[BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: PatchesforWindows(Japanese)

Notification Notification
Fri Aug 21 15:44:26 PDT 2009


Fixlet Site - PatchesforWindows(Japanese)
Current Version: 304    Published: Wed, 19 Aug 2009 18:06:13  GMT

New Fixlets:
============

***************************************************************
Title: UPDATE: Exchange Server 2007 Service Pack 1 Update Roll 9 Available (Testing/Training Environment) (Japanese)
Severity: <Unspecified>
Fixlet ID: 62201
Fixlet Link: http://support.microsoft.com/?kbid=970162

Fixlet Description: Microsoft has released Update Rollup 9 for Microsoft Exchange Server 2007 Service Pack 1 (SP1). Update Rollup 9 for Exchange Server 2007 Service Pack 1 (SP1) resolves issues that were found in Exchange Server 2007 SP1 since the software was released. This update rollup is highly recommended for all Exchange Server 2007 SP1 customers.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the knowledge base article for more information.

Important Note: Installation of Exchange 2007 Server Roles on 32-bit computers is supported for testing and training envirionments only.

***************************************************************
Title: UPDATE: Exchange Server 2007 Service Pack 1 Update Roll 9 Available (Testing/Training Environment) - CORRUPT PATCH (Japanese)
Severity: <Unspecified>
Fixlet ID: 62202
Fixlet Link: http://support.microsoft.com/?kbid=970162

***************************************************************
Title: UPDATE: Exchange Server 2007 Service Pack 1 Update Roll 9 Available (X64) (Japanese)
Severity: <Unspecified>
Fixlet ID: 62203
Fixlet Link: http://support.microsoft.com/?kbid=970162

Fixlet Description: Microsoft has released Update Rollup 9 for Microsoft Exchange Server 2007 Service Pack 1 (SP1). Update Rollup 9 for Exchange Server 2007 Service Pack 1 (SP1) resolves issues that were found in Exchange Server 2007 SP1 since the software was released. This update rollup is highly recommended for all Exchange Server 2007 SP1 customers.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the knowledge base article for more information.

***************************************************************
Title: UPDATE: Exchange Server 2007 Service Pack 1 Update Roll 9 Available (X64) - CORRUPT PATCH (Japanese)
Severity: <Unspecified>
Fixlet ID: 62204
Fixlet Link: http://support.microsoft.com/?kbid=970162

***************************************************************
Title: UPDATE: Office 2007 Servers Service Pack 2 Available (Japanese)
Severity: <Unspecified>
Fixlet ID: 69101
Fixlet Link: http://support.microsoft.com/?kbid=953334

Fixlet Description: The 2007 Microsoft Office servers Service Pack 2 (SP2) package gives customers the latest updates to the 2007 Office server products. This service pack includes two main categories of fixes:  Previously unreleased fixes that were made specifically for this service pack.  In addition to providing general product fixes, SP2 includes improvements in stability, in performance, and in security. All the public updates, security updates, cumulative updates, and hotfixes that were released through February 2009.

***************************************************************
Title: UPDATE: Office 2007 Servers Service Pack 2 Available - SharePoint Services 3.0 SP2 Required (Japanese)
Severity: <Unspecified>
Fixlet ID: 69103
Fixlet Link: http://support.microsoft.com/?kbid=953334
Fixlet Link: http://support.microsoft.com/?kbid=953338

Fixlet Description: Important Note: The installation of this service pack for SharePoint Server 2007, Project Server 2007, Forms Server 2007, Search Server 2008, and Search Server 2008 Express requires that SharePoint Services 3.0 SP2 or greater be installed. Use the action below to install SharePoint Services 3.0 SP2.

The 2007 Microsoft Office servers Service Pack 2 (SP2) package gives customers the latest updates to the 2007 Office server products. This service pack includes two main categories of fixes:   Previously unreleased fixes that were made specifically for this service pack.  In addition to providing general product fixes, SP2 includes improvements in stability, in performance, and in security. All the public updates, security updates, cumulative updates, and hotfixes that were released through February 2009.

***************************************************************
Title: UPDATE: Office 2007 Servers Service Pack 2 Available (x64) (Japanese)
Severity: <Unspecified>
Fixlet ID: 69105
Fixlet Link: http://support.microsoft.com/?kbid=953334

Fixlet Description: The 2007 Microsoft Office servers Service Pack 2 (SP2) package gives customers the latest updates to the 2007 Office server products. This service pack includes two main categories of fixes:  Previously unreleased fixes that were made specifically for this service pack.  In addition to providing general product fixes, SP2 includes improvements in stability, in performance, and in security. All the public updates, security updates, cumulative updates, and hotfixes that were released through February 2009.

***************************************************************
Title: UPDATE: Office 2007 Servers Service Pack 2 Available - SharePoint Services 3.0 SP2 Required (x64) (Japanese)
Severity: <Unspecified>
Fixlet ID: 69107
Fixlet Link: http://support.microsoft.com/?kbid=953334
Fixlet Link: http://support.microsoft.com/?kbid=953338

Fixlet Description: Important Note: The installation of this service pack for SharePoint Server 2007, Project Server 2007, Forms Server 2007, Search Server 2008, and Search Server 2008 Express requires that SharePoint Services 3.0 SP2 or greater be installed. Use the action below to install SharePoint Services 3.0 SP2.

The 2007 Microsoft Office servers Service Pack 2 (SP2) package gives customers the latest updates to the 2007 Office server products. This service pack includes two main categories of fixes:   Previously unreleased fixes that were made specifically for this service pack.  In addition to providing general product fixes, SP2 includes improvements in stability, in performance, and in security. All the public updates, security updates, cumulative updates, and hotfixes that were released through February 2009.

