross-site-scripting (XSS) vulnerability that could allow elevation of privilege, enabling an attacker to execute arbitrary commands on the SSRS site in the context of the targeted user. An attacker could exploit this vulnerability by sending a specially crafted link to the user and convincing the user to click the link. An attacker could also host a website that contains a webpage designed to exploit the vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-070: Vulnerability in SQL Server Could Allow Elevation of Privilege - SQL Server 2008 SP2 - GDR Branch (x64) (French)
Severity: Important
Fixlet ID: 1207021
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-070

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft SQL Server on systems running SQL Server Reporting Services (SSRS). The vulnerability is a cross-site-scripting (XSS) vulnerability that could allow elevation of privilege, enabling an attacker to execute arbitrary commands on the SSRS site in the context of the targeted user. An attacker could exploit this vulnerability by sending a specially crafted link to the user and convincing the user to click the link. An attacker could also host a website that contains a webpage designed to exploit the vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-070: Vulnerability in SQL Server Could Allow Elevation of Privilege - SQL Server 2008 SP3 - QFE Branch (x64) (French)
Severity: Important
Fixlet ID: 1207023
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-070

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft SQL Server on systems running SQL Server Reporting Services (SSRS). The vulnerability is a cross-site-scripting (XSS) vulnerability that could allow elevation of privilege, enabling an attacker to execute arbitrary commands on the SSRS site in the context of the targeted user. An attacker could exploit this vulnerability by sending a specially crafted link to the user and convincing the user to click the link. An attacker could also host a website that contains a webpage designed to exploit the vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-070: Vulnerability in SQL Server Could Allow Elevation of Privilege - SQL Server 2008 SP3 - GDR Branch (x64) (French)
Severity: Important
Fixlet ID: 1207025
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-070

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft SQL Server on systems running SQL Server Reporting Services (SSRS). The vulnerability is a cross-site-scripting (XSS) vulnerability that could allow elevation of privilege, enabling an attacker to execute arbitrary commands on the SSRS site in the context of the targeted user. An attacker could exploit this vulnerability by sending a specially crafted link to the user and convincing the user to click the link. An attacker could also host a website that contains a webpage designed to exploit the vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-070: Vulnerability in SQL Server Could Allow Elevation of Privilege - SQL Server 2008 R2 SP1 - QFE Branch (x64) (French)
Severity: Important
Fixlet ID: 1207031
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-070

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft SQL Server on systems running SQL Server Reporting Services (SSRS). The vulnerability is a cross-site-scripting (XSS) vulnerability that could allow elevation of privilege, enabling an attacker to execute arbitrary commands on the SSRS site in the context of the targeted user. An attacker could exploit this vulnerability by sending a specially crafted link to the user and convincing the user to click the link. An attacker could also host a website that contains a webpage designed to exploit the vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-070: Vulnerability in SQL Server Could Allow Elevation of Privilege - SQL Server 2008 R2 SP1 - GDR Branch (x64) (French)
Severity: Important
Fixlet ID: 1207033
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-070

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft SQL Server on systems running SQL Server Reporting Services (SSRS). The vulnerability is a cross-site-scripting (XSS) vulnerability that could allow elevation of privilege, enabling an attacker to execute arbitrary commands on the SSRS site in the context of the targeted user. An attacker could exploit this vulnerability by sending a specially crafted link to the user and convincing the user to click the link. An attacker could also host a website that contains a webpage designed to exploit the vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-070: Vulnerability in SQL Server Could Allow Elevation of Privilege - SQL Server 2012 - QFE Branch (x64) (French)
Severity: Important
Fixlet ID: 1207039
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-070

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft SQL Server on systems running SQL Server Reporting Services (SSRS). The vulnerability is a cross-site-scripting (XSS) vulnerability that could allow elevation of privilege, enabling an attacker to execute arbitrary commands on the SSRS site in the context of the targeted user. An attacker could exploit this vulnerability by sending a specially crafted link to the user and convincing the user to click the link. An attacker could also host a website that contains a webpage designed to exploit the vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-070: Vulnerability in SQL Server Could Allow Elevation of Privilege - SQL Server 2012 - GDR Branch (x64) (French)
Severity: Important
Fixlet ID: 1207041
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-070

