[BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: PatchesforWindows(Japanese)

autonotify at bigfix.com autonotify at bigfix.com
Fri Oct 14 02:05:24 PDT 2005


Fixlet Site - PatchesforWindows(Japanese)
Current Version: 105	Published: Thu, 13 Oct 2005 21:50:38 GMT


***************************************************************
Title: MS05-044: Vulnerability in the Windows FTP Client Could Allow File Transfer Location Tampering - Windows Server 2003 (Japanese)
Severity: Moderate
Fixlet ID: 504401
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS05-044.mspx

Fixlet Description: A tampering vulnerability exists in the Windows FTP client. This vulnerability could allow an attacker to modify the intended destination location for a file transfer, when a client has manually chosen to transfer a file by using FTP. This vulnerability could allow the attacker to write the file to any file system that is located on an affected system.

***************************************************************
Title: MS05-044: CORRUPT PATCH - Windows Server 2003 (Japanese)
Severity: Moderate
Fixlet ID: 504402
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS05-044.mspx


***************************************************************
Title: MS05-044: Vulnerability in the Windows FTP Client Could Allow File Transfer Location Tampering - Windows XP SP1 (Japanese)
Severity: Moderate
Fixlet ID: 504403
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS05-044.mspx

Fixlet Description: A tampering vulnerability exists in the Windows FTP client. This vulnerability could allow an attacker to modify the intended destination location for a file transfer, when a client has manually chosen to transfer a file by using FTP. This vulnerability could allow the attacker to write the file to any file system that is located on an affected system.

***************************************************************
Title: MS05-044: CORRUPT PATCH - Windows XP SP1 (Japanese)
Severity: Moderate
Fixlet ID: 504404
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS05-044.mspx


***************************************************************
Title: MS05-044: Vulnerability in the Windows FTP Client Could Allow File Transfer Location Tampering - Windows 2000 IE 6 SP1 (Japanese)
Severity: Moderate
Fixlet ID: 504405
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS05-044.mspx

Fixlet Description: A tampering vulnerability exists in the Windows FTP client. This vulnerability could allow an attacker to modify the intended destination location for a file transfer, when a client has manually chosen to transfer a file by using FTP. This vulnerability could allow the attacker to write the file to any file system that is located on an affected system.

***************************************************************
Title: MS05-044: CORRUPT PATCH - Windows 2000 IE 6 SP1 (Japanese)
Severity: Moderate
Fixlet ID: 504406
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS05-044.mspx


***************************************************************
Title: MS05-045: Vulnerability in Network Connection Manager Could Allow Denial of Service - Windows Server 2003 (Japanese)
Severity: Moderate
Fixlet ID: 504501
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS05-045.mspx

Fixlet Description: Microsoft has released a patch eliminating a denial of service vulnerability in Network connection manager, which could allow an attacker to send a specially crafted network packet to an affected system. An attacker who successfully exploited this vulnerability could cause the component responsible for managing network and remote access connections to stop responding. If the affected component is stopped due to an attack, it will automatically restart when new requests are received.After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS05-045: CORRUPT PATCH - Windows Server 2003 (Japanese)
Severity: Moderate
Fixlet ID: 504502
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS05-045.mspx


***************************************************************
Title: MS05-045: Vulnerability in Network Connection Manager Could Allow Denial of Service - Windows XP SP1/SP2 (Japanese)
Severity: Moderate
Fixlet ID: 504503
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS05-045.mspx

Fixlet Description: Microsoft has released a patch eliminating a denial of service vulnerability in Network connection manager, which could allow an attacker to send a specially crafted network packet to an affected system. An attacker who successfully exploited this vulnerability could cause the component responsible for managing network and remote access connections to stop responding. If the affected component is stopped due to an attack, it will automatically restart when new requests are received.After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS05-045: CORRUPT PATCH - Windows XP SP1/SP2 (Japanese)
Severity: Moderate
Fixlet ID: 504504
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS05-045.mspx


***************************************************************
Title: MS05-045: Vulnerability in Network Connection Manager Could Allow Denial of Service - Windows 2000 SP4 (Japanese)
Severity: Moderate
Fixlet ID: 504505
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS05-045.mspx

Fixlet Description: Microsoft has released a patch eliminating a denial of service vulnerability in Network connection manager, which could allow an attacker to send a specially crafted network packet to an affected system. An attacker who successfully exploited this vulnerability could cause the component responsible for managing network and remote access connections to stop responding. If the affected component is stopped due to an attack, it will automatically restart when new requests are received.