***************************************************************
Title: MS09-029: Vulnerabilities in the Embedded OpenType Font Engine Could Allow Remote Code Execution - Windows XP SP2/SP3 (v2, re-released 8/11/09) - REVISED PATCH (Japanese)
Severity: Critical
Fixlet ID: 902949
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-029.mspx

Fixlet Description: Important Note: This patch was re-released on August 11, 2009 to address known issues with the original patch. The listed computers have the original version of the patch installed. The action below applies the revised version of the patch. Microsoft recommends that customers apply the update immediately.

Microsoft has released a security update that resolves two privately reported vulnerabilities in a Microsoft Windows component, the Embedded OpenType (EOT) Font Engine. The vulnerabilities could allow remote code execution. An attacker who successfully exploited either of these vulnerabilities could take complete control of an affected system remotely. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-029: Vulnerabilities in the Embedded OpenType Font Engine Could Allow Remote Code Execution - Windows XP SP2/SP3 (v2, re-released 8/11/09) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 902950
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-029.mspx

***************************************************************
Title: MS09-029: Vulnerabilities in the Embedded OpenType Font Engine Could Allow Remote Code Execution - Windows XP SP2/SP3 (v2, re-released 8/11/09) (Japanese)
Severity: Critical
Fixlet ID: 902951
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-029.mspx

Fixlet Description: Important Note: This patch was re-released on August 11, 2009 to address known issues with the original patch. Microsoft recommends that customers apply the update immediately.

Microsoft has released a security update that resolves two privately reported vulnerabilities in a Microsoft Windows component, the Embedded OpenType (EOT) Font Engine. The vulnerabilities could allow remote code execution. An attacker who successfully exploited either of these vulnerabilities could take complete control of an affected system remotely. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-029: Vulnerabilities in the Embedded OpenType Font Engine Could Allow Remote Code Execution - Windows 2000 SP4 (v2, re-released 8/11/09) (Japanese)
Severity: Critical
Fixlet ID: 902952
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-029.mspx

Fixlet Description: Important Note: This patch was re-released on August 11, 2009 to address known issues with the original patch. Microsoft recommends that customers apply the update immediately.

Microsoft has released a security update that resolves two privately reported vulnerabilities in a Microsoft Windows component, the Embedded OpenType (EOT) Font Engine. The vulnerabilities could allow remote code execution. An attacker who successfully exploited either of these vulnerabilities could take complete control of an affected system remotely. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-029: Vulnerabilities in the Embedded OpenType Font Engine Could Allow Remote Code Execution - Windows 2000 SP4 (v2, re-released 8/11/09) - REVISED PATCH (Japanese)
Severity: Critical
Fixlet ID: 902953
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-029.mspx

Fixlet Description: Important Note: This patch was re-released on August 11, 2009 to address known issues with the original patch. The listed computers have the original version of the patch installed. The action below applies the revised version of the patch. Microsoft recommends that customers apply the update immediately.

Microsoft has released a security update that resolves two privately reported vulnerabilities in a Microsoft Windows component, the Embedded OpenType (EOT) Font Engine. The vulnerabilities could allow remote code execution. An attacker who successfully exploited either of these vulnerabilities could take complete control of an affected system remotely. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-029: Vulnerabilities in the Embedded OpenType Font Engine Could Allow Remote Code Execution - Windows 2000 SP4 (v2, re-released 8/11/09) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 902954
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-029.mspx

***************************************************************
Title: MS09-029: Vulnerabilities in the Embedded OpenType Font Engine Could Allow Remote Code Execution - Windows Server 2003 SP2 (v2, re-released 8/11/09) (Japanese)
Severity: Critical
Fixlet ID: 902955
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-029.mspx

Fixlet Description: Important Note: This patch was re-released on August 11, 2009 to address known issues with the original patch. Microsoft recommends that customers apply the update immediately.

Microsoft has released a security update that resolves two privately reported vulnerabilities in a Microsoft Windows component, the Embedded OpenType (EOT) Font Engine. The vulnerabilities could allow remote code execution. An attacker who successfully exploited either of these vulnerabilities could take complete control of an affected system remotely. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-029: Vulnerabilities in the Embedded OpenType Font Engine Could Allow Remote Code Execution - Windows Server 2003 SP2 (v2, re-released 8/11/09) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 902956
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-029.mspx

***************************************************************
Title: MS09-029: Vulnerabilities in the Embedded OpenType Font Engine Could Allow Remote Code Execution - Windows Server 2003 SP2 (v2, re-released 8/11/09) - REVISED PATCH (Japanese)
Severity: Critical
Fixlet ID: 902958
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-029.mspx

Fixlet Description: Important Note: This patch was re-released on August 11, 2009 to address known issues with the original patch. The listed computers have the original version of the patch installed. The action below applies the revised version of the patch. Microsoft recommends that customers apply the update immediately.

Microsoft has released a security update that resolves two privately reported vulnerabilities in a Microsoft Windows component, the Embedded OpenType (EOT) Font Engine. The vulnerabilities could allow remote code execution. An attacker who successfully exploited either of these vulnerabilities could take complete control of an affected system remotely. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-029: Vulnerabilities in the Embedded OpenType Font Engine Could Allow Remote Code Execution - Windows XP SP2 (x64) (v2, re-released 8/11/09) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 902960
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-029.mspx

***************************************************************
Title: MS09-029: Vulnerabilities in the Embedded OpenType Font Engine Could Allow Remote Code Execution - Windows XP SP2 (x64) (v2, re-released 8/11/09) (Japanese)
Severity: Critical
Fixlet ID: 902961
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-029.mspx

Fixlet Description: Important Note: This patch was re-released on August 11, 2009 to address known issues with the original patch. Microsoft recommends that customers apply the update immediately.