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft SQL Server on systems running SQL Server Reporting Services (SSRS). The vulnerability is a cross-site-scripting (XSS) vulnerability that could allow elevation of privilege, enabling an attacker to execute arbitrary commands on the SSRS site in the context of the targeted user. An attacker could exploit this vulnerability by sending a specially crafted link to the user and convincing the user to click the link. An attacker could also host a website that contains a webpage designed to exploit the vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-071: Cumulative Security Update for Internet Explorer - IE 9 - Windows Vista SP2 (French)
Severity: Critical
Fixlet ID: 1207101
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-071

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-071: Cumulative Security Update for Internet Explorer - IE 9 - Windows Vista SP2 (x64) (French)
Severity: Critical
Fixlet ID: 1207103
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-071

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-071: Cumulative Security Update for Internet Explorer - IE 9 - Windows Server 2008 SP2 (French)
Severity: Moderate
Fixlet ID: 1207105
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-071

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-071: Cumulative Security Update for Internet Explorer - IE 9 - Windows Server 2008 SP2 (x64) (French)
Severity: Moderate
Fixlet ID: 1207107
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-071

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-071: Cumulative Security Update for Internet Explorer - IE 9 - Windows 7 Gold/SP1 (French)
Severity: Critical
Fixlet ID: 1207109
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-071

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-071: Cumulative Security Update for Internet Explorer - IE 9 - Windows 7 Gold/SP1 (x64) (French)
Severity: Critical
Fixlet ID: 1207111
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-071

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-071: Cumulative Security Update for Internet Explorer - IE 9 - Windows Server 2008 R2 Gold/SP1 (x64) (French)
Severity: Moderate
Fixlet ID: 1207113
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-071

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-072: Vulnerabilities in Windows Shell Could Allow Remote Code Execution - Windows XP SP3 (French)
Severity: Critical
Fixlet ID: 1207201
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-072

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user browses to a specially crafted briefcase in Windows Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code as the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-072: Vulnerabilities in Windows Shell Could Allow Remote Code Execution - Windows XP SP3 - CORRUPT PATCH (French)
Severity: Critical
Fixlet ID: 1207202
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-072

***************************************************************
Title: MS12-072: Vulnerabilities in Windows Shell Could Allow Remote Code Execution - Windows Server 2003 SP2 (French)
Severity: Critical
Fixlet ID: 1207205
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-072

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user browses to a specially crafted briefcase in Windows Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code as the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-072: Vulnerabilities in Windows Shell Could Allow Remote Code Execution - Windows Server 2003 SP2 - CORRUPT PATCH (French)
Severity: Critical
Fixlet ID: 1207206
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-072

***************************************************************
Title: MS12-072: Vulnerabilities in Windows Shell Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (French)
Severity: Critical
Fixlet ID: 1207207
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-072

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user browses to a specially crafted briefcase in Windows Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code as the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-072: Vulnerabilities in Windows Shell Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (French)
Severity: Critical
Fixlet ID: 1207208
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-072

***************************************************************
Title: MS12-072: Vulnerabilities in Windows Shell Could Allow Remote Code Execution - Windows Vista SP2 (French)
Severity: Critical
Fixlet ID: 1207209
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-072

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user browses to a specially crafted briefcase in Windows Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code as the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-072: Vulnerabilities in Windows Shell Could Allow Remote Code Execution - Windows Vista SP2 (x64) (French)
Severity: Critical
Fixlet ID: 1207211
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-072

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user browses to a specially crafted briefcase in Windows Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code as the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-072: Vulnerabilities in Windows Shell Could Allow Remote Code Execution - Windows Server 2008 SP2 (French)
Severity: Critical
Fixlet ID: 1207213
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-072

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user browses to a specially crafted briefcase in Windows Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code as the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-072: Vulnerabilities in Windows Shell Could Allow Remote Code Execution - Windows Server 2008 SP2 (x64) (French)
Severity: Critical
Fixlet ID: 1207215
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-072

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user browses to a specially crafted briefcase in Windows Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code as the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-072: Vulnerabilities in Windows Shell Could Allow Remote Code Execution - Windows 7 Gold/SP1 (French)
Severity: Critical
Fixlet ID: 1207217
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-072