***************************************************************
Title: MS05-045: CORRUPT PATCH - Windows 2000 SP4 (Japanese)
Severity: Moderate
Fixlet ID: 504506
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS05-045.mspx


***************************************************************
Title: MS05-046: Vulnerability in the Client Service for NetWare Could Allow Remote Code Execution - Windows Server 2003 (Japanese)
Severity: Important
Fixlet ID: 504601
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS05-046.mspx

Fixlet Description: Microsoft has released a patch eliminating a security vulnerability in the NetWare Client. This update resolves a newly-discovered, privately-reported vulnerability. A remote code execution vulnerability exists in the Client Service for NetWare (CSNW). By default, CSNW is not installed on any affected operating system version. Only customers who manually installed CSNW could be vulnerable to this issue. The vulnerability is documented in the “Vulnerability Details” section of the security bulletin. An attacker who successfully exploited this vulnerability could remotely take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Microsoft recommends that customers apply the update at the earliest opportunity. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. 

***************************************************************
Title: MS05-046: CORRUPT PATCH - Windows Server 2003 (Japanese)
Severity: Important
Fixlet ID: 504602
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS05-046.mspx


***************************************************************
Title: MS05-046: Vulnerability in the Client Service for NetWare Could Allow Remote Code Execution - Windows XP SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 504603
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS05-046.mspx

Fixlet Description: Microsoft has released a patch eliminating a security vulnerability in the NetWare Client. This update resolves a newly-discovered, privately-reported vulnerability. A remote code execution vulnerability exists in the Client Service for NetWare (CSNW). By default, CSNW is not installed on any affected operating system version. Only customers who manually installed CSNW could be vulnerable to this issue. The vulnerability is documented in the “Vulnerability Details” section of the security bulletin. An attacker who successfully exploited this vulnerability could remotely take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Microsoft recommends that customers apply the update at the earliest opportunity. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. 

***************************************************************
Title: MS05-046: CORRUPT PATCH - Windows XP SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 504604
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS05-046.mspx


***************************************************************
Title: MS05-046: Vulnerability in the Client Service for NetWare Could Allow Remote Code Execution - Windows 2000 SP4 (Japanese)
Severity: Important
Fixlet ID: 504605
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS05-046.mspx

Fixlet Description: Microsoft has released a patch eliminating a security vulnerability in the NetWare Client. This update resolves a newly-discovered, privately-reported vulnerability. A remote code execution vulnerability exists in the Client Service for NetWare (CSNW). By default, CSNW is not installed on any affected operating system version. Only customers who manually installed CSNW could be vulnerable to this issue. The vulnerability is documented in the “Vulnerability Details” section of the security bulletin. An attacker who successfully exploited this vulnerability could remotely take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Microsoft recommends that customers apply the update at the earliest opportunity. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. 

***************************************************************
Title: MS05-046: CORRUPT PATCH - Windows 2000 SP4 (Japanese)
Severity: Important
Fixlet ID: 504606
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS05-046.mspx


***************************************************************
Title: MS05-047: Vulnerability in Plug and Play Could Allow Remote Code Execution and Local Elevation of Privilege - Windows XP SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 504701
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS05-047.mspx

Fixlet Description: This update resolves a newly-discovered, privately-reported vulnerability. A remote code execution vulnerability exists in Plug and Play (PnP) that could allow an authenticated attacker who successfully exploited this vulnerability to take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. 

***************************************************************
Title: MS05-047: CORRUPT PATCH - Windows XP SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 504702
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS05-047.mspx


***************************************************************
Title: MS05-047: Vulnerability in Plug and Play Could Allow Remote Code Execution and Local Elevation of Privilege - Windows 2000 SP4 (Japanese)
Severity: Important
Fixlet ID: 504703
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS05-047.mspx

Fixlet Description: This update resolves a newly-discovered, privately-reported vulnerability. A remote code execution vulnerability exists in Plug and Play (PnP) that could allow an authenticated attacker who successfully exploited this vulnerability to take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. 

***************************************************************
Title: MS05-047: CORRUPT PATCH - Windows 2000 SP4 (Japanese)
Severity: Important
Fixlet ID: 504704
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS05-047.mspx


***************************************************************
Title: MS05-048: Vulnerability in the Microsoft Collaboration Data Objects Could Allow Remote Code Execution - Exchange 2000 Server SP3 with Update Rollup (Japanese)
Severity: Important
Fixlet ID: 504801
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS05-048.mspx

Fixlet Description: A remote code execution vulnerability exists in Collaboration Data Objects that could allow an attacker who successfully exploited this vulnerability to take complete control of the affected system.After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS05-048: CORRUPT PATCH - Exchange 2000 Server SP3 with Update Rollup (Japanese)
Severity: Important
Fixlet ID: 504802
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS05-048.mspx


***************************************************************
Title: MS05-048: Vulnerability in the Microsoft Collaboration Data Objects Could Allow Remote Code Execution - Windows Server 2003 (Japanese)
Severity: Moderate
Fixlet ID: 504803
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS05-048.mspx

Fixlet Description: A remote code execution vulnerability exists in Collaboration Data Objects that could allow an attacker who successfully exploited this vulnerability to take complete control of the affected system.

