Fixlet Site - PatchesforWindows(French) Current Version: 283 Published: Wed, 19 Aug 2009 17:30:06 GMT New Fixlets: ============ *************************************************************** Title: UPDATE: Exchange Server 2007 Service Pack 1 Update Roll 9 Available (Testing/Training Environment) (French) Severity: Fixlet ID: 62201 Fixlet Link: http://support.microsoft.com/?kbid=970162 Fixlet Description: Microsoft has released Update Rollup 9 for Microsoft Exchange Server 2007 Service Pack 1 (SP1). Update Rollup 9 for Exchange Server 2007 Service Pack 1 (SP1) resolves issues that were found in Exchange Server 2007 SP1 since the software was released. This update rollup is highly recommended for all Exchange Server 2007 SP1 customers. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the knowledge base article for more information. Important Note: Installation of Exchange 2007 Server Roles on 32-bit computers is supported for testing and training envirionments only. *************************************************************** Title: UPDATE: Exchange Server 2007 Service Pack 1 Update Roll 9 Available (Testing/Training Environment) - CORRUPT PATCH (French) Severity: Fixlet ID: 62202 Fixlet Link: http://support.microsoft.com/?kbid=970162 *************************************************************** Title: UPDATE: Exchange Server 2007 Service Pack 1 Update Roll 9 Available (X64) (French) Severity: Fixlet ID: 62203 Fixlet Link: http://support.microsoft.com/?kbid=970162 Fixlet Description: Microsoft has released Update Rollup 9 for Microsoft Exchange Server 2007 Service Pack 1 (SP1). Update Rollup 9 for Exchange Server 2007 Service Pack 1 (SP1) resolves issues that were found in Exchange Server 2007 SP1 since the software was released. This update rollup is highly recommended for all Exchange Server 2007 SP1 customers. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the knowledge base article for more information. *************************************************************** Title: UPDATE: Exchange Server 2007 Service Pack 1 Update Roll 9 Available (X64) - CORRUPT PATCH (French) Severity: Fixlet ID: 62204 Fixlet Link: http://support.microsoft.com/?kbid=970162 *************************************************************** Title: UPDATE: Office 2007 Servers Service Pack 2 Available (French) Severity: Fixlet ID: 69101 Fixlet Link: http://support.microsoft.com/?kbid=953334 Fixlet Description: The 2007 Microsoft Office servers Service Pack 2 (SP2) package gives customers the latest updates to the 2007 Office server products. This service pack includes two main categories of fixes: Previously unreleased fixes that were made specifically for this service pack. In addition to providing general product fixes, SP2 includes improvements in stability, in performance, and in security. All the public updates, security updates, cumulative updates, and hotfixes that were released through February 2009. *************************************************************** Title: UPDATE: Office 2007 Servers Service Pack 2 Available - SharePoint Services 3.0 SP2 Required (French) Severity: Fixlet ID: 69103 Fixlet Link: http://support.microsoft.com/?kbid=953334 Fixlet Link: http://support.microsoft.com/?kbid=953338 Fixlet Description: Important Note: The installation of this service pack for SharePoint Server 2007, Project Server 2007, Forms Server 2007, Search Server 2008, and Search Server 2008 Express requires that SharePoint Services 3.0 SP2 or greater be installed. Use the action below to install SharePoint Services 3.0 SP2. The 2007 Microsoft Office servers Service Pack 2 (SP2) package gives customers the latest updates to the 2007 Office server products. This service pack includes two main categories of fixes: Previously unreleased fixes that were made specifically for this service pack. In addition to providing general product fixes, SP2 includes improvements in stability, in performance, and in security. All the public updates, security updates, cumulative updates, and hotfixes that were released through February 2009. *************************************************************** Title: UPDATE: Office 2007 Servers Service Pack 2 Available (x64) (French) Severity: Fixlet ID: 69105 Fixlet Link: http://support.microsoft.com/?kbid=953334 Fixlet Description: The 2007 Microsoft Office servers Service Pack 2 (SP2) package gives customers the latest updates to the 2007 Office server products. This service pack includes two main categories of fixes: Previously unreleased fixes that were made specifically for this service pack. In addition to providing general product fixes, SP2 includes improvements in stability, in performance, and in security. All the public updates, security updates, cumulative updates, and hotfixes that were released through February 2009. *************************************************************** Title: UPDATE: Office 2007 Servers Service Pack 2 Available - SharePoint Services 3.0 SP2 Required (x64) (French) Severity: Fixlet ID: 69107 Fixlet Link: http://support.microsoft.com/?kbid=953334 Fixlet Link: http://support.microsoft.com/?kbid=953338 Fixlet Description: Important Note: The installation of this service pack for SharePoint Server 2007, Project Server 2007, Forms Server 2007, Search Server 2008, and Search Server 2008 Express requires that SharePoint Services 3.0 SP2 or greater be installed. Use the action below to install SharePoint Services 3.0 SP2. The 2007 Microsoft Office servers Service Pack 2 (SP2) package gives customers the latest updates to the 2007 Office server products. This service pack includes two main categories of fixes: Previously unreleased fixes that were made specifically for this service pack. In addition to providing general product fixes, SP2 includes improvements in stability, in performance, and in security. All the public updates, security updates, cumulative updates, and hotfixes that were released through February 2009. *************************************************************** Title: MS09-029: Vulnerabilities in the Embedded OpenType Font Engine Could Allow Remote Code Execution - Windows XP SP2/SP3 (v2, re-released 8/11/09) - REVISED PATCH (French) Severity: Critical Fixlet ID: 902949 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-029.mspx Fixlet Description: Important Note: This patch was re-released on August 11, 2009 to address known issues with the original patch. The listed computers have the original version of the patch installed. The action below applies the revised version of the patch. Microsoft recommends that customers apply the update immediately. Microsoft has released a security update that resolves two privately reported vulnerabilities in a Microsoft Windows component, the Embedded OpenType (EOT) Font Engine. The vulnerabilities could allow remote code execution. An attacker who successfully exploited either of these vulnerabilities could take complete control of an affected system remotely. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-029: Vulnerabilities in the Embedded OpenType Font Engine Could Allow Remote Code Execution - Windows XP SP2/SP3 (v2, re-released 8/11/09) - CORRUPT PATCH (French) Severity: Critical Fixlet ID: 902950 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-029.mspx *************************************************************** Title: MS09-029: Vulnerabilities in the Embedded OpenType Font Engine Could Allow Remote Code Execution - Windows XP SP2/SP3 (v2, re-released 8/11/09) (French) Severity: Critical Fixlet ID: 902951 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-029.mspx Fixlet Description: Important Note: This patch was re-released on August 11, 2009 to address known issues with the original patch. Microsoft recommends that customers apply the update immediately. Microsoft has released a security update that resolves two privately reported vulnerabilities in a Microsoft Windows component, the Embedded OpenType (EOT) Font Engine. The vulnerabilities could allow remote code execution. An attacker who successfully exploited either of these vulnerabilities could take complete control of an affected system remotely. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-029: Vulnerabilities in the Embedded OpenType Font Engine Could Allow Remote Code Execution - Windows 2000 SP4 (v2, re-released 8/11/09) (French) Severity: Critical Fixlet ID: 902952 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-029.mspx Fixlet Description: Important Note: This patch was re-released on August 11, 2009 to address known issues with the original patch. Microsoft recommends that customers apply the update immediately. Microsoft has released a security update that resolves two privately reported vulnerabilities in a Microsoft Windows component, the Embedded OpenType (EOT) Font Engine. The vulnerabilities could allow remote code execution. An attacker who successfully exploited either of these vulnerabilities could take complete control of an affected system remotely. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-029: Vulnerabilities in the Embedded OpenType Font Engine Could Allow Remote Code Execution - Windows 2000 SP4 (v2, re-released 8/11/09) - REVISED PATCH (French) Severity: Critical Fixlet ID: 902953 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-029.mspx Fixlet Description: Important Note: This patch was re-released on August 11, 2009 to address known issues with the original patch. The listed computers have the original version of the patch installed. The action below applies the revised version of the patch. Microsoft recommends that customers apply the update immediately. Microsoft has released a security update that resolves two privately reported vulnerabilities in a Microsoft Windows component, the Embedded OpenType (EOT) Font Engine. The vulnerabilities could allow remote code execution. An attacker who successfully exploited either of these vulnerabilities could take complete control of an affected system remotely. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-029: Vulnerabilities in the Embedded OpenType Font Engine Could Allow Remote Code Execution - Windows 2000 SP4 (v2, re-released 8/11/09) - CORRUPT PATCH (French) Severity: Critical Fixlet ID: 902954 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-029.mspx *************************************************************** Title: MS09-029: Vulnerabilities in the Embedded OpenType Font Engine Could Allow Remote Code Execution - Windows Server 2003 SP2 (v2, re-released 8/11/09) (French) Severity: Critical Fixlet ID: 902955 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-029.mspx Fixlet Description: Important Note: This patch was re-released on August 11, 2009 to address known issues with the original patch. Microsoft recommends that customers apply the update immediately. Microsoft has released a security update that resolves two privately reported vulnerabilities in a Microsoft Windows component, the Embedded OpenType (EOT) Font Engine. The vulnerabilities could allow remote code execution. An attacker who successfully exploited either of these vulnerabilities could take complete control of an affected system remotely. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-029: Vulnerabilities in the Embedded OpenType Font Engine Could Allow Remote Code Execution - Windows Server 2003 SP2 (v2, re-released 8/11/09) - CORRUPT PATCH (French) Severity: Critical Fixlet ID: 902956 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-029.mspx *************************************************************** Title: MS09-029: Vulnerabilities in the Embedded OpenType Font Engine Could Allow Remote Code Execution - Windows Server 2003 SP2 (v2, re-released 8/11/09) - REVISED PATCH (French) Severity: Critical Fixlet ID: 902958 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-029.mspx Fixlet Description: Important Note: This patch was re-released on August 11, 2009 to address known issues with the original patch. The listed computers have the original version of the patch installed. The action below applies the revised version of the patch. Microsoft recommends that customers apply the update immediately. Microsoft has released a security update that resolves two privately reported vulnerabilities in a Microsoft Windows component, the Embedded OpenType (EOT) Font Engine. The vulnerabilities could allow remote code execution. An attacker who successfully exploited either of these vulnerabilities could take complete control of an affected system remotely. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-029: Vulnerabilities in the Embedded OpenType Font Engine Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (v2, re-released 8/11/09) (French) Severity: Critical Fixlet ID: 902963 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-029.mspx Fixlet Description: Important Note: This patch was re-released on August 11, 2009 to address known issues with the original patch. Microsoft recommends that customers apply the update immediately. Microsoft has released a security update that resolves two privately reported vulnerabilities in a Microsoft Windows component, the Embedded OpenType (EOT) Font Engine. The vulnerabilities could allow remote code execution. An attacker who successfully exploited either of these vulnerabilities could take complete control of an affected system remotely. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-029: Vulnerabilities in the Embedded OpenType Font Engine Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (v2, re-released 8/11/09) - CORRUPT PATCH (French) Severity: Critical Fixlet ID: 902964 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-029.mspx *************************************************************** Title: MS09-029: Vulnerabilities in the Embedded OpenType Font Engine Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (v2, re-released 8/11/09) - REVISED PATCH (French) Severity: Critical Fixlet ID: 902965 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-029.mspx Fixlet Description: Important Note: This patch was re-released on August 11, 2009 to address known issues with the original patch. The listed computers have the original version of the patch installed. The action below applies the revised version of the patch. Microsoft recommends that customers apply the update immediately. Microsoft has released a security update that resolves two privately reported vulnerabilities in a Microsoft Windows component, the Embedded OpenType (EOT) Font Engine. The vulnerabilities could allow remote code execution. An attacker who successfully exploited either of these vulnerabilities could take complete control of an affected system remotely. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 5.01 SP4 - Windows 2000 SP4 (French) Severity: Critical Fixlet ID: 903401 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx Fixlet Description: Microsoft has released a security update that is being released out of band in conjunction with Microsoft Security Bulletin MS09-035, which describes vulnerabilities in those components and controls that have been developed using vulnerable versions of the Microsoft Active Template Library (ATL). As a defense-in-depth measure, this Internet Explorer security update helps mitigate known attack vectors within Internet Explorer for those components and controls that have been developed with vulnerable versions of ATL as described in Microsoft Security Advisory (973882) and Microsoft Security Bulletin MS09-035. This security update also resolves three privately reported vulnerabilities in Internet Explorer. These vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There is no default action for this Fixlet message because Bigfix has recieved reports of various issues associated with the deployment of this patch. Please take extra caution to qualify this update in a test environment prior to use in a production environment. For more information on default actions, see BigFix KB #474 *************************************************************** Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 5.01 SP4 - Windows 2000 SP4 - CORRUPT PATCH (French) Severity: Critical Fixlet ID: 903402 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx *************************************************************** Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 6 SP1 - Windows 2000 SP4 (French) Severity: Critical Fixlet ID: 903403 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx Fixlet Description: Microsoft has released a security update that is being released out of band in conjunction with Microsoft Security Bulletin MS09-035, which describes vulnerabilities in those components and controls that have been developed using vulnerable versions of the Microsoft Active Template Library (ATL). As a defense-in-depth measure, this Internet Explorer security update helps mitigate known attack vectors within Internet Explorer for those components and controls that have been developed with vulnerable versions of ATL as described in Microsoft Security Advisory (973882) and Microsoft Security Bulletin MS09-035. This security update also resolves three privately reported vulnerabilities in Internet Explorer. These vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There is no default action for this Fixlet message because Bigfix has recieved reports of various issues associated with the deployment of this patch. Please take extra caution to qualify this update in a test environment prior to use in a production environment. For more information on default actions, see BigFix KB #474 *************************************************************** Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 6 SP1 - Windows 2000 SP4 - CORRUPT PATCH (French) Severity: Critical Fixlet ID: 903404 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx *************************************************************** Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2/SP3 (French) Severity: Critical Fixlet ID: 903405 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx Fixlet Description: Microsoft has released a security update that is being released out of band in conjunction with Microsoft Security Bulletin MS09-035, which describes vulnerabilities in those components and controls that have been developed using vulnerable versions of the Microsoft Active Template Library (ATL). As a defense-in-depth measure, this Internet Explorer security update helps mitigate known attack vectors within Internet Explorer for those components and controls that have been developed with vulnerable versions of ATL as described in Microsoft Security Advisory (973882) and Microsoft Security Bulletin MS09-035. This security update also resolves three privately reported vulnerabilities in Internet Explorer. These vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There is no default action for this Fixlet message because Bigfix has recieved reports of various issues associated with the deployment of this patch. Please take extra caution to qualify this update in a test environment prior to use in a production environment. For more information on default actions, see BigFix KB #474 *************************************************************** Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2/SP3 - CORRUPT PATCH (French) Severity: Critical Fixlet ID: 903406 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx *************************************************************** Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (French) Severity: Moderate Fixlet ID: 903409 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx Fixlet Description: Microsoft has released a security update that is being released out of band in conjunction with Microsoft Security Bulletin MS09-035, which describes vulnerabilities in those components and controls that have been developed using vulnerable versions of the Microsoft Active Template Library (ATL). As a defense-in-depth measure, this Internet Explorer security update helps mitigate known attack vectors within Internet Explorer for those components and controls that have been developed with vulnerable versions of ATL as described in Microsoft Security Advisory (973882) and Microsoft Security Bulletin MS09-035. This security update also resolves three privately reported vulnerabilities in Internet Explorer. These vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There is no default action for this Fixlet message because Bigfix has recieved reports of various issues associated with the deployment of this patch. Please take extra caution to qualify this update in a test environment prior to use in a production environment. For more information on default actions, see BigFix KB #474 *************************************************************** Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 - CORRUPT PATCH (French) Severity: Moderate Fixlet ID: 903410 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx *************************************************************** Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (x64) (French) Severity: Moderate Fixlet ID: 903411 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx Fixlet Description: Microsoft has released a security update that is being released out of band in conjunction with Microsoft Security Bulletin MS09-035, which describes vulnerabilities in those components and controls that have been developed using vulnerable versions of the Microsoft Active Template Library (ATL). As a defense-in-depth measure, this Internet Explorer security update helps mitigate known attack vectors within Internet Explorer for those components and controls that have been developed with vulnerable versions of ATL as described in Microsoft Security Advisory (973882) and Microsoft Security Bulletin MS09-035. This security update also resolves three privately reported vulnerabilities in Internet Explorer. These vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There is no default action for this Fixlet message because Bigfix has recieved reports of various issues associated with the deployment of this patch. Please take extra caution to qualify this update in a test environment prior to use in a production environment. For more information on default actions, see BigFix KB #474 *************************************************************** Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (French) Severity: Moderate Fixlet ID: 903412 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx *************************************************************** Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2/SP3 (French) Severity: Critical Fixlet ID: 903413 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx Fixlet Description: Microsoft has released a security update that is being released out of band in conjunction with Microsoft Security Bulletin MS09-035, which describes vulnerabilities in those components and controls that have been developed using vulnerable versions of the Microsoft Active Template Library (ATL). As a defense-in-depth measure, this Internet Explorer security update helps mitigate known attack vectors within Internet Explorer for those components and controls that have been developed with vulnerable versions of ATL as described in Microsoft Security Advisory (973882) and Microsoft Security Bulletin MS09-035. This security update also resolves three privately reported vulnerabilities in Internet Explorer. These vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There is no default action for this Fixlet message because Bigfix has recieved reports of various issues associated with the deployment of this patch. Please take extra caution to qualify this update in a test environment prior to use in a production environment. For more information on default actions, see BigFix KB #474 *************************************************************** Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2/SP3 - CORRUPT PATCH (French) Severity: Critical Fixlet ID: 903414 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx *************************************************************** Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (French) Severity: Moderate Fixlet ID: 903417 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx Fixlet Description: Microsoft has released a security update that is being released out of band in conjunction with Microsoft Security Bulletin MS09-035, which describes vulnerabilities in those components and controls that have been developed using vulnerable versions of the Microsoft Active Template Library (ATL). As a defense-in-depth measure, this Internet Explorer security update helps mitigate known attack vectors within Internet Explorer for those components and controls that have been developed with vulnerable versions of ATL as described in Microsoft Security Advisory (973882) and Microsoft Security Bulletin MS09-035. This security update also resolves three privately reported vulnerabilities in Internet Explorer. These vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There is no default action for this Fixlet message because Bigfix has recieved reports of various issues associated with the deployment of this patch. Please take extra caution to qualify this update in a test environment prior to use in a production environment. For more information on default actions, see BigFix KB #474 *************************************************************** Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 - CORRUPT PATCH (French) Severity: Moderate Fixlet ID: 903418 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx *************************************************************** Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (x64) (French) Severity: Moderate Fixlet ID: 903419 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx Fixlet Description: Microsoft has released a security update that is being released out of band in conjunction with Microsoft Security Bulletin MS09-035, which describes vulnerabilities in those components and controls that have been developed using vulnerable versions of the Microsoft Active Template Library (ATL). As a defense-in-depth measure, this Internet Explorer security update helps mitigate known attack vectors within Internet Explorer for those components and controls that have been developed with vulnerable versions of ATL as described in Microsoft Security Advisory (973882) and Microsoft Security Bulletin MS09-035. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. This security update also resolves three privately reported vulnerabilities in Internet Explorer. These vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Important Note: There is no default action for this Fixlet message because Bigfix has recieved reports of various issues associated with the deployment of this patch. Please take extra caution to qualify this update in a test environment prior to use in a production environment. For more information on default actions, see BigFix KB #474 *************************************************************** Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (French) Severity: Moderate Fixlet ID: 903420 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx *************************************************************** Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 7 - Windows Vista Gold/SP1/SP2 (French) Severity: Critical Fixlet ID: 903421 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx Fixlet Description: Microsoft has released a security update that is being released out of band in conjunction with Microsoft Security Bulletin MS09-035, which describes vulnerabilities in those components and controls that have been developed using vulnerable versions of the Microsoft Active Template Library (ATL). As a defense-in-depth measure, this Internet Explorer security update helps mitigate known attack vectors within Internet Explorer for those components and controls that have been developed with vulnerable versions of ATL as described in Microsoft Security Advisory (973882) and Microsoft Security Bulletin MS09-035. This security update also resolves three privately reported vulnerabilities in Internet Explorer. These vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There is no default action for this Fixlet message because Bigfix has recieved reports of various issues associated with the deployment of this patch. Please take extra caution to qualify this update in a test environment prior to use in a production environment. For more information on default actions, see BigFix KB #474 *************************************************************** Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 7 - Windows Vista Gold/SP1/SP2 (x64) (French) Severity: Critical Fixlet ID: 903423 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx Fixlet Description: Microsoft has released a security update that is being released out of band in conjunction with Microsoft Security Bulletin MS09-035, which describes vulnerabilities in those components and controls that have been developed using vulnerable versions of the Microsoft Active Template Library (ATL). As a defense-in-depth measure, this Internet Explorer security update helps mitigate known attack vectors within Internet Explorer for those components and controls that have been developed with vulnerable versions of ATL as described in Microsoft Security Advisory (973882) and Microsoft Security Bulletin MS09-035. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. This security update also resolves three privately reported vulnerabilities in Internet Explorer. These vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Important Note: There is no default action for this Fixlet message because Bigfix has recieved reports of various issues associated with the deployment of this patch. Please take extra caution to qualify this update in a test environment prior to use in a production environment. For more information on default actions, see BigFix KB #474 *************************************************************** Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2008 Gold/SP2 (French) Severity: Moderate Fixlet ID: 903425 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx Fixlet Description: Microsoft has released a security update that is being released out of band in conjunction with Microsoft Security Bulletin MS09-035, which describes vulnerabilities in those components and controls that have been developed using vulnerable versions of the Microsoft Active Template Library (ATL). As a defense-in-depth measure, this Internet Explorer security update helps mitigate known attack vectors within Internet Explorer for those components and controls that have been developed with vulnerable versions of ATL as described in Microsoft Security Advisory (973882) and Microsoft Security Bulletin MS09-035. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. This security update also resolves three privately reported vulnerabilities in Internet Explorer. These vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. *************************************************************** Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2008 Gold/SP2 (x64) (French) Severity: Moderate Fixlet ID: 903427 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx Fixlet Description: Microsoft has released a security update that is being released out of band in conjunction with Microsoft Security Bulletin MS09-035, which describes vulnerabilities in those components and controls that have been developed using vulnerable versions of the Microsoft Active Template Library (ATL). As a defense-in-depth measure, this Internet Explorer security update helps mitigate known attack vectors within Internet Explorer for those components and controls that have been developed with vulnerable versions of ATL as described in Microsoft Security Advisory (973882) and Microsoft Security Bulletin MS09-035. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. This security update also resolves three privately reported vulnerabilities in Internet Explorer. These vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. *************************************************************** Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP2/SP3 (French) Severity: Critical Fixlet ID: 903429 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx Fixlet Description: Microsoft has released a security update that is being released out of band in conjunction with Microsoft Security Bulletin MS09-035, which describes vulnerabilities in those components and controls that have been developed using vulnerable versions of the Microsoft Active Template Library (ATL). As a defense-in-depth measure, this Internet Explorer security update helps mitigate known attack vectors within Internet Explorer for those components and controls that have been developed with vulnerable versions of ATL as described in Microsoft Security Advisory (973882) and Microsoft Security Bulletin MS09-035. This security update also resolves three privately reported vulnerabilities in Internet Explorer. These vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There is no default action for this Fixlet message because Bigfix has recieved reports of various issues associated with the deployment of this patch. Please take extra caution to qualify this update in a test environment prior to use in a production environment. For more information on default actions, see BigFix KB #474 *************************************************************** Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP2/SP3 - CORRUPT PATCH (French) Severity: Critical Fixlet ID: 903430 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx *************************************************************** Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (French) Severity: Moderate Fixlet ID: 903433 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx Fixlet Description: Microsoft has released a security update that is being released out of band in conjunction with Microsoft Security Bulletin MS09-035, which describes vulnerabilities in those components and controls that have been developed using vulnerable versions of the Microsoft Active Template Library (ATL). As a defense-in-depth measure, this Internet Explorer security update helps mitigate known attack vectors within Internet Explorer for those components and controls that have been developed with vulnerable versions of ATL as described in Microsoft Security Advisory (973882) and Microsoft Security Bulletin MS09-035. This security update also resolves three privately reported vulnerabilities in Internet Explorer. These vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There is no default action for this Fixlet message because Bigfix has recieved reports of various issues associated with the deployment of this patch. Please take extra caution to qualify this update in a test environment prior to use in a production environment. For more information on default actions, see BigFix KB #474 *************************************************************** Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 - CORRUPT PATCH (French) Severity: Moderate Fixlet ID: 903434 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx *************************************************************** Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (x64) (French) Severity: Moderate Fixlet ID: 903435 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx Fixlet Description: Microsoft has released a security update that is being released out of band in conjunction with Microsoft Security Bulletin MS09-035, which describes vulnerabilities in those components and controls that have been developed using vulnerable versions of the Microsoft Active Template Library (ATL). As a defense-in-depth measure, this Internet Explorer security update helps mitigate known attack vectors within Internet Explorer for those components and controls that have been developed with vulnerable versions of ATL as described in Microsoft Security Advisory (973882) and Microsoft Security Bulletin MS09-035. This security update also resolves three privately reported vulnerabilities in Internet Explorer. These vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There is no default action for this Fixlet message because Bigfix has recieved reports of various issues associated with the deployment of this patch. Please take extra caution to qualify this update in a test environment prior to use in a production environment. For more information on default actions, see BigFix KB #474 *************************************************************** Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (French) Severity: Moderate Fixlet ID: 903436 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx *************************************************************** Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 8 - Windows Vista Gold/SP1/SP2 (French) Severity: Critical Fixlet ID: 903437 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx Fixlet Description: Microsoft has released a security update that is being released out of band in conjunction with Microsoft Security Bulletin MS09-035, which describes vulnerabilities in those components and controls that have been developed using vulnerable versions of the Microsoft Active Template Library (ATL). As a defense-in-depth measure, this Internet Explorer security update helps mitigate known attack vectors within Internet Explorer for those components and controls that have been developed with vulnerable versions of ATL as described in Microsoft Security Advisory (973882) and Microsoft Security Bulletin MS09-035. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. This security update also resolves three privately reported vulnerabilities in Internet Explorer. These vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Important Note: There is no default action for this Fixlet message because Bigfix has recieved reports of various issues associated with the deployment of this patch. Please take extra caution to qualify this update in a test environment prior to use in a production environment. For more information on default actions, see BigFix KB #474 *************************************************************** Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 8 - Windows Vista Gold/SP1/SP2 (x64) (French) Severity: Critical Fixlet ID: 903439 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx Fixlet Description: Microsoft has released a security update that is being released out of band in conjunction with Microsoft Security Bulletin MS09-035, which describes vulnerabilities in those components and controls that have been developed using vulnerable versions of the Microsoft Active Template Library (ATL). As a defense-in-depth measure, this Internet Explorer security update helps mitigate known attack vectors within Internet Explorer for those components and controls that have been developed with vulnerable versions of ATL as described in Microsoft Security Advisory (973882) and Microsoft Security Bulletin MS09-035. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. This security update also resolves three privately reported vulnerabilities in Internet Explorer. These vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Important Note: There is no default action for this Fixlet message because Bigfix has recieved reports of various issues associated with the deployment of this patch. Please take extra caution to qualify this update in a test environment prior to use in a production environment. For more information on default actions, see BigFix KB #474 *************************************************************** Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2008 Gold/SP2 (French) Severity: Moderate Fixlet ID: 903441 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx Fixlet Description: Microsoft has released a security update that is being released out of band in conjunction with Microsoft Security Bulletin MS09-035, which describes vulnerabilities in those components and controls that have been developed using vulnerable versions of the Microsoft Active Template Library (ATL). As a defense-in-depth measure, this Internet Explorer security update helps mitigate known attack vectors within Internet Explorer for those components and controls that have been developed with vulnerable versions of ATL as described in Microsoft Security Advisory (973882) and Microsoft Security Bulletin MS09-035. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. This security update also resolves three privately reported vulnerabilities in Internet Explorer. These vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Important Note: There is no default action for this Fixlet message because Bigfix has recieved reports of various issues associated with the deployment of this patch. Please take extra caution to qualify this update in a test environment prior to use in a production environment. For more information on default actions, see BigFix KB #474 *************************************************************** Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2008 Gold/SP2 (x64) (French) Severity: Moderate Fixlet ID: 903443 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx Fixlet Description: Microsoft has released a security update that is being released out of band in conjunction with Microsoft Security Bulletin MS09-035, which describes vulnerabilities in those components and controls that have been developed using vulnerable versions of the Microsoft Active Template Library (ATL). As a defense-in-depth measure, this Internet Explorer security update helps mitigate known attack vectors within Internet Explorer for those components and controls that have been developed with vulnerable versions of ATL as described in Microsoft Security Advisory (973882) and Microsoft Security Bulletin MS09-035. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. This security update also resolves three privately reported vulnerabilities in Internet Explorer. These vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Important Note: There is no default action for this Fixlet message because Bigfix has recieved reports of various issues associated with the deployment of this patch. Please take extra caution to qualify this update in a test environment prior to use in a production environment. For more information on default actions, see BigFix KB #474 *************************************************************** Title: MS09-035: Vulnerabilities in Visual Studio Active Template Library Could Allow Remote Code Execution - Visual Studio .NET 2003 SP1 (French) Severity: Moderate Fixlet ID: 903501 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-035.mspx Fixlet Description: Microsoft has released a security update that addresses several privately reported vulnerabilities in the public versions of the Microsoft Active Template Library (ATL) included with Visual Studio. This security update is specifically intended for developers of components and controls. Developers who build and redistribute components and controls using ATL should install the update provided in this bulletin and follow the guidance provided to create, and distribute to their customers, components and controls that are not vulnerable to the vulnerabilities described in this security bulletin. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. Important Note: BigFix testing has determined that this update will only install on 64-bit systems when an administrator is logged on locally. As such, this Fixlet message will not become relevant on machines for which this condition is not met. *************************************************************** Title: MS09-035: Vulnerabilities in Visual Studio Active Template Library Could Allow Remote Code Execution - Visual Studio 2005 SP1 (French) Severity: Moderate Fixlet ID: 903503 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-035.mspx Fixlet Description: Microsoft has released a security update that addresses several privately reported vulnerabilities in the public versions of the Microsoft Active Template Library (ATL) included with Visual Studio. This security update is specifically intended for developers of components and controls. Developers who build and redistribute components and controls using ATL should install the update provided in this bulletin and follow the guidance provided to create, and distribute to their customers, components and controls that are not vulnerable to the vulnerabilities described in this security bulletin. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-035: Vulnerabilities in Visual Studio Active Template Library Could Allow Remote Code Execution - Visual Studio 2005 SP1 64-bit Hosted Visual C++ Tools (French) Severity: Moderate Fixlet ID: 903505 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-035.mspx Fixlet Description: Important Note: The patch binary that Microsoft published for the Visual Studio 64-bit Hosted Visual C++ Tools 2005 Service Pack 1 ATL Security Update vulnerability described in MS09-035 (VS80sp1-KB973830-IA64-INTL.exe) applies to Itanium (IA64) machines only. As BigFix does not support the Itanium architecture, we will not be releasing Fixlet content for this update at this time. Important Note: The relevance in this audit only fixlet may detect false positives due to incomplete information from Microsoft at this time. Microsoft has released a security update that addresses several privately reported vulnerabilities in the public versions of the Microsoft Active Template Library (ATL) included with Visual Studio. This security update is specifically intended for developers of components and controls. Developers who build and redistribute components and controls using ATL should install the update provided in this bulletin and follow the guidance provided to create, and distribute to their customers, components and controls that are not vulnerable to the vulnerabilities described in this security bulletin. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-035: Vulnerabilities in Visual Studio Active Template Library Could Allow Remote Code Execution - Visual Studio 2008 (French) Severity: Moderate Fixlet ID: 903507 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-035.mspx Fixlet Description: Microsoft has released a security update that addresses several privately reported vulnerabilities in the public versions of the Microsoft Active Template Library (ATL) included with Visual Studio. This security update is specifically intended for developers of components and controls. Developers who build and redistribute components and controls using ATL should install the update provided in this bulletin and follow the guidance provided to create, and distribute to their customers, components and controls that are not vulnerable to the vulnerabilities described in this security bulletin. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-035: Vulnerabilities in Visual Studio Active Template Library Could Allow Remote Code Execution - Visual Studio 2008 SP1 (French) Severity: Moderate Fixlet ID: 903509 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-035.mspx Fixlet Description: Important Note: Microsoft is apparently experiencing syncing issues with their download server clusters. As a result, several different versions of the binary deployed by this Fixlet message may be downloaded from the supplied URL at any given time. While this is NOT a BigFix problem and must ultimately be resolved by Microsoft, BigFix is offering the following alternative to ensure successful action deployment: Using a browser, download the binary deployed by this Fixlet message. Using sha1.exe (see instructions here), verify that the sha1 of the downloaded file is equal to "2b405e4704121d10a91374905e64a76eea5b5239". If it is not, repeat step 1. Once you have successfully downloaded and verified the file, rename it to "2b405e4704121d10a91374905e64a76eea5b5239" and place it in the BES Server download cache. For more information about manually caching file downloads on the BES Server, please see BigFix Support Knowledge Base article #390. Microsoft has released a security update that addresses several privately reported vulnerabilities in the public versions of the Microsoft Active Template Library (ATL) included with Visual Studio. This security update is specifically intended for developers of components and controls. Developers who build and redistribute components and controls using ATL should install the update provided in this bulletin and follow the guidance provided to create, and distribute to their customers, components and controls that are not vulnerable to the vulnerabilities described in this security bulletin. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-035: Vulnerabilities in Visual Studio Active Template Library Could Allow Remote Code Execution - Visual C++ 2005 SP1 Redistributable Package (French) Severity: Moderate Fixlet ID: 903511 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-035.mspx Fixlet Description: Microsoft has released a security update that addresses several privately reported vulnerabilities in the public versions of the Microsoft Active Template Library (ATL) included with Visual Studio. This security update is specifically intended for developers of components and controls. Developers who build and redistribute components and controls using ATL should install the update provided in this bulletin and follow the guidance provided to create, and distribute to their customers, components and controls that are not vulnerable to the vulnerabilities described in this security bulletin. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-035: Vulnerabilities in Visual Studio Active Template Library Could Allow Remote Code Execution - Visual C++ 2008 Redistributable Package (French) Severity: Moderate Fixlet ID: 903513 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-035.mspx Fixlet Description: Microsoft has released a security update that addresses several privately reported vulnerabilities in the public versions of the Microsoft Active Template Library (ATL) included with Visual Studio. This security update is specifically intended for developers of components and controls. Developers who build and redistribute components and controls using ATL should install the update provided in this bulletin and follow the guidance provided to create, and distribute to their customers, components and controls that are not vulnerable to the vulnerabilities described in this security bulletin. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-035: Vulnerabilities in Visual Studio Active Template Library Could Allow Remote Code Execution - Visual C++ 2008 SP1 Redistributable Package (French) Severity: Moderate Fixlet ID: 903515 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-035.mspx Fixlet Description: Microsoft has released a security update that addresses several privately reported vulnerabilities in the public versions of the Microsoft Active Template Library (ATL) included with Visual Studio. This security update is specifically intended for developers of components and controls. Developers who build and redistribute components and controls using ATL should install the update provided in this bulletin and follow the guidance provided to create, and distribute to their customers, components and controls that are not vulnerable to the vulnerabilities described in this security bulletin. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-035: Vulnerabilities in Visual Studio Active Template Library Could Allow Remote Code Execution - Visual C++ 2005 SP1 Redistributable Package (x64) (French) Severity: Moderate Fixlet ID: 903525 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-035.mspx Fixlet Description: Microsoft has released a security update that addresses several privately reported vulnerabilities in the public versions of the Microsoft Active Template Library (ATL) included with Visual Studio. This security update is specifically intended for developers of components and controls. Developers who build and redistribute components and controls using ATL should install the update provided in this bulletin and follow the guidance provided to create, and distribute to their customers, components and controls that are not vulnerable to the vulnerabilities described in this security bulletin. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-035: Vulnerabilities in Visual Studio Active Template Library Could Allow Remote Code Execution - Visual C++ 2008 Redistributable Package (x64) (French) Severity: Moderate Fixlet ID: 903527 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-035.mspx Fixlet Description: Microsoft has released a security update that addresses several privately reported vulnerabilities in the public versions of the Microsoft Active Template Library (ATL) included with Visual Studio. This security update is specifically intended for developers of components and controls. Developers who build and redistribute components and controls using ATL should install the update provided in this bulletin and follow the guidance provided to create, and distribute to their customers, components and controls that are not vulnerable to the vulnerabilities described in this security bulletin. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-035: Vulnerabilities in Visual Studio Active Template Library Could Allow Remote Code Execution - Visual C++ 2008 SP1 Redistributable Package (x64) (French) Severity: Moderate Fixlet ID: 903529 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-035.mspx Fixlet Description: Microsoft has released a security update that addresses several privately reported vulnerabilities in the public versions of the Microsoft Active Template Library (ATL) included with Visual Studio. This security update is specifically intended for developers of components and controls. Developers who build and redistribute components and controls using ATL should install the update provided in this bulletin and follow the guidance provided to create, and distribute to their customers, components and controls that are not vulnerable to the vulnerabilities described in this security bulletin. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-035: Vulnerabilities in Visual Studio Active Template Library Could Allow Remote Code Execution - Visual Studio 2005 SP1 (Mobile Applications Using ATL for Smart Devices) (French) Severity: Moderate Fixlet ID: 903535 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-035.mspx Fixlet Description: Microsoft has released a security update that addresses several privately reported vulnerabilities in the public versions of the Microsoft Active Template Library (ATL) included with Visual Studio. This security update is specifically intended for developers of components and controls. Developers who build and redistribute components and controls using ATL should install the update provided in this bulletin and follow the guidance provided to create, and distribute to their customers, components and controls that are not vulnerable to the vulnerabilities described in this security bulletin. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-035: Vulnerabilities in Visual Studio Active Template Library Could Allow Remote Code Execution - Visual Studio 2008 (Mobile Applications Using ATL for Smart Devices) (French) Severity: Moderate Fixlet ID: 903537 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-035.mspx Fixlet Description: Microsoft has released a security update that addresses several privately reported vulnerabilities in the public versions of the Microsoft Active Template Library (ATL) included with Visual Studio. This security update is specifically intended for developers of components and controls. Developers who build and redistribute components and controls using ATL should install the update provided in this bulletin and follow the guidance provided to create, and distribute to their customers, components and controls that are not vulnerable to the vulnerabilities described in this security bulletin. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-035: Vulnerabilities in Visual Studio Active Template Library Could Allow Remote Code Execution - Visual Studio 2008 SP1 (Mobile Applications Using ATL for Smart Devices) (French) Severity: Moderate Fixlet ID: 903539 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-035.mspx Fixlet Description: Important Note: Microsoft is apparently experiencing syncing issues with their download server clusters. As a result, several different versions of the binary deployed by this Fixlet message may be downloaded from the supplied URL at any given time. While this is NOT a BigFix problem and must ultimately be resolved by Microsoft, BigFix is offering the following alternative to ensure successful action deployment: Using a browser, download the binary deployed by this Fixlet message. Using sha1.exe (see instructions here), verify that the sha1 of the downloaded file is equal to "2f3125344060328e88927a006d300aef9c6ec5c4". If it is not, repeat step 1. Once you have successfully downloaded and verified the file, rename it to "2f3125344060328e88927a006d300aef9c6ec5c4" and place it in the BES Server download cache. For more information about manually caching file downloads on the BES Server, please see BigFix Support Knowledge Base article #390. Microsoft has released a security update that addresses several privately reported vulnerabilities in the public versions of the Microsoft Active Template Library (ATL) included with Visual Studio. This security update is specifically intended for developers of components and controls. Developers who build and redistribute components and controls using ATL should install the update provided in this bulletin and follow the guidance provided to create, and distribute to their customers, components and controls that are not vulnerable to the vulnerabilities described in this security bulletin. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-036: Vulnerability in ASP.NET in Microsoft Windows Could Allow Denial of Service - .NET Framework 2.0 SP1 / 3.5 - Windows Vista SP1 / Windows Server 2008 Gold (x64) (French) Severity: Important Fixlet ID: 903601 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-036.mspx Fixlet Description: Microsoft has released a security update that addresses a privately reported Denial of Service vulnerability in the Microsoft .NET Framework component of Microsoft Windows. This vulnerability can be exploited only when Internet Information Services (IIS) 7.0 is installed and ASP.NET is configured to use integrated mode on affected versions of Microsoft Windows. An attacker could create specially crafted anonymous HTTP requests that could cause the affected Web server to become non-responsive until the associated application pool is restarted. Customers who are running IIS 7.0 application pools in classic mode are not affected by this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS09-036: Vulnerability in ASP.NET in Microsoft Windows Could Allow Denial of Service - .NET Framework 2.0 SP1 / 3.5 - Windows Vista Gold (x64) (French) Severity: Important Fixlet ID: 903602 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-036.mspx Fixlet Description: Microsoft has released a security update that addresses a privately reported Denial of Service vulnerability in the Microsoft .NET Framework component of Microsoft Windows. This vulnerability can be exploited only when Internet Information Services (IIS) 7.0 is installed and ASP.NET is configured to use integrated mode on affected versions of Microsoft Windows. An attacker could create specially crafted anonymous HTTP requests that could cause the affected Web server to become non-responsive until the associated application pool is restarted. Customers who are running IIS 7.0 application pools in classic mode are not affected by this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS09-036: Vulnerability in ASP.NET in Microsoft Windows Could Allow Denial of Service - .NET Framework 2.0 SP2 / 3.5 SP1 - Windows Vista Gold (x64) (French) Severity: Important Fixlet ID: 903603 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-036.mspx Fixlet Description: Microsoft has released a security update that addresses a privately reported Denial of Service vulnerability in the Microsoft .NET Framework component of Microsoft Windows. This vulnerability can be exploited only when Internet Information Services (IIS) 7.0 is installed and ASP.NET is configured to use integrated mode on affected versions of Microsoft Windows. An attacker could create specially crafted anonymous HTTP requests that could cause the affected Web server to become non-responsive until the associated application pool is restarted. Customers who are running IIS 7.0 application pools in classic mode are not affected by this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS09-036: Vulnerability in ASP.NET in Microsoft Windows Could Allow Denial of Service - .NET Framework 2.0 SP2 / 3.5 SP1 - Windows Vista SP1 / Windows Server 2008 Gold (x64) (French) Severity: Important Fixlet ID: 903607 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-036.mspx Fixlet Description: Microsoft has released a security update that addresses a privately reported Denial of Service vulnerability in the Microsoft .NET Framework component of Microsoft Windows. This vulnerability can be exploited only when Internet Information Services (IIS) 7.0 is installed and ASP.NET is configured to use integrated mode on affected versions of Microsoft Windows. An attacker could create specially crafted anonymous HTTP requests that could cause the affected Web server to become non-responsive until the associated application pool is restarted. Customers who are running IIS 7.0 application pools in classic mode are not affected by this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS09-036: Vulnerability in ASP.NET in Microsoft Windows Could Allow Denial of Service - .NET Framework 2.0 SP1/3.5 - Windows Vista Gold (French) Severity: Important Fixlet ID: 903611 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-036.mspx Fixlet Description: Microsoft has released a security update that addresses a privately reported Denial of Service vulnerability in the Microsoft .NET Framework component of Microsoft Windows. This vulnerability can be exploited only when Internet Information Services (IIS) 7.0 is installed and ASP.NET is configured to use integrated mode on affected versions of Microsoft Windows. An attacker could create specially crafted anonymous HTTP requests that could cause the affected Web server to become non-responsive until the associated application pool is restarted. Customers who are running IIS 7.0 application pools in classic mode are not affected by this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS09-036: Vulnerability in ASP.NET in Microsoft Windows Could Allow Denial of Service - .NET Framework 2.0 SP2/3.5 SP1 - Windows Vista Gold (French) Severity: Important Fixlet ID: 903613 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-036.mspx Fixlet Description: Microsoft has released a security update that addresses a privately reported Denial of Service vulnerability in the Microsoft .NET Framework component of Microsoft Windows. This vulnerability can be exploited only when Internet Information Services (IIS) 7.0 is installed and ASP.NET is configured to use integrated mode on affected versions of Microsoft Windows. An attacker could create specially crafted anonymous HTTP requests that could cause the affected Web server to become non-responsive until the associated application pool is restarted. Customers who are running IIS 7.0 application pools in classic mode are not affected by this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS09-036: Vulnerability in ASP.NET in Microsoft Windows Could Allow Denial of Service - .NET Framework 2.0 SP1 / 3.5 - Windows Vista SP1 / Windows Server 2008 Gold (French) Severity: Important Fixlet ID: 903615 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-036.mspx Fixlet Description: Microsoft has released a security update that addresses a privately reported Denial of Service vulnerability in the Microsoft .NET Framework component of Microsoft Windows. This vulnerability can be exploited only when Internet Information Services (IIS) 7.0 is installed and ASP.NET is configured to use integrated mode on affected versions of Microsoft Windows. An attacker could create specially crafted anonymous HTTP requests that could cause the affected Web server to become non-responsive until the associated application pool is restarted. Customers who are running IIS 7.0 application pools in classic mode are not affected by this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS09-036: Vulnerability in ASP.NET in Microsoft Windows Could Allow Denial of Service - .NET Framework 2.0 SP2/3.5 SP1 - Windows Vista SP1 / Windows Server 2008 Gold (French) Severity: Important Fixlet ID: 903617 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-036.mspx Fixlet Description: Microsoft has released a security update that addresses a privately reported Denial of Service vulnerability in the Microsoft .NET Framework component of Microsoft Windows. This vulnerability can be exploited only when Internet Information Services (IIS) 7.0 is installed and ASP.NET is configured to use integrated mode on affected versions of Microsoft Windows. An attacker could create specially crafted anonymous HTTP requests that could cause the affected Web server to become non-responsive until the associated application pool is restarted. Customers who are running IIS 7.0 application pools in classic mode are not affected by this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows 2000 SP4 - Outlook Express 5.5 SP2 (French) Severity: Critical Fixlet ID: 903701 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows 2000 SP4 - Outlook Express 5.5 SP2 - CORRUPT PATCH (French) Severity: Critical Fixlet ID: 903702 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows 2000 SP4 - Outlook Express 6 SP1 (French) Severity: Critical Fixlet ID: 903703 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows 2000 SP4 - Outlook Express 6 SP1 - CORRUPT PATCH (French) Severity: Critical Fixlet ID: 903704 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows 2000 SP4 - Windows Media Player 9 (French) Severity: Critical Fixlet ID: 903705 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows 2000 SP4 - Windows Media Player 9 - CORRUPT PATCH (French) Severity: Critical Fixlet ID: 903706 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows ATL Component - Windows 2000 SP4 (French) Severity: Critical Fixlet ID: 903707 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows ATL Component - Windows 2000 SP4 - CORRUPT PATCH (French) Severity: Critical Fixlet ID: 903708 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - DHTML Editing Component ActiveX Control - Windows 2000 SP4 (French) Severity: Critical Fixlet ID: 903709 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - DHTML Editing Component ActiveX Control - Windows 2000 SP4 - CORRUPT PATCH (French) Severity: Critical Fixlet ID: 903710 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Outlook Express 6 - Windows XP SP2/SP3 (French) Severity: Critical Fixlet ID: 903711 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Outlook Express 6 - Windows XP SP2/SP3 - CORRUPT PATCH (French) Severity: Critical Fixlet ID: 903712 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows Media Player 9, 10, 11 - Windows XP SP2 (French) Severity: Critical Fixlet ID: 903713 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows Media Player 9, 10, 11 - Windows XP SP2 - CORRUPT PATCH (French) Severity: Critical Fixlet ID: 903714 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows Media Player 9, 10, 11 -Windows XP SP3 (French) Severity: Critical Fixlet ID: 903717 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows Media Player 9, 10, 11 -Windows XP SP3 - CORRUPT PATCH (French) Severity: Critical Fixlet ID: 903718 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows ATL Component - Windows XP SP2/SP3 (French) Severity: Critical Fixlet ID: 903719 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows ATL Component - Windows XP SP2/SP3 - CORRUPT PATCH (French) Severity: Critical Fixlet ID: 903720 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - DHTML Editing Component ActiveX Control - Windows XP SP2/SP3 (French) Severity: Critical Fixlet ID: 903721 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - DHTML Editing Component ActiveX Control - Windows XP SP2/SP3 - CORRUPT PATCH (French) Severity: Critical Fixlet ID: 903722 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Microsoft MSWebDVD ActiveX Control - Windows XP SP2/SP3 (French) Severity: Critical Fixlet ID: 903723 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Microsoft MSWebDVD ActiveX Control - Windows XP SP2/SP3 - CORRUPT PATCH (French) Severity: Critical Fixlet ID: 903724 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Outlook Express 6 - Windows Server 2003 SP2 (French) Severity: Critical Fixlet ID: 903737 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Outlook Express 6 - Windows Server 2003 SP2 - CORRUPT PATCH (French) Severity: Critical Fixlet ID: 903738 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows Media Player 10 - Windows Server 2003 SP2 (French) Severity: Critical Fixlet ID: 903739 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows Media Player 10 - Windows Server 2003 SP2 - CORRUPT PATCH (French) Severity: Critical Fixlet ID: 903740 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows ATL Component - Windows Server 2003 SP2 (French) Severity: Critical Fixlet ID: 903741 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows ATL Component - Windows Server 2003 SP2 - CORRUPT PATCH (French) Severity: Critical Fixlet ID: 903742 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - DHTML Editing Component ActiveX Control - Windows Server 2003 SP2 (French) Severity: Critical Fixlet ID: 903743 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - DHTML Editing Component ActiveX Control - Windows Server 2003 SP2 - CORRUPT PATCH (French) Severity: Critical Fixlet ID: 903744 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - MSWebDVD ActiveX Control - Windows Server 2003 SP2 (French) Severity: Critical Fixlet ID: 903745 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - MSWebDVD ActiveX Control - Windows Server 2003 SP2 - CORRUPT PATCH (French) Severity: Critical Fixlet ID: 903746 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Outlook Express 6 - Windows Server 2003 SP2 (x64) (French) Severity: Critical Fixlet ID: 903747 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Outlook Express 6 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (French) Severity: Critical Fixlet ID: 903748 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows Media Player 10 - Windows Server 2003 SP2 (x64) (French) Severity: Critical Fixlet ID: 903749 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows Media Player 10 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (French) Severity: Critical Fixlet ID: 903750 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows ATL Component - Windows Server 2003 SP2 (x64) (French) Severity: Critical Fixlet ID: 903751 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows ATL Component - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (French) Severity: Critical Fixlet ID: 903752 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - DHTML Editing Component ActiveX Control - Windows Server 2003 SP2 (x64) (French) Severity: Critical Fixlet ID: 903753 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - DHTML Editing Component ActiveX Control - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (French) Severity: Critical Fixlet ID: 903754 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - MSWebDVD ActiveX Control - Windows Server 2003 SP2 (x64) (French) Severity: Critical Fixlet ID: 903755 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - MSWebDVD ActiveX Control - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (French) Severity: Critical Fixlet ID: 903756 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows Media Player 11 - Windows Vista Gold/SP1/SP2 (French) Severity: Critical Fixlet ID: 903757 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows ATL Component - Windows Vista Gold/SP1/SP2 (French) Severity: Critical Fixlet ID: 903759 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows Media Player 11 - Windows Vista Gold/SP1/SP2 (x64) (French) Severity: Critical Fixlet ID: 903761 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows ATL Component - Windows Vista Gold/SP1/SP2 (x64) (French) Severity: Critical Fixlet ID: 903763 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows Media Player 11 - Windows Server 2008 Gold/SP2 (French) Severity: Critical Fixlet ID: 903765 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows ATL Component - Windows Server 2008 Gold/SP2 (French) Severity: Critical Fixlet ID: 903767 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows Media Player 11 - Windows Server 2008 Gold/SP2 (x64) (French) Severity: Critical Fixlet ID: 903769 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows ATL Component - Windows Server 2008 Gold/SP2 (x64) (French) Severity: Critical Fixlet ID: 903771 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-038: Vulnerabilities in Windows Media File Processing Could Allow Remote Code Execution - Windows 2000 SP4 (French) Severity: Critical Fixlet ID: 903801 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-038.