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user browses to a specially crafted briefcase in Windows Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code as the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-072: Vulnerabilities in Windows Shell Could Allow Remote Code Execution - Windows 7 Gold/SP1 (x64) (French)
Severity: Critical
Fixlet ID: 1207219
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-072

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user browses to a specially crafted briefcase in Windows Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code as the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-072: Vulnerabilities in Windows Shell Could Allow Remote Code Execution - Windows Server 2008 R2 Gold /SP1 (x64) (French)
Severity: Critical
Fixlet ID: 1207221
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-072

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user browses to a specially crafted briefcase in Windows Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code as the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-073: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Information Disclosure - FTP Service 7.0 for IIS 7.0 - Windows Vista SP2 (French)
Severity: Moderate
Fixlet ID: 1207301
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-073

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft Internet Information Services (IIS). The more severe vulnerability could allow information disclosure if an attacker sends specially crafted FTP commands to the server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-073: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Information Disclosure - FTP Service 7.5 for IIS 7.0 - Windows Vista SP2 (French)
Severity: Moderate
Fixlet ID: 1207303
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-073

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft Internet Information Services (IIS). The more severe vulnerability could allow information disclosure if an attacker sends specially crafted FTP commands to the server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-073: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Information Disclosure - FTP Service 7.0 for IIS 7.0 - Windows Vista SP2 (x64) (French)
Severity: Moderate
Fixlet ID: 1207305
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-073

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft Internet Information Services (IIS). The more severe vulnerability could allow information disclosure if an attacker sends specially crafted FTP commands to the server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-073: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Information Disclosure - FTP Service 7.5 for IIS 7.0 - Windows Vista SP2 (x64) (French)
Severity: Moderate
Fixlet ID: 1207307
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-073

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft Internet Information Services (IIS). The more severe vulnerability could allow information disclosure if an attacker sends specially crafted FTP commands to the server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-073: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Information Disclosure - FTP Service 7.0 for IIS 7.0 - Windows Server 2008 SP2 (French)
Severity: Moderate
Fixlet ID: 1207309
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-073

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft Internet Information Services (IIS). The more severe vulnerability could allow information disclosure if an attacker sends specially crafted FTP commands to the server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-073: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Information Disclosure - FTP Service 7.5 for IIS 7.0 - Windows Server 2008 SP2 (French)
Severity: Moderate
Fixlet ID: 1207311
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-073

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft Internet Information Services (IIS). The more severe vulnerability could allow information disclosure if an attacker sends specially crafted FTP commands to the server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-073: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Information Disclosure - FTP Service 7.0 for IIS 7.0 - Windows Server 2008 SP2 (x64) (French)
Severity: Moderate
Fixlet ID: 1207313
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-073

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft Internet Information Services (IIS). The more severe vulnerability could allow information disclosure if an attacker sends specially crafted FTP commands to the server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-073: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Information Disclosure - FTP Service 7.5 for IIS 7.0 - Windows Server 2008 SP2 (x64) (French)
Severity: Moderate
Fixlet ID: 1207315
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-073

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft Internet Information Services (IIS). The more severe vulnerability could allow information disclosure if an attacker sends specially crafted FTP commands to the server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-073: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Information Disclosure - FTP Service 7.5 for IIS 7.5 - Windows 7 Gold/SP1 (French)
Severity: Moderate
Fixlet ID: 1207317
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-073

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft Internet Information Services (IIS). The more severe vulnerability could allow information disclosure if an attacker sends specially crafted FTP commands to the server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-073: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Information Disclosure - IIS 7.5 - Windows 7 Gold/SP1 (French)
Severity: Moderate
Fixlet ID: 1207319
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-073

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft Internet Information Services (IIS). The more severe vulnerability could allow information disclosure if an attacker sends specially crafted FTP commands to the server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-073: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Information Disclosure - FTP Service 7.5 for IIS 7.5 - Windows 7 Gold/SP1 (x64) (French)
Severity: Moderate
Fixlet ID: 1207321
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-073

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft Internet Information Services (IIS). The more severe vulnerability could allow information disclosure if an attacker sends specially crafted FTP commands to the server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-073: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Information Disclosure - IIS 7.5 - Windows 7 Gold/SP1 (x64) (French)
Severity: Moderate
Fixlet ID: 1207323
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-073