Microsoft has released a security update that resolves two privately reported vulnerabilities in a Microsoft Windows component, the Embedded OpenType (EOT) Font Engine. The vulnerabilities could allow remote code execution. An attacker who successfully exploited either of these vulnerabilities could take complete control of an affected system remotely. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-029: Vulnerabilities in the Embedded OpenType Font Engine Could Allow Remote Code Execution - Windows XP SP2 (x64) (v2, re-released 8/11/09) - REVISED PATCH (Japanese)
Severity: Critical
Fixlet ID: 902962
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-029.mspx

Fixlet Description: Important Note: This patch was re-released on August 11, 2009 to address known issues with the original patch. The listed computers have the original version of the patch installed. The action below applies the revised version of the patch. Microsoft recommends that customers apply the update immediately.

Microsoft has released a security update that resolves two privately reported vulnerabilities in a Microsoft Windows component, the Embedded OpenType (EOT) Font Engine. The vulnerabilities could allow remote code execution. An attacker who successfully exploited either of these vulnerabilities could take complete control of an affected system remotely. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-029: Vulnerabilities in the Embedded OpenType Font Engine Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (v2, re-released 8/11/09) (Japanese)
Severity: Critical
Fixlet ID: 902963
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-029.mspx

Fixlet Description: Important Note: This patch was re-released on August 11, 2009 to address known issues with the original patch. Microsoft recommends that customers apply the update immediately.

Microsoft has released a security update that resolves two privately reported vulnerabilities in a Microsoft Windows component, the Embedded OpenType (EOT) Font Engine. The vulnerabilities could allow remote code execution. An attacker who successfully exploited either of these vulnerabilities could take complete control of an affected system remotely. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-029: Vulnerabilities in the Embedded OpenType Font Engine Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (v2, re-released 8/11/09) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 902964
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-029.mspx

***************************************************************
Title: MS09-029: Vulnerabilities in the Embedded OpenType Font Engine Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (v2, re-released 8/11/09) - REVISED PATCH (Japanese)
Severity: Critical
Fixlet ID: 902965
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-029.mspx

Fixlet Description: Important Note: This patch was re-released on August 11, 2009 to address known issues with the original patch. The listed computers have the original version of the patch installed. The action below applies the revised version of the patch. Microsoft recommends that customers apply the update immediately.

Microsoft has released a security update that resolves two privately reported vulnerabilities in a Microsoft Windows component, the Embedded OpenType (EOT) Font Engine. The vulnerabilities could allow remote code execution. An attacker who successfully exploited either of these vulnerabilities could take complete control of an affected system remotely. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 5.01 SP4 - Windows 2000 SP4 (Japanese)
Severity: Critical
Fixlet ID: 903401
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx

Fixlet Description: Microsoft has released a security update that is being released out of band in conjunction with Microsoft Security Bulletin MS09-035, which describes vulnerabilities in those components and controls that have been developed using vulnerable versions of the Microsoft Active Template Library (ATL). As a defense-in-depth measure, this Internet Explorer security update helps mitigate known attack vectors within Internet Explorer for those components and controls that have been developed with vulnerable versions of ATL as described in Microsoft Security Advisory (973882) and Microsoft Security Bulletin MS09-035. This security update also resolves three privately reported vulnerabilities in Internet Explorer. These vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There is no default action for this Fixlet message because Bigfix has recieved reports of various issues associated with the deployment of this patch. Please take extra caution to qualify this update in a test environment prior to use in a production environment. For more information on default actions, see BigFix KB #474

***************************************************************
Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 5.01 SP4 - Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 903402
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx

***************************************************************
Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 6 SP1 -  Windows 2000 SP4 (Japanese)
Severity: Critical
Fixlet ID: 903403
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx

Fixlet Description: Microsoft has released a security update that is being released out of band in conjunction with Microsoft Security Bulletin MS09-035, which describes vulnerabilities in those components and controls that have been developed using vulnerable versions of the Microsoft Active Template Library (ATL). As a defense-in-depth measure, this Internet Explorer security update helps mitigate known attack vectors within Internet Explorer for those components and controls that have been developed with vulnerable versions of ATL as described in Microsoft Security Advisory (973882) and Microsoft Security Bulletin MS09-035. This security update also resolves three privately reported vulnerabilities in Internet Explorer. These vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There is no default action for this Fixlet message because Bigfix has recieved reports of various issues associated with the deployment of this patch. Please take extra caution to qualify this update in a test environment prior to use in a production environment. For more information on default actions, see BigFix KB #474

***************************************************************
Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 6 SP1 -  Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 903404
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx

***************************************************************
Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2/SP3 (Japanese)
Severity: Critical
Fixlet ID: 903405
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx

Fixlet Description: Microsoft has released a security update that is being released out of band in conjunction with Microsoft Security Bulletin MS09-035, which describes vulnerabilities in those components and controls that have been developed using vulnerable versions of the Microsoft Active Template Library (ATL). As a defense-in-depth measure, this Internet Explorer security update helps mitigate known attack vectors within Internet Explorer for those components and controls that have been developed with vulnerable versions of ATL as described in Microsoft Security Advisory (973882) and Microsoft Security Bulletin MS09-035. This security update also resolves three privately reported vulnerabilities in Internet Explorer. These vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There is no default action for this Fixlet message because Bigfix has recieved reports of various issues associated with the deployment of this patch. Please take extra caution to qualify this update in a test environment prior to use in a production environment. For more information on default actions, see BigFix KB #474

***************************************************************
Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 903406
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx

***************************************************************
Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 903407
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx

Fixlet Description: Microsoft has released a security update that is being released out of band in conjunction with Microsoft Security Bulletin MS09-035, which describes vulnerabilities in those components and controls that have been developed using vulnerable versions of the Microsoft Active Template Library (ATL). As a defense-in-depth measure, this Internet Explorer security update helps mitigate known attack vectors within Internet Explorer for those components and controls that have been developed with vulnerable versions of ATL as described in Microsoft Security Advisory (973882) and Microsoft Security Bulletin MS09-035. This security update also resolves three privately reported vulnerabilities in Internet Explorer. These vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There is no default action for this Fixlet message because Bigfix has recieved reports of various issues associated with the deployment of this patch. Please take extra caution to qualify this update in a test environment prior to use in a production environment. For more information on default actions, see BigFix KB #474

***************************************************************
Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 903408
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx

***************************************************************
Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 903409
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx

Fixlet Description: Microsoft has released a security update that is being released out of band in conjunction with Microsoft Security Bulletin MS09-035, which describes vulnerabilities in those components and controls that have been developed using vulnerable versions of the Microsoft Active Template Library (ATL). As a defense-in-depth measure, this Internet Explorer security update helps mitigate known attack vectors within Internet Explorer for those components and controls that have been developed with vulnerable versions of ATL as described in Microsoft Security Advisory (973882) and Microsoft Security Bulletin MS09-035. This security update also resolves three privately reported vulnerabilities in Internet Explorer. These vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There is no default action for this Fixlet message because Bigfix has recieved reports of various issues associated with the deployment of this patch. Please take extra caution to qualify this update in a test environment prior to use in a production environment. For more information on default actions, see BigFix KB #474

***************************************************************
Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 903410
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx

***************************************************************
Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 903411
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx

Fixlet Description: Microsoft has released a security update that is being released out of band in conjunction with Microsoft Security Bulletin MS09-035, which describes vulnerabilities in those components and controls that have been developed using vulnerable versions of the Microsoft Active Template Library (ATL). As a defense-in-depth measure, this Internet Explorer security update helps mitigate known attack vectors within Internet Explorer for those components and controls that have been developed with vulnerable versions of ATL as described in Microsoft Security Advisory (973882) and Microsoft Security Bulletin MS09-035. This security update also resolves three privately reported vulnerabilities in Internet Explorer. These vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There is no default action for this Fixlet message because Bigfix has recieved reports of various issues associated with the deployment of this patch. Please take extra caution to qualify this update in a test environment prior to use in a production environment. For more information on default actions, see BigFix KB #474

***************************************************************
Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 903412
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx

***************************************************************
Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2/SP3 (Japanese)
Severity: Critical
Fixlet ID: 903413
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx

Fixlet Description: Microsoft has released a security update that is being released out of band in conjunction with Microsoft Security Bulletin MS09-035, which describes vulnerabilities in those components and controls that have been developed using vulnerable versions of the Microsoft Active Template Library (ATL). As a defense-in-depth measure, this Internet Explorer security update helps mitigate known attack vectors within Internet Explorer for those components and controls that have been developed with vulnerable versions of ATL as described in Microsoft Security Advisory (973882) and Microsoft Security Bulletin MS09-035. This security update also resolves three privately reported vulnerabilities in Internet Explorer. These vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There is no default action for this Fixlet message because Bigfix has recieved reports of various issues associated with the deployment of this patch. Please take extra caution to qualify this update in a test environment prior to use in a production environment. For more information on default actions, see BigFix KB #474

***************************************************************
Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 903414
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx

***************************************************************
Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 903415
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx

Fixlet Description: Microsoft has released a security update that is being released out of band in conjunction with Microsoft Security Bulletin MS09-035, which describes vulnerabilities in those components and controls that have been developed using vulnerable versions of the Microsoft Active Template Library (ATL). As a defense-in-depth measure, this Internet Explorer security update helps mitigate known attack vectors within Internet Explorer for those components and controls that have been developed with vulnerable versions of ATL as described in Microsoft Security Advisory (973882) and Microsoft Security Bulletin MS09-035. This security update also resolves three privately reported vulnerabilities in Internet Explorer. These vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There is no default action for this Fixlet message because Bigfix has recieved reports of various issues associated with the deployment of this patch. Please take extra caution to qualify this update in a test environment prior to use in a production environment. For more information on default actions, see BigFix KB #474

***************************************************************
Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 903416
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx

***************************************************************
Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 903417
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx

Fixlet Description: Microsoft has released a security update that is being released out of band in conjunction with Microsoft Security Bulletin MS09-035, which describes vulnerabilities in those components and controls that have been developed using vulnerable versions of the Microsoft Active Template Library (ATL). As a defense-in-depth measure, this Internet Explorer security update helps mitigate known attack vectors within Internet Explorer for those components and controls that have been developed with vulnerable versions of ATL as described in Microsoft Security Advisory (973882) and Microsoft Security Bulletin MS09-035. This security update also resolves three privately reported vulnerabilities in Internet Explorer. These vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There is no default action for this Fixlet message because Bigfix has recieved reports of various issues associated with the deployment of this patch. Please take extra caution to qualify this update in a test environment prior to use in a production environment. For more information on default actions, see BigFix KB #474

***************************************************************
Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 903418
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx

***************************************************************
Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 903419
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx

Fixlet Description: Microsoft has released a security update that is being released out of band in conjunction with Microsoft Security Bulletin MS09-035, which describes vulnerabilities in those components and controls that have been developed using vulnerable versions of the Microsoft Active Template Library (ATL). As a defense-in-depth measure, this Internet Explorer security update helps mitigate known attack vectors within Internet Explorer for those components and controls that have been developed with vulnerable versions of ATL as described in Microsoft Security Advisory (973882) and Microsoft Security Bulletin MS09-035. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. This security update also resolves three privately reported vulnerabilities in Internet Explorer. These vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Important Note: There is no default action for this Fixlet message because Bigfix has recieved reports of various issues associated with the deployment of this patch. Please take extra caution to qualify this update in a test environment prior to use in a production environment. For more information on default actions, see BigFix KB #474