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media file processing. Either vulnerability could allow remote code execution if a user opened a specially crafted AVI file. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-038: Vulnerabilities in Windows Media File Processing Could Allow Remote Code Execution - Windows 2000 SP4 - CORRUPT PATCH (French) Severity: Critical Fixlet ID: 903802 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-038.mspx *************************************************************** Title: MS09-038: Vulnerabilities in Windows Media File Processing Could Allow Remote Code Execution - Windows XP SP2/SP3 (French) Severity: Critical Fixlet ID: 903803 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-038.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media file processing. Either vulnerability could allow remote code execution if a user opened a specially crafted AVI file. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-038: Vulnerabilities in Windows Media File Processing Could Allow Remote Code Execution - Windows XP SP2/SP3 - CORRUPT PATCH (French) Severity: Critical Fixlet ID: 903804 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-038.mspx *************************************************************** Title: MS09-038: Vulnerabilities in Windows Media File Processing Could Allow Remote Code Execution - Windows Server 2003 SP2 (French) Severity: Critical Fixlet ID: 903807 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-038.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media file processing. Either vulnerability could allow remote code execution if a user opened a specially crafted AVI file. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-038: Vulnerabilities in Windows Media File Processing Could Allow Remote Code Execution - Windows Server 2003 SP2 - CORRUPT PATCH (French) Severity: Critical Fixlet ID: 903808 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-038.mspx *************************************************************** Title: MS09-038: Vulnerabilities in Windows Media File Processing Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (French) Severity: Critical Fixlet ID: 903809 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-038.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media file processing. Either vulnerability could allow remote code execution if a user opened a specially crafted AVI file. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-038: Vulnerabilities in Windows Media File Processing Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (French) Severity: Critical Fixlet ID: 903810 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-038.mspx *************************************************************** Title: MS09-038: Vulnerabilities in Windows Media File Processing Could Allow Remote Code Execution - Windows Vista Gold/SP1/SP2 (French) Severity: Critical Fixlet ID: 903811 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-038.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media file processing. Either vulnerability could allow remote code execution if a user opened a specially crafted AVI file. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-038: Vulnerabilities in Windows Media File Processing Could Allow Remote Code Execution - Windows Vista Gold/SP1/SP2 (x64) (French) Severity: Critical Fixlet ID: 903813 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-038.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media file processing. Either vulnerability could allow remote code execution if a user opened a specially crafted AVI file. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-038: Vulnerabilities in Windows Media File Processing Could Allow Remote Code Execution - Windows Server 2008 Gold/SP2 (French) Severity: Critical Fixlet ID: 903815 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-038.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media file processing. Either vulnerability could allow remote code execution if a user opened a specially crafted AVI file. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-038: Vulnerabilities in Windows Media File Processing Could Allow Remote Code Execution - Windows Server 2008 Gold/SP2 (x64) (French) Severity: Critical Fixlet ID: 903817 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-038.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media file processing. Either vulnerability could allow remote code execution if a user opened a specially crafted AVI file. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-039: Vulnerabilities in WINS Could Allow Remote Code Execution - Windows 2000 Server SP4 (French) Severity: Critical Fixlet ID: 903901 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-039.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in the Windows Internet Name Service (WINS). Either vulnerability could allow remote code execution if a user received a specially crafted WINS replication packet on an affected system running the WINS service. By default, WINS is not installed on any affected operating system version. Only customers who manually install this component are affected by this issue. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-039: Vulnerabilities in WINS Could Allow Remote Code Execution - Windows 2000 Server SP4 - CORRUPT PATCH (French) Severity: Critical Fixlet ID: 903902 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-039.mspx *************************************************************** Title: MS09-039: Vulnerabilities in WINS Could Allow Remote Code Execution - Windows Server 2003 SP2 (French) Severity: Critical Fixlet ID: 903903 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-039.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in the Windows Internet Name Service (WINS). Either vulnerability could allow remote code execution if a user received a specially crafted WINS replication packet on an affected system running the WINS service. By default, WINS is not installed on any affected operating system version. Only customers who manually install this component are affected by this issue. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-039: Vulnerabilities in WINS Could Allow Remote Code Execution - Windows Server 2003 SP2 - CORRUPT PATCH (French) Severity: Critical Fixlet ID: 903904 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-039.mspx *************************************************************** Title: MS09-039: Vulnerabilities in WINS Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (French) Severity: Critical Fixlet ID: 903905 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-039.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in the Windows Internet Name Service (WINS). Either vulnerability could allow remote code execution if a user received a specially crafted WINS replication packet on an affected system running the WINS service. By default, WINS is not installed on any affected operating system version. Only customers who manually install this component are affected by this issue. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-039: Vulnerabilities in WINS Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (French) Severity: Critical Fixlet ID: 903906 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-039.mspx *************************************************************** Title: MS09-040: Vulnerability in Message Queuing Could Allow Elevation of Privilege - Windows 2000 SP4 (French) Severity: Important Fixlet ID: 904001 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-040.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows Message Queuing Service (MSMQ). The vulnerability could allow elevation of privilege if a user received a specially crafted request to an affected MSMQ service. By default, the Message Queuing component is not installed on any affected operating system edition and can only be enabled by a user with administrative privileges. Only customers who manually install the Message Queuing component are likely to be vulnerable to this issue. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS09-040: Vulnerability in Message Queuing Could Allow Elevation of Privilege - Windows 2000 SP4 - CORRUPT PATCH (French) Severity: Important Fixlet ID: 904002 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-040.mspx *************************************************************** Title: MS09-040: Vulnerability in Message Queuing Could Allow Elevation of Privilege - Windows XP SP2 (French) Severity: Important Fixlet ID: 904003 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-040.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows Message Queuing Service (MSMQ). The vulnerability could allow elevation of privilege if a user received a specially crafted request to an affected MSMQ service. By default, the Message Queuing component is not installed on any affected operating system edition and can only be enabled by a user with administrative privileges. Only customers who manually install the Message Queuing component are likely to be vulnerable to this issue. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS09-040: Vulnerability in Message Queuing Could Allow Elevation of Privilege - Windows XP SP2 - CORRUPT PATCH (French) Severity: Important Fixlet ID: 904004 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-040.mspx *************************************************************** Title: MS09-040: Vulnerability in Message Queuing Could Allow Elevation of Privilege - Windows Server 2003 SP2 (French) Severity: Important Fixlet ID: 904007 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-040.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows Message Queuing Service (MSMQ). The vulnerability could allow elevation of privilege if a user received a specially crafted request to an affected MSMQ service. By default, the Message Queuing component is not installed on any affected operating system edition and can only be enabled by a user with administrative privileges. Only customers who manually install the Message Queuing component are likely to be vulnerable to this issue. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS09-040: Vulnerability in Message Queuing Could Allow Elevation of Privilege - Windows Server 2003 SP2 - CORRUPT PATCH (French) Severity: Important Fixlet ID: 904008 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-040.mspx *************************************************************** Title: MS09-040: Vulnerability in Message Queuing Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) (French) Severity: Important Fixlet ID: 904009 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-040.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows Message Queuing Service (MSMQ). The vulnerability could allow elevation of privilege if a user received a specially crafted request to an affected MSMQ service. By default, the Message Queuing component is not installed on any affected operating system edition and can only be enabled by a user with administrative privileges. Only customers who manually install the Message Queuing component are likely to be vulnerable to this issue. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS09-040: Vulnerability in Message Queuing Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (French) Severity: Important Fixlet ID: 904010 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-040.mspx *************************************************************** Title: MS09-040: Vulnerability in Message Queuing Could Allow Elevation of Privilege - Windows Vista Gold (French) Severity: Important Fixlet ID: 904011 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-040.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows Message Queuing Service (MSMQ). The vulnerability could allow elevation of privilege if a user received a specially crafted request to an affected MSMQ service. By default, the Message Queuing component is not installed on any affected operating system edition and can only be enabled by a user with administrative privileges. Only customers who manually install the Message Queuing component are likely to be vulnerable to this issue. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS09-040: Vulnerability in Message Queuing Could Allow Elevation of Privilege - Windows Vista Gold (x64) (French) Severity: Important Fixlet ID: 904013 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-040.