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft Internet Information Services (IIS). The more severe vulnerability could allow information disclosure if an attacker sends specially crafted FTP commands to the server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-073: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Information Disclosure - FTP Service 7.5 for IIS 7.5 - Windows Server 2008 R2 Gold/SP1 (x64) (French)
Severity: Moderate
Fixlet ID: 1207325
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-073

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft Internet Information Services (IIS). The more severe vulnerability could allow information disclosure if an attacker sends specially crafted FTP commands to the server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-073: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Information Disclosure - IIS 7.5 - Windows Server 2008 R2 Gold/SP1 (x64) (French)
Severity: Moderate
Fixlet ID: 1207327
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-073

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft Internet Information Services (IIS). The more severe vulnerability could allow information disclosure if an attacker sends specially crafted FTP commands to the server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-074: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - .NET Framework 1.0 SP3 - Tablet PC/Media Center Edition (French)
Severity: Important
Fixlet ID: 1207401
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-074

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow remote code execution if an attacker convinces the user of a target system to use a malicious proxy auto configuration file and then injects code into the currently running application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-074: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - .NET Framework 1.1 SP1 - Windows XP SP2 / Server 2003 SP2 / Vista SP2 / Server 2008 SP2 (x64) (French)
Severity: Important
Fixlet ID: 1207403
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-074

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow remote code execution if an attacker convinces the user of a target system to use a malicious proxy auto configuration file and then injects code into the currently running application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-074: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - .NET Framework 2.0 SP2 - Windows XP SP3 /Server 2003 SP2 (French)
Severity: Critical
Fixlet ID: 1207405
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-074

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow remote code execution if an attacker convinces the user of a target system to use a malicious proxy auto configuration file and then injects code into the currently running application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-074: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - .NET Framework 4 - Windows XP SP3 / Server 2003 SP2 / Vista SP2 / Server 2008 SP2 / 7 Gold/SP1 (French)
Severity: Critical
Fixlet ID: 1207407
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-074

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow remote code execution if an attacker convinces the user of a target system to use a malicious proxy auto configuration file and then injects code into the currently running application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-074: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - .NET Framework 4 - Windows XP SP3 / Server 2003 SP2 / Vista SP2 / Server 2008 SP2 / 7 Gold/SP1 (KB2737019) (French)
Severity: Important
Fixlet ID: 1207409
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-074

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow remote code execution if an attacker convinces the user of a target system to use a malicious proxy auto configuration file and then injects code into the currently running application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-074: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - .NET Framework 2.0 SP2 - Windows XP SP2 / Server 2003 SP2 (x64) (French)
Severity: Critical
Fixlet ID: 1207411
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-074

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow remote code execution if an attacker convinces the user of a target system to use a malicious proxy auto configuration file and then injects code into the currently running application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-074: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - .NET Framework 4 - Windows XP SP2 / Server 2003 SP2 / Vista SP2 / Server 2008 SP2 / 7 Gold/SP1 / 2008 R2 Gold/SP1 (x64) (French)
Severity: Critical
Fixlet ID: 1207413
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-074

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow remote code execution if an attacker convinces the user of a target system to use a malicious proxy auto configuration file and then injects code into the currently running application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-074: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - .NET Framework 4 - Windows XP SP3 / 2003 SP2 / Vista SP2 / 2008 SP2 / 7 Gold/SP1 / 2008 R2 Gold/SP1 (x64) (French)
Severity: Important
Fixlet ID: 1207415
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-074

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow remote code execution if an attacker convinces the user of a target system to use a malicious proxy auto configuration file and then injects code into the currently running application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-074: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - .NET Framework 1.1 SP1 - Server 2003 SP2 (French)
Severity: Important
Fixlet ID: 1207417
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-074

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow remote code execution if an attacker convinces the user of a target system to use a malicious proxy auto configuration file and then injects code into the currently running application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-074: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - .NET Framework 2.0 SP2 - Windows Vista SP2 / Server 2008 SP2 (French)
Severity: Critical
Fixlet ID: 1207419
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-074

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow remote code execution if an attacker convinces the user of a target system to use a malicious proxy auto configuration file and then injects code into the currently running application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-074: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - .NET Framework 4.5 - Windows Vista SP2 / Server 2008 SP2 / 7 SP1 (French)
Severity: Critical
Fixlet ID: 1207421
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-074