***************************************************************
Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 903420
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx

***************************************************************
Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 7 - Windows Vista Gold/SP1/SP2 (Japanese)
Severity: Critical
Fixlet ID: 903421
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx

Fixlet Description: Microsoft has released a security update that is being released out of band in conjunction with Microsoft Security Bulletin MS09-035, which describes vulnerabilities in those components and controls that have been developed using vulnerable versions of the Microsoft Active Template Library (ATL). As a defense-in-depth measure, this Internet Explorer security update helps mitigate known attack vectors within Internet Explorer for those components and controls that have been developed with vulnerable versions of ATL as described in Microsoft Security Advisory (973882) and Microsoft Security Bulletin MS09-035. This security update also resolves three privately reported vulnerabilities in Internet Explorer. These vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There is no default action for this Fixlet message because Bigfix has recieved reports of various issues associated with the deployment of this patch. Please take extra caution to qualify this update in a test environment prior to use in a production environment. For more information on default actions, see BigFix KB #474

***************************************************************
Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 7 - Windows Vista Gold/SP1/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 903423
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx

Fixlet Description: Microsoft has released a security update that is being released out of band in conjunction with Microsoft Security Bulletin MS09-035, which describes vulnerabilities in those components and controls that have been developed using vulnerable versions of the Microsoft Active Template Library (ATL). As a defense-in-depth measure, this Internet Explorer security update helps mitigate known attack vectors within Internet Explorer for those components and controls that have been developed with vulnerable versions of ATL as described in Microsoft Security Advisory (973882) and Microsoft Security Bulletin MS09-035. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. This security update also resolves three privately reported vulnerabilities in Internet Explorer. These vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Important Note: There is no default action for this Fixlet message because Bigfix has recieved reports of various issues associated with the deployment of this patch. Please take extra caution to qualify this update in a test environment prior to use in a production environment. For more information on default actions, see BigFix KB #474

***************************************************************
Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Moderate
Fixlet ID: 903425
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx

Fixlet Description: Microsoft has released a security update that is being released out of band in conjunction with Microsoft Security Bulletin MS09-035, which describes vulnerabilities in those components and controls that have been developed using vulnerable versions of the Microsoft Active Template Library (ATL). As a defense-in-depth measure, this Internet Explorer security update helps mitigate known attack vectors within Internet Explorer for those components and controls that have been developed with vulnerable versions of ATL as described in Microsoft Security Advisory (973882) and Microsoft Security Bulletin MS09-035. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. This security update also resolves three privately reported vulnerabilities in Internet Explorer. These vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

***************************************************************
Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 903427
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx

Fixlet Description: Microsoft has released a security update that is being released out of band in conjunction with Microsoft Security Bulletin MS09-035, which describes vulnerabilities in those components and controls that have been developed using vulnerable versions of the Microsoft Active Template Library (ATL). As a defense-in-depth measure, this Internet Explorer security update helps mitigate known attack vectors within Internet Explorer for those components and controls that have been developed with vulnerable versions of ATL as described in Microsoft Security Advisory (973882) and Microsoft Security Bulletin MS09-035. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. This security update also resolves three privately reported vulnerabilities in Internet Explorer. These vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

***************************************************************
Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP2/SP3 (Japanese)
Severity: Critical
Fixlet ID: 903429
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx

Fixlet Description: Microsoft has released a security update that is being released out of band in conjunction with Microsoft Security Bulletin MS09-035, which describes vulnerabilities in those components and controls that have been developed using vulnerable versions of the Microsoft Active Template Library (ATL). As a defense-in-depth measure, this Internet Explorer security update helps mitigate known attack vectors within Internet Explorer for those components and controls that have been developed with vulnerable versions of ATL as described in Microsoft Security Advisory (973882) and Microsoft Security Bulletin MS09-035. This security update also resolves three privately reported vulnerabilities in Internet Explorer. These vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There is no default action for this Fixlet message because Bigfix has recieved reports of various issues associated with the deployment of this patch. Please take extra caution to qualify this update in a test environment prior to use in a production environment. For more information on default actions, see BigFix KB #474

***************************************************************
Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 903430
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx

***************************************************************
Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 903431
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx

Fixlet Description: Microsoft has released a security update that is being released out of band in conjunction with Microsoft Security Bulletin MS09-035, which describes vulnerabilities in those components and controls that have been developed using vulnerable versions of the Microsoft Active Template Library (ATL). As a defense-in-depth measure, this Internet Explorer security update helps mitigate known attack vectors within Internet Explorer for those components and controls that have been developed with vulnerable versions of ATL as described in Microsoft Security Advisory (973882) and Microsoft Security Bulletin MS09-035. This security update also resolves three privately reported vulnerabilities in Internet Explorer. These vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There is no default action for this Fixlet message because Bigfix has recieved reports of various issues associated with the deployment of this patch. Please take extra caution to qualify this update in a test environment prior to use in a production environment. For more information on default actions, see BigFix KB #474

***************************************************************
Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 903432
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx

***************************************************************
Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 903433
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx

Fixlet Description: Microsoft has released a security update that is being released out of band in conjunction with Microsoft Security Bulletin MS09-035, which describes vulnerabilities in those components and controls that have been developed using vulnerable versions of the Microsoft Active Template Library (ATL). As a defense-in-depth measure, this Internet Explorer security update helps mitigate known attack vectors within Internet Explorer for those components and controls that have been developed with vulnerable versions of ATL as described in Microsoft Security Advisory (973882) and Microsoft Security Bulletin MS09-035. This security update also resolves three privately reported vulnerabilities in Internet Explorer. These vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There is no default action for this Fixlet message because Bigfix has recieved reports of various issues associated with the deployment of this patch. Please take extra caution to qualify this update in a test environment prior to use in a production environment. For more information on default actions, see BigFix KB #474