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows Message Queuing Service (MSMQ). The vulnerability could allow elevation of privilege if a user received a specially crafted request to an affected MSMQ service. By default, the Message Queuing component is not installed on any affected operating system edition and can only be enabled by a user with administrative privileges. Only customers who manually install the Message Queuing component are likely to be vulnerable to this issue. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS09-041: Vulnerability in Workstation Service Could Allow Elevation of Privilege - Windows XP SP2/SP3 (French) Severity: Important Fixlet ID: 904101 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-041.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows Workstation Service. The vulnerability could allow elevation of privilege if an attacker created a specially crafted RPC message and sent the message to an affected system. An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. An attacker must have valid logon credentials to a vulnerable system in order to exploit this vulnerability. The vulnerability could not be exploited by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS09-041: Vulnerability in Workstation Service Could Allow Elevation of Privilege - Windows XP SP2/SP3 - CORRUPT PATCH (French) Severity: Important Fixlet ID: 904102 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-041.mspx *************************************************************** Title: MS09-041: Vulnerability in Workstation Service Could Allow Elevation of Privilege - Windows Server 2003 SP2 (French) Severity: Important Fixlet ID: 904105 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-041.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows Workstation Service. The vulnerability could allow elevation of privilege if an attacker created a specially crafted RPC message and sent the message to an affected system. An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. An attacker must have valid logon credentials to a vulnerable system in order to exploit this vulnerability. The vulnerability could not be exploited by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS09-041: Vulnerability in Workstation Service Could Allow Elevation of Privilege - Windows Server 2003 SP2 - CORRUPT PATCH (French) Severity: Important Fixlet ID: 904106 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-041.mspx *************************************************************** Title: MS09-041: Vulnerability in Workstation Service Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) (French) Severity: Important Fixlet ID: 904107 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-041.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows Workstation Service. The vulnerability could allow elevation of privilege if an attacker created a specially crafted RPC message and sent the message to an affected system. An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. An attacker must have valid logon credentials to a vulnerable system in order to exploit this vulnerability. The vulnerability could not be exploited by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS09-041: Vulnerability in Workstation Service Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (French) Severity: Important Fixlet ID: 904108 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-041.mspx *************************************************************** Title: MS09-041: Vulnerability in Workstation Service Could Allow Elevation of Privilege - Windows Vista Gold/SP1/SP2 (French) Severity: Moderate Fixlet ID: 904109 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-041.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows Workstation Service. The vulnerability could allow elevation of privilege if an attacker created a specially crafted RPC message and sent the message to an affected system. An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. An attacker must have valid logon credentials to a vulnerable system in order to exploit this vulnerability. The vulnerability could not be exploited by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS09-041: Vulnerability in Workstation Service Could Allow Elevation of Privilege - Windows Vista Gold/SP1/SP2 (x64) (French) Severity: Moderate Fixlet ID: 904111 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-041.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows Workstation Service. The vulnerability could allow elevation of privilege if an attacker created a specially crafted RPC message and sent the message to an affected system. An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. An attacker must have valid logon credentials to a vulnerable system in order to exploit this vulnerability. The vulnerability could not be exploited by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS09-041: Vulnerability in Workstation Service Could Allow Elevation of Privilege - Windows Server 2008 Gold/SP2 (French) Severity: Moderate Fixlet ID: 904113 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-041.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows Workstation Service. The vulnerability could allow elevation of privilege if an attacker created a specially crafted RPC message and sent the message to an affected system. An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. An attacker must have valid logon credentials to a vulnerable system in order to exploit this vulnerability. The vulnerability could not be exploited by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS09-041: Vulnerability in Workstation Service Could Allow Elevation of Privilege - Windows Server 2008 Gold/SP2 (x64) (French) Severity: Moderate Fixlet ID: 904115 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-041.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows Workstation Service. The vulnerability could allow elevation of privilege if an attacker created a specially crafted RPC message and sent the message to an affected system. An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. An attacker must have valid logon credentials to a vulnerable system in order to exploit this vulnerability. The vulnerability could not be exploited by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS09-042: Vulnerability in Telnet Could Allow Remote Code Execution - Windows 2000 SP4 (French) Severity: Important Fixlet ID: 904201 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-042.mspx Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in the Microsoft Telnet service. The vulnerability could allow an attacker to obtain credentials and then use them to log back into affected systems. The attacker would then acquire user rights on a system identical to the user rights of the logged-on user. This scenario could ultimately result in remote code execution on affected systems. An attacker who successfully exploited this vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-042: Vulnerability in Telnet Could Allow Remote Code Execution - Windows 2000 SP4 - CORRUPT PATCH (French) Severity: Important Fixlet ID: 904202 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-042.mspx *************************************************************** Title: MS09-042: Vulnerability in Telnet Could Allow Remote Code Execution - Windows XP SP2/SP3 (French) Severity: Important Fixlet ID: 904203 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-042.mspx Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in the Microsoft Telnet service. The vulnerability could allow an attacker to obtain credentials and then use them to log back into affected systems. The attacker would then acquire user rights on a system identical to the user rights of the logged-on user. This scenario could ultimately result in remote code execution on affected systems. An attacker who successfully exploited this vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-042: Vulnerability in Telnet Could Allow Remote Code Execution - Windows XP SP2/SP3 - CORRUPT PATCH (French) Severity: Important Fixlet ID: 904204 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-042.mspx *************************************************************** Title: MS09-042: Vulnerability in Telnet Could Allow Remote Code Execution - Windows Server 2003 SP2 (French) Severity: Important Fixlet ID: 904207 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-042.mspx Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in the Microsoft Telnet service. The vulnerability could allow an attacker to obtain credentials and then use them to log back into affected systems. The attacker would then acquire user rights on a system identical to the user rights of the logged-on user. This scenario could ultimately result in remote code execution on affected systems. An attacker who successfully exploited this vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-042: Vulnerability in Telnet Could Allow Remote Code Execution - Windows Server 2003 SP2 - CORRUPT PATCH (French) Severity: Important Fixlet ID: 904208 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-042.mspx *************************************************************** Title: MS09-042: Vulnerability in Telnet Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (French) Severity: Important Fixlet ID: 904209 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-042.mspx Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in the Microsoft Telnet service. The vulnerability could allow an attacker to obtain credentials and then use them to log back into affected systems. The attacker would then acquire user rights on a system identical to the user rights of the logged-on user. This scenario could ultimately result in remote code execution on affected systems. An attacker who successfully exploited this vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-042: Vulnerability in Telnet Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (French) Severity: Important Fixlet ID: 904210 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-042.mspx *************************************************************** Title: MS09-042: Vulnerability in Telnet Could Allow Remote Code Execution - Windows Vista Gold/SP1/SP2 (French) Severity: Moderate Fixlet ID: 904211 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-042.mspx Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in the Microsoft Telnet service. The vulnerability could allow an attacker to obtain credentials and then use them to log back into affected systems. The attacker would then acquire user rights on a system identical to the user rights of the logged-on user. This scenario could ultimately result in remote code execution on affected systems. An attacker who successfully exploited this vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-042: Vulnerability in Telnet Could Allow Remote Code Execution - Windows Vista Gold/SP1/SP2 (x64) (French) Severity: Moderate Fixlet ID: 904213 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-042.mspx Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in the Microsoft Telnet service. The vulnerability could allow an attacker to obtain credentials and then use them to log back into affected systems. The attacker would then acquire user rights on a system identical to the user rights of the logged-on user. This scenario could ultimately result in remote code execution on affected systems. An attacker who successfully exploited this vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-042: Vulnerability in Telnet Could Allow Remote Code Execution - Windows Server 2008 Gold/SP2 (French) Severity: Moderate Fixlet ID: 904215 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-042.mspx Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in the Microsoft Telnet service. The vulnerability could allow an attacker to obtain credentials and then use them to log back into affected systems. The attacker would then acquire user rights on a system identical to the user rights of the logged-on user. This scenario could ultimately result in remote code execution on affected systems. An attacker who successfully exploited this vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-042: Vulnerability in Telnet Could Allow Remote Code Execution - Windows Server 2008 Gold/SP2 (x64) (French) Severity: Moderate Fixlet ID: 904217 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-042.mspx Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in the Microsoft Telnet service. The vulnerability could allow an attacker to obtain credentials and then use them to log back into affected systems. The attacker would then acquire user rights on a system identical to the user rights of the logged-on user. This scenario could ultimately result in remote code execution on affected systems. An attacker who successfully exploited this vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-043: Vulnerabilities in Microsoft Office Web Components Could Allow Remote Code Execution - Office XP SP3 (Local/Network Install)/ Office Web Components XP SP3 (French) Severity: Critical Fixlet ID: 904301 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-043.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Office Web Components that could allow remote code execution if a user viewed a specially crafted Web page. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."'); } catch (e) { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.'; } } *************************************************************** Title: MS09-043: Vulnerabilities in Microsoft Office Web Components Could Allow Remote Code Execution - Office XP SP3 (Administrative Install) (French) Severity: Critical Fixlet ID: 904303 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-043.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Office Web Components that could allow remote code execution if a user viewed a specially crafted Web page. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."'); } catch (e) { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.'; } } *************************************************************** Title: MS09-043: Vulnerabilities in Microsoft Office Web Components Could Allow Remote Code Execution - Office 2003 SP3 (Local/Network Install)/Office Web Components 2003 SP3 (French) Severity: Critical Fixlet ID: 904306 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-043.