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow remote code execution if an attacker convinces the user of a target system to use a malicious proxy auto configuration file and then injects code into the currently running application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-074: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - .NET Framework 4.5 - Windows Vista SP2 / Server 2008 SP2 / 7 SP1 (French)
Severity: Important
Fixlet ID: 1207423
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-074

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow remote code execution if an attacker convinces the user of a target system to use a malicious proxy auto configuration file and then injects code into the currently running application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-074: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - .NET Framework 2.0 SP2 - Windows Vista SP2 / Server 2008 SP2 (x64) (French)
Severity: Critical
Fixlet ID: 1207425
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-074

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow remote code execution if an attacker convinces the user of a target system to use a malicious proxy auto configuration file and then injects code into the currently running application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-074: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - .NET Framework 4.5 - Windows Vista SP2 / Server 2008 SP2 /  7 SP1 / Server 2008 R2 SP1 (KB2729460) (x64) (French)
Severity: Critical
Fixlet ID: 1207427
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-074

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow remote code execution if an attacker convinces the user of a target system to use a malicious proxy auto configuration file and then injects code into the currently running application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-074: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - .NET Framework 4.5 - Windows Vista SP2 / 2008 SP2 / 7 SP1 / 2008 R2 SP1 (x64) (French)
Severity: Important
Fixlet ID: 1207429
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-074

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow remote code execution if an attacker convinces the user of a target system to use a malicious proxy auto configuration file and then injects code into the currently running application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-074: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - .NET Framework 3.5.1 - Windows 7 Gold (French)
Severity: Critical
Fixlet ID: 1207431
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-074

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow remote code execution if an attacker convinces the user of a target system to use a malicious proxy auto configuration file and then injects code into the currently running application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-074: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - .NET Framework 3.5.1 - Windows 7 SP1 (French)
Severity: Critical
Fixlet ID: 1207433
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-074

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow remote code execution if an attacker convinces the user of a target system to use a malicious proxy auto configuration file and then injects code into the currently running application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-074: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - .NET Framework 3.5.1 - Windows 7 / Server 2008 R2 Gold (x64) (French)
Severity: Critical
Fixlet ID: 1207435
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-074

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow remote code execution if an attacker convinces the user of a target system to use a malicious proxy auto configuration file and then injects code into the currently running application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-074: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - .NET Framework 3.5.1 - Windows 7 SP1 / Server 2008 R2 SP1 (x64) (French)
Severity: Critical
Fixlet ID: 1207437
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-074

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow remote code execution if an attacker convinces the user of a target system to use a malicious proxy auto configuration file and then injects code into the currently running application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-074: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - .NET Framework 1.1 SP1 - Windows XP SP3 / Vista SP2 / Server 2008 SP2 (French)
Severity: Important
Fixlet ID: 1207449
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-074

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow remote code execution if an attacker convinces the user of a target system to use a malicious proxy auto configuration file and then injects code into the currently running application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-075: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows XP SP3 (French)
Severity: Critical
Fixlet ID: 1207501
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-075

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits a malicious webpage that embeds TrueType font files. An attacker would have to convince users to visit the website, typically by getting them to click a link in an email message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-075: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows XP SP3 - CORRUPT PATCH (French)
Severity: Critical
Fixlet ID: 1207502
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-075

***************************************************************
Title: MS12-075: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows Server 2003 SP2 (French)
Severity: Critical
Fixlet ID: 1207505
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-075

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits a malicious webpage that embeds TrueType font files. An attacker would have to convince users to visit the website, typically by getting them to click a link in an email message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-075: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows Server 2003 SP2 - CORRUPT PATCH (French)
Severity: Critical
Fixlet ID: 1207506
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-075

***************************************************************
Title: MS12-075: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (French)
Severity: Critical
Fixlet ID: 1207507
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-075

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits a malicious webpage that embeds TrueType font files. An attacker would have to convince users to visit the website, typically by getting them to click a link in an email message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-075: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (French)
Severity: Critical
Fixlet ID: 1207508
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-075