***************************************************************
Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 903434
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx

***************************************************************
Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 903435
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx

Fixlet Description: Microsoft has released a security update that is being released out of band in conjunction with Microsoft Security Bulletin MS09-035, which describes vulnerabilities in those components and controls that have been developed using vulnerable versions of the Microsoft Active Template Library (ATL). As a defense-in-depth measure, this Internet Explorer security update helps mitigate known attack vectors within Internet Explorer for those components and controls that have been developed with vulnerable versions of ATL as described in Microsoft Security Advisory (973882) and Microsoft Security Bulletin MS09-035. This security update also resolves three privately reported vulnerabilities in Internet Explorer. These vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There is no default action for this Fixlet message because Bigfix has recieved reports of various issues associated with the deployment of this patch. Please take extra caution to qualify this update in a test environment prior to use in a production environment. For more information on default actions, see BigFix KB #474

***************************************************************
Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 903436
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx

***************************************************************
Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 8 - Windows Vista Gold/SP1/SP2 (Japanese)
Severity: Critical
Fixlet ID: 903437
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx

Fixlet Description: Microsoft has released a security update that is being released out of band in conjunction with Microsoft Security Bulletin MS09-035, which describes vulnerabilities in those components and controls that have been developed using vulnerable versions of the Microsoft Active Template Library (ATL). As a defense-in-depth measure, this Internet Explorer security update helps mitigate known attack vectors within Internet Explorer for those components and controls that have been developed with vulnerable versions of ATL as described in Microsoft Security Advisory (973882) and Microsoft Security Bulletin MS09-035. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. This security update also resolves three privately reported vulnerabilities in Internet Explorer. These vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Important Note: There is no default action for this Fixlet message because Bigfix has recieved reports of various issues associated with the deployment of this patch. Please take extra caution to qualify this update in a test environment prior to use in a production environment. For more information on default actions, see BigFix KB #474

***************************************************************
Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 8 - Windows Vista Gold/SP1/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 903439
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx

Fixlet Description: Microsoft has released a security update that is being released out of band in conjunction with Microsoft Security Bulletin MS09-035, which describes vulnerabilities in those components and controls that have been developed using vulnerable versions of the Microsoft Active Template Library (ATL). As a defense-in-depth measure, this Internet Explorer security update helps mitigate known attack vectors within Internet Explorer for those components and controls that have been developed with vulnerable versions of ATL as described in Microsoft Security Advisory (973882) and Microsoft Security Bulletin MS09-035. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. This security update also resolves three privately reported vulnerabilities in Internet Explorer. These vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Important Note: There is no default action for this Fixlet message because Bigfix has recieved reports of various issues associated with the deployment of this patch. Please take extra caution to qualify this update in a test environment prior to use in a production environment. For more information on default actions, see BigFix KB #474

***************************************************************
Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Moderate
Fixlet ID: 903441
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx

Fixlet Description: Microsoft has released a security update that is being released out of band in conjunction with Microsoft Security Bulletin MS09-035, which describes vulnerabilities in those components and controls that have been developed using vulnerable versions of the Microsoft Active Template Library (ATL). As a defense-in-depth measure, this Internet Explorer security update helps mitigate known attack vectors within Internet Explorer for those components and controls that have been developed with vulnerable versions of ATL as described in Microsoft Security Advisory (973882) and Microsoft Security Bulletin MS09-035. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. This security update also resolves three privately reported vulnerabilities in Internet Explorer. These vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Important Note: There is no default action for this Fixlet message because Bigfix has recieved reports of various issues associated with the deployment of this patch. Please take extra caution to qualify this update in a test environment prior to use in a production environment. For more information on default actions, see BigFix KB #474

***************************************************************
Title: MS09-034: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 903443
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx

Fixlet Description: Microsoft has released a security update that is being released out of band in conjunction with Microsoft Security Bulletin MS09-035, which describes vulnerabilities in those components and controls that have been developed using vulnerable versions of the Microsoft Active Template Library (ATL). As a defense-in-depth measure, this Internet Explorer security update helps mitigate known attack vectors within Internet Explorer for those components and controls that have been developed with vulnerable versions of ATL as described in Microsoft Security Advisory (973882) and Microsoft Security Bulletin MS09-035. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. This security update also resolves three privately reported vulnerabilities in Internet Explorer. These vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Important Note: There is no default action for this Fixlet message because Bigfix has recieved reports of various issues associated with the deployment of this patch. Please take extra caution to qualify this update in a test environment prior to use in a production environment. For more information on default actions, see BigFix KB #474

***************************************************************
Title: MS09-035: Vulnerabilities in Visual Studio Active Template Library Could Allow Remote Code Execution - Visual Studio .NET 2003 SP1 (Japanese)
Severity: Moderate
Fixlet ID: 903501
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-035.mspx

Fixlet Description: Microsoft has released a security update that addresses several privately reported vulnerabilities in the public versions of the Microsoft Active Template Library (ATL) included with Visual Studio. This security update is specifically intended for developers of components and controls. Developers who build and redistribute components and controls using ATL should install the update provided in this bulletin and follow the guidance provided to create, and distribute to their customers, components and controls that are not vulnerable to the vulnerabilities described in this security bulletin. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

Important Note: BigFix testing has determined that this update will only install on 64-bit systems when an administrator is logged on locally. As such, this Fixlet message will not become relevant on machines for which this condition is not met.