***************************************************************
Title: MS05-048: CORRUPT PATCH - Windows Server 2003 (Japanese)
Severity: Moderate
Fixlet ID: 504804
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS05-048.mspx


***************************************************************
Title: MS05-048: Vulnerability in the Microsoft Collaboration Data Objects Could Allow Remote Code Execution - Windows XP SP1/SP2 (Japanese)
Severity: Moderate
Fixlet ID: 504805
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS05-048.mspx

Fixlet Description: A remote code execution vulnerability exists in Collaboration Data Objects that could allow an attacker who successfully exploited this vulnerability to take complete control of the affected system.

***************************************************************
Title: MS05-048: CORRUPT PATCH - Windows XP SP1/SP2 (Japanese)
Severity: Moderate
Fixlet ID: 504806
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS05-048.mspx


***************************************************************
Title: MS05-048: Vulnerability in the Microsoft Collaboration Data Objects Could Allow Remote Code Execution - Windows 2000 SP4 (Japanese)
Severity: Important
Fixlet ID: 504807
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS05-048.mspx

Fixlet Description: A remote code execution vulnerability exists in Collaboration Data Objects that could allow an attacker who successfully exploited this vulnerability to take complete control of the affected system.After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. 

***************************************************************
Title: MS05-048: CORRUPT PATCH - Windows 2000 SP4 (Japanese)
Severity: Important
Fixlet ID: 504808
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS05-048.mspx


***************************************************************
Title: MS05-049: Vulnerabilities in Windows Shell Could Allow Remote Code Execution - Windows Server 2003 (Japanese)
Severity: Important
Fixlet ID: 504903
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS05-049.mspx

Fixlet Description: A remote code execution vulnerability exists in Windows Shell that could allow an attacker who successfully exploited this vulnerability to take complete control of the affected system. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. 

***************************************************************
Title: MS05-049: CORRUPT PATCH - Windows Server 2003 (Japanese)
Severity: Important
Fixlet ID: 504904
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS05-049.mspx


***************************************************************
Title: MS05-049: Vulnerabilities in Windows Shell Could Allow Remote Code Execution - Windows XP SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 504905
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS05-049.mspx

Fixlet Description: A remote code execution vulnerability exists in Windows Shell that could allow an attacker who successfully exploited this vulnerability to take complete control of the affected system. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. 

***************************************************************
Title: MS05-049: CORRUPT PATCH - Windows XP SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 504906
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS05-049.mspx


***************************************************************
Title: MS05-049: Vulnerabilities in Windows Shell Could Allow Remote Code Execution - Windows 2000 SP4 (Japanese)
Severity: Important
Fixlet ID: 504907
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS05-049.mspx

Fixlet Description: A remote code execution vulnerability exists in Windows Shell that could allow an attacker who successfully exploited this vulnerability to take complete control of the affected system. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. 

***************************************************************
Title: MS05-049: CORRUPT PATCH - Windows 2000 SP4 (Japanese)
Severity: Important
Fixlet ID: 504908
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS05-049.mspx


***************************************************************
Title: MS05-050: Vulnerability in DirectShow Could Allow Remote Code Execution - Windows Server 2003 (Japanese)
Severity: Critical
Fixlet ID: 505001
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS05-050.mspx

Fixlet Description: Microsoft has released a patch eliminating security vulnerabilities in DirectShow. A remote code execution vulnerability exists in DirectShow that could allow an attacker who successfully exploited this vulnerability to take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS05-050: CORRUPT PATCH - Windows Server 2003 (Japanese)
Severity: Critical
Fixlet ID: 505002
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS05-050.mspx


***************************************************************
Title: MS05-050: Vulnerability in DirectShow Could Allow Remote Code Execution - Windows XP SP1/SP2 (Japanese)
Severity: Critical
Fixlet ID: 505003
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS05-050.mspx

Fixlet Description: Microsoft has released a patch eliminating security vulnerabilities in DirectShow. A remote code execution vulnerability exists in DirectShow that could allow an attacker who successfully exploited this vulnerability to take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. 