***************************************************************
Title: MS12-075: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows Vista SP2 (French)
Severity: Critical
Fixlet ID: 1207509
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-075

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits a malicious webpage that embeds TrueType font files. An attacker would have to convince users to visit the website, typically by getting them to click a link in an email message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-075: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows Vista SP2 (x64) (French)
Severity: Critical
Fixlet ID: 1207511
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-075

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits a malicious webpage that embeds TrueType font files. An attacker would have to convince users to visit the website, typically by getting them to click a link in an email message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-075: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows Server 2008 SP2 (French)
Severity: Critical
Fixlet ID: 1207513
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-075

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits a malicious webpage that embeds TrueType font files. An attacker would have to convince users to visit the website, typically by getting them to click a link in an email message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-075: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows Server 2008 SP2 (x64) (French)
Severity: Critical
Fixlet ID: 1207515
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-075

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits a malicious webpage that embeds TrueType font files. An attacker would have to convince users to visit the website, typically by getting them to click a link in an email message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-075: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows 7 Gold/SP1 (French)
Severity: Critical
Fixlet ID: 1207517
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-075

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits a malicious webpage that embeds TrueType font files. An attacker would have to convince users to visit the website, typically by getting them to click a link in an email message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-075: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows 7 Gold/SP1 (x64) (French)
Severity: Critical
Fixlet ID: 1207519
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-075

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits a malicious webpage that embeds TrueType font files. An attacker would have to convince users to visit the website, typically by getting them to click a link in an email message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-075: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows Server 2008 R2 Gold/SP1 (x64) (French)
Severity: Critical
Fixlet ID: 1207521
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-075

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits a malicious webpage that embeds TrueType font files. An attacker would have to convince users to visit the website, typically by getting them to click a link in an email message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-076: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution - Excel 2003 SP3 - Office 2003 SP3 (Local/Network Install) (French)
Severity: Important
Fixlet ID: 1207606
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-076
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a specially crafted Excel file with an affected version of Microsoft Excel. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. var isEvansOrLater = '' == 'True'?true:false;  document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" +  link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS12-076: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution - Excel 2003 SP3 - Office 2003 SP3 (Administrative Installation) (French)
Severity: Important
Fixlet ID: 1207608
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-076
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a specially crafted Excel file with an affected version of Microsoft Excel. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS12-076: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution - Excel 2007 SP2/SP3 - Office 2007 SP2/SP3 (French)
Severity: Important
Fixlet ID: 1207616
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-076
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a specially crafted Excel file with an affected version of Microsoft Excel. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS12-076: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution - Excel 2010 SP1 - Office 2010 SP1 (French)
Severity: Important
Fixlet ID: 1207621
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-076
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a specially crafted Excel file with an affected version of Microsoft Excel. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. var isEvansOrLater = '' == 'True'?true:false;  document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" +  link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS12-076: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution - Excel 2010 SP1 - Office 2010 SP1 (x64) (French)
Severity: Important
Fixlet ID: 1207626
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-076
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a specially crafted Excel file with an affected version of Microsoft Excel. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS12-076: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution - Excel Viewer 2007 (French)
Severity: Important
Fixlet ID: 1207631
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-076
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a specially crafted Excel file with an affected version of Microsoft Excel. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS12-076: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution - Office Compatibility Pack SP2/SP3 (French)
Severity: Important
Fixlet ID: 1207636
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-076
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a specially crafted Excel file with an affected version of Microsoft Excel. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: 2661254: Update For Minimum Certificate Key Length - Windows XP SP3 (French)
Severity: N/A
Fixlet ID: 266125401
Fixlet Link: http://technet.microsoft.com/FR-FR/security/advisory/2661254

Fixlet Description: Microsoft is announcing the availability of an update to Windows that restricts the use of certificates with RSA keys less than 1024 bits in length. The private keys used in these certificates can be derived and could allow an attacker to duplicate the certificates and use them fraudulently to spoof content, perform phishing attacks, or perform man-in-the-middle attacks. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: 2735855: Network connection is slow when you run a WFP-based application on a computer that is running Windows 7 or Windows Server 2008 R2 - Windows 7 SP1 (French)
Severity: N/A
Fixlet ID: 273585501
Fixlet Link: http://support.microsoft.com/kb/2735855

Fixlet Description: Microsoft is providing an update to solve the issue: assume that you run an application that is developed by using Windows Filtering Platform (WFP) API on a computer that is running Windows 7 or Windows Server 2008 R2. When the application filters network traffic, the network connection is slow.