***************************************************************
Title: MS09-035: Vulnerabilities in Visual Studio Active Template Library Could Allow Remote Code Execution - Visual Studio 2005 SP1 (Japanese)
Severity: Moderate
Fixlet ID: 903503
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-035.mspx

Fixlet Description: Microsoft has released a security update that addresses several privately reported vulnerabilities in the public versions of the Microsoft Active Template Library (ATL) included with Visual Studio. This security update is specifically intended for developers of components and controls. Developers who build and redistribute components and controls using ATL should install the update provided in this bulletin and follow the guidance provided to create, and distribute to their customers, components and controls that are not vulnerable to the vulnerabilities described in this security bulletin. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-035: Vulnerabilities in Visual Studio Active Template Library Could Allow Remote Code Execution - Visual Studio 2005 SP1 64-bit Hosted Visual C++ Tools (Japanese)
Severity: Moderate
Fixlet ID: 903505
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-035.mspx

Fixlet Description: Important Note: The patch binary that Microsoft published for the Visual Studio 64-bit Hosted Visual C++ Tools 2005 Service Pack 1 ATL Security Update vulnerability described in MS09-035 (VS80sp1-KB973830-IA64-INTL.exe) applies to Itanium (IA64) machines only. As BigFix does not support the Itanium architecture, we will not be releasing Fixlet content for this update at this time.

Important Note: The relevance in this audit only fixlet may detect false positives due to incomplete information from Microsoft at this time.

Microsoft has released a security update that addresses several privately reported vulnerabilities in the public versions of the Microsoft Active Template Library (ATL) included with Visual Studio. This security update is specifically intended for developers of components and controls. Developers who build and redistribute components and controls using ATL should install the update provided in this bulletin and follow the guidance provided to create, and distribute to their customers, components and controls that are not vulnerable to the vulnerabilities described in this security bulletin. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-035: Vulnerabilities in Visual Studio Active Template Library Could Allow Remote Code Execution - Visual Studio 2008 (Japanese)
Severity: Moderate
Fixlet ID: 903507
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-035.mspx

Fixlet Description: Microsoft has released a security update that addresses several privately reported vulnerabilities in the public versions of the Microsoft Active Template Library (ATL) included with Visual Studio. This security update is specifically intended for developers of components and controls. Developers who build and redistribute components and controls using ATL should install the update provided in this bulletin and follow the guidance provided to create, and distribute to their customers, components and controls that are not vulnerable to the vulnerabilities described in this security bulletin. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-035: Vulnerabilities in Visual Studio Active Template Library Could Allow Remote Code Execution - Visual Studio 2008 SP1 (Japanese)
Severity: Moderate
Fixlet ID: 903509
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-035.mspx

Fixlet Description: Important Note: Microsoft is apparently experiencing syncing issues with their download server clusters. As a result, several different versions of the binary deployed by this Fixlet message may be downloaded from the supplied URL at any given time. While this is NOT a BigFix problem and must ultimately be resolved by Microsoft, BigFix is offering the following alternative to ensure successful action deployment:  Using a browser, download the binary deployed by this Fixlet message. Using sha1.exe (see instructions here), verify that the sha1 of the downloaded file is equal to "2b405e4704121d10a91374905e64a76eea5b5239". If it is not, repeat step 1. Once you have successfully downloaded and verified the file, rename it to "2b405e4704121d10a91374905e64a76eea5b5239" and place it in the BES Server download cache. For more information about manually caching file downloads on the BES Server, please see BigFix Support Knowledge Base article #390.

Microsoft has released a security update that addresses several privately reported vulnerabilities in the public versions of the Microsoft Active Template Library (ATL) included with Visual Studio. This security update is specifically intended for developers of components and controls. Developers who build and redistribute components and controls using ATL should install the update provided in this bulletin and follow the guidance provided to create, and distribute to their customers, components and controls that are not vulnerable to the vulnerabilities described in this security bulletin. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-035: Vulnerabilities in Visual Studio Active Template Library Could Allow Remote Code Execution - Visual C++ 2005 SP1 Redistributable Package (Japanese)
Severity: Moderate
Fixlet ID: 903511
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-035.mspx

Fixlet Description: Microsoft has released a security update that addresses several privately reported vulnerabilities in the public versions of the Microsoft Active Template Library (ATL) included with Visual Studio. This security update is specifically intended for developers of components and controls. Developers who build and redistribute components and controls using ATL should install the update provided in this bulletin and follow the guidance provided to create, and distribute to their customers, components and controls that are not vulnerable to the vulnerabilities described in this security bulletin. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-035: Vulnerabilities in Visual Studio Active Template Library Could Allow Remote Code Execution - Visual C++ 2008 Redistributable Package (Japanese)
Severity: Moderate
Fixlet ID: 903513
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-035.mspx

Fixlet Description: Microsoft has released a security update that addresses several privately reported vulnerabilities in the public versions of the Microsoft Active Template Library (ATL) included with Visual Studio. This security update is specifically intended for developers of components and controls. Developers who build and redistribute components and controls using ATL should install the update provided in this bulletin and follow the guidance provided to create, and distribute to their customers, components and controls that are not vulnerable to the vulnerabilities described in this security bulletin. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-035: Vulnerabilities in Visual Studio Active Template Library Could Allow Remote Code Execution - Visual C++ 2008 SP1 Redistributable Package (Japanese)
Severity: Moderate
Fixlet ID: 903515
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-035.mspx