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Office Web Components that could allow remote code execution if a user viewed a specially crafted Web page. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."'); } catch (e) { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.'; } } *************************************************************** Title: MS09-043: Vulnerabilities in Microsoft Office Web Components Could Allow Remote Code Execution - Office 2003 SP3 (Administrative Install) (French) Severity: Critical Fixlet ID: 904308 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-043.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Office Web Components that could allow remote code execution if a user viewed a specially crafted Web page. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."'); } catch (e) { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.'; } } *************************************************************** Title: MS09-043: Vulnerabilities in Microsoft Office Web Components Could Allow Remote Code Execution - Office Access Runtime 2007/Office 2003 Web Components for Office 2007 SP1 (French) Severity: Critical Fixlet ID: 904316 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-043.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Office Web Components that could allow remote code execution if a user viewed a specially crafted Web page. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."'); } catch (e) { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.'; } } *************************************************************** Title: MS09-043: Vulnerabilities in Microsoft Office Web Components Could Allow Remote Code Execution - ISA 2004 SE/EE SP3, ISA 2006 SE/EE SP1 (French) Severity: Critical Fixlet ID: 904321 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-043.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Office Web Components that could allow remote code execution if a user viewed a specially crafted Web page. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-043: Vulnerabilities in Microsoft Office Web Components Could Allow Remote Code Execution - BizTalk Server 2002 (French) Severity: Critical Fixlet ID: 904326 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-043.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Office Web Components that could allow remote code execution if a user viewed a specially crafted Web page. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-043: Vulnerabilities in Microsoft Office Web Components Could Allow Remote Code Execution - Visual Studio .NET 2003 SP1 (French) Severity: Critical Fixlet ID: 904331 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-043.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Office Web Components that could allow remote code execution if a user viewed a specially crafted Web page. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 5.0 - Windows 2000 SP4 (French) Severity: Critical Fixlet ID: 904401 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Remote Desktop Connection. The vulnerabilities could allow remote code execution if an attacker successfully convinced a user of Terminal Services to connect to a malicious RDP server or if a user visits a specially crafted Web site that exploits this vulnerability. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will need to apply document.body.onload = setLink; function setLink() { try { fixletLink.innerHTML = EvaluateRelevance('(link "Fixlet 904403" of fixlet 904403 of (bes site whose (name of it = "EnterpriseSecurity")'); } catch (e) { fixletLink.innerHTML = 'Fixlet message 904403'; } } before they will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 5.0 - Windows 2000 SP4 - CORRUPT PATCH (French) Severity: Critical Fixlet ID: 904402 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx *************************************************************** Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 5.1/5.2 - Windows 2000 SP4 (French) Severity: Critical Fixlet ID: 904403 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Remote Desktop Connection. The vulnerabilities could allow remote code execution if an attacker successfully convinced a user of Terminal Services to connect to a malicious RDP server or if a user visits a specially crafted Web site that exploits this vulnerability. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 5.1/5.2 - Windows XP SP2 (French) Severity: Critical Fixlet ID: 904405 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Remote Desktop Connection. The vulnerabilities could allow remote code execution if an attacker successfully convinced a user of Terminal Services to connect to a malicious RDP server or if a user visits a specially crafted Web site that exploits this vulnerability. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 5.1/5.2 - Windows XP SP2 - CORRUPT PATCH (French) Severity: Critical Fixlet ID: 904406 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx *************************************************************** Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 6.0/6.1 - Windows XP SP2/SP3 (French) Severity: Critical Fixlet ID: 904407 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Remote Desktop Connection. The vulnerabilities could allow remote code execution if an attacker successfully convinced a user of Terminal Services to connect to a malicious RDP server or if a user visits a specially crafted Web site that exploits this vulnerability. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 6.0/6.1 - Windows XP SP2/SP3 - CORRUPT PATCH (French) Severity: Critical Fixlet ID: 904408 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx *************************************************************** Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 5.2 - Windows XP SP3 (French) Severity: Critical Fixlet ID: 904409 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Remote Desktop Connection. The vulnerabilities could allow remote code execution if an attacker successfully convinced a user of Terminal Services to connect to a malicious RDP server or if a user visits a specially crafted Web site that exploits this vulnerability. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 5.2 - Windows XP SP3 - CORRUPT PATCH (French) Severity: Critical Fixlet ID: 904410 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx *************************************************************** Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 5.2 - Windows Server 2003 SP2 (French) Severity: Critical Fixlet ID: 904415 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Remote Desktop Connection. The vulnerabilities could allow remote code execution if an attacker successfully convinced a user of Terminal Services to connect to a malicious RDP server or if a user visits a specially crafted Web site that exploits this vulnerability. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 5.2 - Windows Server 2003 SP2 - CORRUPT PATCH (French) Severity: Critical Fixlet ID: 904416 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx *************************************************************** Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 6.0 - Windows Server 2003 SP2 (French) Severity: Important Fixlet ID: 904417 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Remote Desktop Connection. The vulnerabilities could allow remote code execution if an attacker successfully convinced a user of Terminal Services to connect to a malicious RDP server or if a user visits a specially crafted Web site that exploits this vulnerability. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 6.0 - Windows Server 2003 SP2 - CORRUPT PATCH (French) Severity: Important Fixlet ID: 904418 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx *************************************************************** Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 5.2 - Windows Server 2003 SP2 (x64 ) (French) Severity: Critical Fixlet ID: 904419 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Remote Desktop Connection. The vulnerabilities could allow remote code execution if an attacker successfully convinced a user of Terminal Services to connect to a malicious RDP server or if a user visits a specially crafted Web site that exploits this vulnerability. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 5.2 - Windows Server 2003 SP2 (x64 ) - CORRUPT PATCH (French) Severity: Critical Fixlet ID: 904420 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx *************************************************************** Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 6.0 - Windows Server 2003 SP2 (x64) (French) Severity: Important Fixlet ID: 904421 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Remote Desktop Connection. The vulnerabilities could allow remote code execution if an attacker successfully convinced a user of Terminal Services to connect to a malicious RDP server or if a user visits a specially crafted Web site that exploits this vulnerability. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 6.0 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (French) Severity: Important Fixlet ID: 904422 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx *************************************************************** Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 6.0/6.1 - Windows Vista Gold/SP1/SP2 (French) Severity: Critical Fixlet ID: 904423 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Remote Desktop Connection. The vulnerabilities could allow remote code execution if an attacker successfully convinced a user of Terminal Services to connect to a malicious RDP server or if a user visits a specially crafted Web site that exploits this vulnerability. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 6.0/6.1 - Windows Vista Gold/SP1/SP2 (x64) (French) Severity: Critical Fixlet ID: 904425 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Remote Desktop Connection. The vulnerabilities could allow remote code execution if an attacker successfully convinced a user of Terminal Services to connect to a malicious RDP server or if a user visits a specially crafted Web site that exploits this vulnerability. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 6.1 - Windows Server 2008 Gold/SP2 (French) Severity: Critical Fixlet ID: 904427 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Remote Desktop Connection. The vulnerabilities could allow remote code execution if an attacker successfully convinced a user of Terminal Services to connect to a malicious RDP server or if a user visits a specially crafted Web site that exploits this vulnerability. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 6.1 - Windows Server 2008 Gold/SP2 (x64) (French) Severity: Critical Fixlet ID: 904429 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Remote Desktop Connection. The vulnerabilities could allow remote code execution if an attacker successfully convinced a user of Terminal Services to connect to a malicious RDP server or if a user visits a specially crafted Web site that exploits this vulnerability. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: 970653: Aug. 2009 Cumulative Time Zone Update - Windows XP SP2/SP3 (French) Severity: Fixlet ID: 97065301 Fixlet Link: http://support.microsoft.com/kb/970653 Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates. See the Microsoft web page on the 2007 DST changes here for more information. *************************************************************** Title: 970653: Aug. 2009 Cumulative Time Zone Update - Windows XP SP2/SP3 - CORRUPT PATCH (French) Severity: Fixlet ID: 97065302 Fixlet Link: http://support.microsoft.com/kb/970653 *************************************************************** Title: 970653: Aug. 2009 Cumulative Time Zone Update - Windows Server 2003 SP2 (French) Severity: Fixlet ID: 97065303 Fixlet Link: http://support.microsoft.com/kb/970653 Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates. See the Microsoft web page on the 2007 DST changes here for more information. *************************************************************** Title: 970653: Aug. 2009 Cumulative Time Zone Update - Windows Server 2003 SP2 - CORRUPT PATCH (French) Severity: Fixlet ID: 97065304 Fixlet Link: http://support.microsoft.com/kb/970653 *************************************************************** Title: 970653: Aug. 2009 Cumulative Time Zone Update - Windows Vista Gold/SP1/SP2 (French) Severity: Fixlet ID: 97065305 Fixlet Link: http://support.microsoft.com/kb/970653 Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates. See the Microsoft web page on the 2007 DST changes here for more information. *************************************************************** Title: 970653: Aug. 2009 Cumulative Time Zone Update - Windows Server 2008 Gold/SP2 (French) Severity: Fixlet ID: 97065307 Fixlet Link: http://support.microsoft.com/kb/970653 Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates. See the Microsoft web page on the 2007 DST changes here for more information. *************************************************************** Title: 970653: Aug. 2009 Cumulative Time Zone Update - Windows Server 2003 SP2 (x64) (French) Severity: Fixlet ID: 97065311 Fixlet Link: http://support.microsoft.com/kb/970653 Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates. See the Microsoft web page on the 2007 DST changes here for more information. *************************************************************** Title: 970653: Aug. 2009 Cumulative Time Zone Update - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (French) Severity: Fixlet ID: 97065312 Fixlet Link: http://support.microsoft.com/kb/970653 *************************************************************** Title: 970653: Aug. 2009 Cumulative Time Zone Update - Windows Vista Gold/SP1/SP2 (x64) (French) Severity: Fixlet ID: 97065313 Fixlet Link: http://support.microsoft.com/kb/970653 Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates. See the Microsoft web page on the 2007 DST changes here for more information. *************************************************************** Title: 970653: Aug. 2009 Cumulative Time Zone Update - Windows Server 2008 Gold/SP2 (x64) (French) Severity: Fixlet ID: 97065315 Fixlet Link: http://support.microsoft.com/kb/970653 Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates. See the Microsoft web page on the 2007 DST changes here for more information.