***************************************************************
Title: MS05-050: CORRUPT PATCH - Windows XP SP1/SP2 (Japanese)
Severity: Critical
Fixlet ID: 505004
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS05-050.mspx


***************************************************************
Title: MS05-050: Vulnerability in DirectShow Could Allow Remote Code Execution - Windows 2000 SP4 (Japanese)
Severity: Critical
Fixlet ID: 505005
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS05-050.mspx

Fixlet Description: Microsoft has released a patch eliminating security vulnerabilities in DirectShow. A remote code execution vulnerability exists in DirectShow that could allow an attacker who successfully exploited this vulnerability to take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. 

***************************************************************
Title: MS05-050: CORRUPT PATCH - Windows 2000 SP4 (Japanese)
Severity: Critical
Fixlet ID: 505006
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS05-050.mspx


***************************************************************
Title: MS05-050: Vulnerability in DirectShow Could Allow Remote Code Execution - DirectX 9.0 on Windows Server 2003 (Japanese)
Severity: Critical
Fixlet ID: 505009
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS05-050.mspx

Fixlet Description: Microsoft has released a patch eliminating security vulnerabilities in DirectShow. A remote code execution vulnerability exists in DirectShow that could allow an attacker who successfully exploited this vulnerability to take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS05-050: CORRUPT PATCH - DirectX 9.0 on Windows Server 2003 (Japanese)
Severity: Critical
Fixlet ID: 505010
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS05-050.mspx


***************************************************************
Title: MS05-050: Vulnerability in DirectShow Could Allow Remote Code Execution - DirectX 9.0 on Windows XP SP1 (Japanese)
Severity: Critical
Fixlet ID: 505011
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS05-050.mspx

Fixlet Description: Microsoft has released a patch eliminating security vulnerabilities in DirectShow. A remote code execution vulnerability exists in DirectShow that could allow an attacker who successfully exploited this vulnerability to take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. 

***************************************************************
Title: MS05-050: CORRUPT PATCH - DirectX 9.0 on Windows XP SP1 (Japanese)
Severity: Critical
Fixlet ID: 505012
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS05-050.mspx


***************************************************************
Title: MS05-050: Vulnerability in DirectShow Could Allow Remote Code Execution - DirectX 8.0/8.1/8.2 on Windows 2000 SP4 (Japanese)
Severity: Critical
Fixlet ID: 505013
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS05-050.mspx

Fixlet Description: Microsoft has released a patch eliminating security vulnerabilities in DirectShow. A remote code execution vulnerability exists in DirectShow that could allow an attacker who successfully exploited this vulnerability to take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS05-050: CORRUPT PATCH - DirectX 8.0/8.1/8.2 on Windows 2000 SP4 (Japanese)
Severity: Critical
Fixlet ID: 505014
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS05-050.mspx


***************************************************************
Title: MS05-050: Vulnerability in DirectShow Could Allow Remote Code Execution - DirectX 9.0 on Windows 2000 SP4 (Japanese)
Severity: Critical
Fixlet ID: 505015
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS05-050.mspx

Fixlet Description: Microsoft has released a patch eliminating security vulnerabilities in DirectShow. A remote code execution vulnerability exists in DirectShow that could allow an attacker who successfully exploited this vulnerability to take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. 

***************************************************************
Title: MS05-050: CORRUPT PATCH - DirectX 9.0 on Windows 2000 SP4 (Japanese)
Severity: Critical
Fixlet ID: 505016
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS05-050.mspx


***************************************************************
Title: MS05-051: Vulnerabilities in MSDTC and COM+ Could Allow Remote Code Execution - Windows Server 2003 (Japanese)
Severity: Important
Fixlet ID: 505101
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS05-051.mspx

Fixlet Description: Microsoft has released a patch eliminating security vulnerabilities in MSDTC and COM+. An attacker who successfully exploited the most severe of these vulnerabilities could take complete control of an affected system.After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. 

***************************************************************
Title: MS05-051: CORRUPT PATCH - Windows Server 2003 (Japanese)
Severity: Important
Fixlet ID: 505102
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS05-051.mspx


***************************************************************
Title: MS05-051: Vulnerabilities in MSDTC and COM+ Could Allow Remote Code Execution - Windows XP SP1/SP2 (Japanese)
Severity: Critical
Fixlet ID: 505103
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS05-051.mspx

Fixlet Description: Microsoft has released a patch eliminating security vulnerabilities in MSDTC and COM+. An attacker who successfully exploited the most severe of these vulnerabilities could take complete control of an affected system. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. 