***************************************************************
Title: 2735855: Network connection is slow when you run a WFP-based application on a computer that is running Windows 7 or Windows Server 2008 R2 - Windows 7 SP1 (x64) (French)
Severity: N/A
Fixlet ID: 273585503
Fixlet Link: http://support.microsoft.com/kb/2735855

Fixlet Description: Microsoft is providing an update to solve the issue: assume that you run an application that is developed by using Windows Filtering Platform (WFP) API on a computer that is running Windows 7 or Windows Server 2008 R2. When the application filters network traffic, the network connection is slow.

***************************************************************
Title: 2735855: Network connection is slow when you run a WFP-based application on a computer that is running Windows 7 or Windows Server 2008 R2 - Windows Server 2008 R2 SP1 (x64) (French)
Severity: N/A
Fixlet ID: 273585505
Fixlet Link: http://support.microsoft.com/kb/2735855

Fixlet Description: Microsoft is providing an update to solve the issue: assume that you run an application that is developed by using Windows Filtering Platform (WFP) API on a computer that is running Windows 7 or Windows Server 2008 R2. When the application filters network traffic, the network connection is slow.

***************************************************************
Title: 2756822: Oct. 2012 Cumulative Time Zone Update - Windows XP SP3 (French)
Severity: N/A
Fixlet ID: 275682201
Fixlet Link: http://support.microsoft.com/kb/2756822

Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. 

Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates.

***************************************************************
Title: 2756822: Oct. 2012 Cumulative Time Zone Update - Windows Server 2003 SP2 (French)
Severity: N/A
Fixlet ID: 275682203
Fixlet Link: http://support.microsoft.com/kb/2756822

Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. 

Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates.

***************************************************************
Title: 2756822: Oct. 2012 Cumulative Time Zone Update - Windows Vista SP2 (French)
Severity: N/A
Fixlet ID: 275682205
Fixlet Link: http://support.microsoft.com/kb/2756822

Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. 

Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates.

***************************************************************
Title: 2756822: Oct. 2012 Cumulative Time Zone Update - Windows Server 2008 SP2 (French)
Severity: N/A
Fixlet ID: 275682207
Fixlet Link: http://support.microsoft.com/kb/2756822

Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. 

Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates.

***************************************************************
Title: 2756822: Oct. 2012 Cumulative Time Zone Update - Windows 7 Gold/SP1 (French)
Severity: N/A
Fixlet ID: 275682209
Fixlet Link: http://support.microsoft.com/kb/2756822

Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. 

Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates.

***************************************************************
Title: 2756822: Oct. 2012 Cumulative Time Zone Update - Windows Server 2003 SP2 (x64) (French)
Severity: N/A
Fixlet ID: 275682213
Fixlet Link: http://support.microsoft.com/kb/2756822

Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. 

Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates.

***************************************************************
Title: 2756822: Oct. 2012 Cumulative Time Zone Update - Windows Vista SP2 (x64) (French)
Severity: N/A
Fixlet ID: 275682215
Fixlet Link: http://support.microsoft.com/kb/2756822

Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. 

Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates.

***************************************************************
Title: 2756822: Oct. 2012 Cumulative Time Zone Update - Windows Server 2008 SP2 (x64) (French)
Severity: N/A
Fixlet ID: 275682217
Fixlet Link: http://support.microsoft.com/kb/2756822

Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. 

Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates.

***************************************************************
Title: 2756822: Oct. 2012 Cumulative Time Zone Update - Windows 7 Gold/SP1 (x64) (French)
Severity: N/A
Fixlet ID: 275682219
Fixlet Link: http://support.microsoft.com/kb/2756822

Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. 

Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates.

***************************************************************
Title: 2756822: Oct. 2012 Cumulative Time Zone Update - Windows Server 2008 R2 Gold/SP1 (x64) (French)
Severity: N/A
Fixlet ID: 275682221
Fixlet Link: http://support.microsoft.com/kb/2756822

Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. 

Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates.



More information about the BigFix-Announcements-French mailing list