***************************************************************
Title: MS05-051: CORRUPT PATCH - Windows XP SP1/SP2 (Japanese)
Severity: Critical
Fixlet ID: 505104
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS05-051.mspx


***************************************************************
Title: MS05-051: Vulnerabilities in MSDTC and COM+ Could Allow Remote Code Execution - Windows 2000 SP4 (Japanese)
Severity: Critical
Fixlet ID: 505105
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS05-051.mspx
Fixlet Link: http://support.microsoft.com/kb/908620

Fixlet Description: Microsoft has released a patch eliminating security vulnerabilities in MSDTC and COM+. An attacker who successfully exploited the most severe of these vulnerabilities could take complete control of an affected system. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. 
Fixlet Description: Microsoft has released a patch eliminating security vulnerabilities in MSDTC and COM+. An attacker who successfully exploited the most severe of these vulnerabilities could take complete control of an affected system. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. 

***************************************************************
Title: MS05-051: CORRUPT PATCH - Windows 2000 SP4 (Japanese)
Severity: Critical
Fixlet ID: 505106
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS05-051.mspx
Fixlet Link: http://support.microsoft.com/kb/908620


***************************************************************
Title: MS05-052: Cumulative Security Update for Internet Explorer - Windows Server 2003 (Japanese)
Severity: Moderate
Fixlet ID: 505201
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms05-052.mspx

Fixlet Description: Microsoft has released a cumulative patch to resolves a newly-discovered public vulnerability and other privately-reported variations of the same vulnerability. The Microsoft DDS Library Shape Control (Msdds.dll) and other COM objects could, when instantiated in Internet Explorer, allow an attacker to take complete control of an affected system. Because these COM objects were not designed to be instantiated in Internet Explorer, this update sets the kill bit for the affected Class Identifiers (CLSID) in these COM objects. 

***************************************************************
Title: MS05-052: CORRUPT PATCH - Windows Server 2003 (Japanese)
Severity: Moderate
Fixlet ID: 505202
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms05-052.mspx


***************************************************************
Title: MS05-052: Cumulative Security Update for Internet Explorer - IE 6.0 - Windows XP SP2 (Japanese)
Severity: Critical
Fixlet ID: 505203
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS05-052.mspx

Fixlet Description: Microsoft has released a cumulative patch to resolves a newly-discovered public vulnerability and other privately-reported variations of the same vulnerability. The Microsoft DDS Library Shape Control (Msdds.dll) and other COM objects could, when instantiated in Internet Explorer, allow an attacker to take complete control of an affected system. Because these COM objects were not designed to be instantiated in Internet Explorer, this update sets the kill bit for the affected Class Identifiers (CLSID) in these COM objects. 

***************************************************************
Title: MS05-052: CORRUPT PATCH - IE 6.0 - Windows XP SP2 (Japanese)
Severity: Critical
Fixlet ID: 505204
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS05-052.mspx


***************************************************************
Title: MS05-052: Cumulative Security Update for Internet Explorer - IE 6.0 SP1 - Windows 2000/XP (Japanese)
Severity: Critical
Fixlet ID: 505205
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS05-052.mspx

Fixlet Description: Microsoft has released a cumulative patch to resolves a newly-discovered public vulnerability and other privately-reported variations of the same vulnerability. The Microsoft DDS Library Shape Control (Msdds.dll) and other COM objects could, when instantiated in Internet Explorer, allow an attacker to take complete control of an affected system. Because these COM objects were not designed to be instantiated in Internet Explorer, this update sets the kill bit for the affected Class Identifiers (CLSID) in these COM objects. 

***************************************************************
Title: MS05-052: CORRUPT PATCH - IE 6.0 SP1 - Windows 2000/XP (Japanese)
Severity: Critical
Fixlet ID: 505206
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS05-052.mspx


***************************************************************
Title: MS05-052: Cumulative Security Update for Internet Explorer - IE 5.01 - Windows 2000 SP4 (Japanese)
Severity: Critical
Fixlet ID: 505207
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS05-052.mspx

Fixlet Description: Microsoft has released a cumulative patch to resolves a newly-discovered public vulnerability and other privately-reported variations of the same vulnerability. The Microsoft DDS Library Shape Control (Msdds.dll) and other COM objects could, when instantiated in Internet Explorer, allow an attacker to take complete control of an affected system. Because these COM objects were not designed to be instantiated in Internet Explorer, this update sets the kill bit for the affected Class Identifiers (CLSID) in these COM objects. 

***************************************************************
Title: MS05-052: CORRUPT PATCH - IE 5.01 - Windows 2000 SP4 (Japanese)
Severity: Critical
Fixlet ID: 505208
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS05-052.mspx


More information about the BigFix-Announcements-Japan mailing list