Fixlet Description: Microsoft has released a security update that addresses several privately reported vulnerabilities in the public versions of the Microsoft Active Template Library (ATL) included with Visual Studio. This security update is specifically intended for developers of components and controls. Developers who build and redistribute components and controls using ATL should install the update provided in this bulletin and follow the guidance provided to create, and distribute to their customers, components and controls that are not vulnerable to the vulnerabilities described in this security bulletin. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-035: Vulnerabilities in Visual Studio Active Template Library Could Allow Remote Code Execution - Visual C++ 2005 SP1 Redistributable Package (x64) (Japanese)
Severity: Moderate
Fixlet ID: 903525
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-035.mspx

Fixlet Description: Microsoft has released a security update that addresses several privately reported vulnerabilities in the public versions of the Microsoft Active Template Library (ATL) included with Visual Studio. This security update is specifically intended for developers of components and controls. Developers who build and redistribute components and controls using ATL should install the update provided in this bulletin and follow the guidance provided to create, and distribute to their customers, components and controls that are not vulnerable to the vulnerabilities described in this security bulletin. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-035: Vulnerabilities in Visual Studio Active Template Library Could Allow Remote Code Execution - Visual C++ 2008 Redistributable Package (x64) (Japanese)
Severity: Moderate
Fixlet ID: 903527
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-035.mspx

Fixlet Description: Microsoft has released a security update that addresses several privately reported vulnerabilities in the public versions of the Microsoft Active Template Library (ATL) included with Visual Studio. This security update is specifically intended for developers of components and controls. Developers who build and redistribute components and controls using ATL should install the update provided in this bulletin and follow the guidance provided to create, and distribute to their customers, components and controls that are not vulnerable to the vulnerabilities described in this security bulletin. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-035: Vulnerabilities in Visual Studio Active Template Library Could Allow Remote Code Execution - Visual C++ 2008 SP1 Redistributable Package (x64) (Japanese)
Severity: Moderate
Fixlet ID: 903529
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-035.mspx

Fixlet Description: Microsoft has released a security update that addresses several privately reported vulnerabilities in the public versions of the Microsoft Active Template Library (ATL) included with Visual Studio. This security update is specifically intended for developers of components and controls. Developers who build and redistribute components and controls using ATL should install the update provided in this bulletin and follow the guidance provided to create, and distribute to their customers, components and controls that are not vulnerable to the vulnerabilities described in this security bulletin. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-035: Vulnerabilities in Visual Studio Active Template Library Could Allow Remote Code Execution - Visual Studio 2005 SP1 (Mobile Applications Using ATL for Smart Devices) (Japanese)
Severity: Moderate
Fixlet ID: 903535
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-035.mspx

Fixlet Description: Microsoft has released a security update that addresses several privately reported vulnerabilities in the public versions of the Microsoft Active Template Library (ATL) included with Visual Studio. This security update is specifically intended for developers of components and controls. Developers who build and redistribute components and controls using ATL should install the update provided in this bulletin and follow the guidance provided to create, and distribute to their customers, components and controls that are not vulnerable to the vulnerabilities described in this security bulletin. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-035: Vulnerabilities in Visual Studio Active Template Library Could Allow Remote Code Execution - Visual Studio 2008 (Mobile Applications Using ATL for Smart Devices) (Japanese)
Severity: Moderate
Fixlet ID: 903537
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-035.mspx

Fixlet Description: Microsoft has released a security update that addresses several privately reported vulnerabilities in the public versions of the Microsoft Active Template Library (ATL) included with Visual Studio. This security update is specifically intended for developers of components and controls. Developers who build and redistribute components and controls using ATL should install the update provided in this bulletin and follow the guidance provided to create, and distribute to their customers, components and controls that are not vulnerable to the vulnerabilities described in this security bulletin. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-035: Vulnerabilities in Visual Studio Active Template Library Could Allow Remote Code Execution - Visual Studio 2008 SP1 (Mobile Applications Using ATL for Smart Devices) (Japanese)
Severity: Moderate
Fixlet ID: 903539
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-035.mspx

Fixlet Description: Important Note: Microsoft is apparently experiencing syncing issues with their download server clusters. As a result, several different versions of the binary deployed by this Fixlet message may be downloaded from the supplied URL at any given time. While this is NOT a BigFix problem and must ultimately be resolved by Microsoft, BigFix is offering the following alternative to ensure successful action deployment:  Using a browser, download the binary deployed by this Fixlet message. Using sha1.exe (see instructions here), verify that the sha1 of the downloaded file is equal to "2f3125344060328e88927a006d300aef9c6ec5c4". If it is not, repeat step 1. Once you have successfully downloaded and verified the file, rename it to "2f3125344060328e88927a006d300aef9c6ec5c4" and place it in the BES Server download cache. For more information about manually caching file downloads on the BES Server, please see BigFix Support Knowledge Base article #390.

Microsoft has released a security update that addresses several privately reported vulnerabilities in the public versions of the Microsoft Active Template Library (ATL) included with Visual Studio. This security update is specifically intended for developers of components and controls. Developers who build and redistribute components and controls using ATL should install the update provided in this bulletin and follow the guidance provided to create, and distribute to their customers, components and controls that are not vulnerable to the vulnerabilities described in this security bulletin. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-036: Vulnerability in ASP.NET in Microsoft Windows Could Allow Denial of Service - .NET Framework 2.0 SP1 / 3.5 - Windows Vista SP1 / Windows Server 2008 Gold (x64) (Japanese)
Severity: Important
Fixlet ID: 903601
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-036.mspx

Fixlet Description: Microsoft has released a security update that addresses a privately reported Denial of Service vulnerability in the Microsoft .NET Framework component of Microsoft Windows. This vulnerability can be exploited only when Internet Information Services (IIS) 7.0 is installed and ASP.NET is configured to use integrated mode on affected versions of Microsoft Windows. An attacker could create specially crafted anonymous HTTP requests that could cause the affected Web server to become non-responsive until the associated application pool is restarted. Customers who are running IIS 7.0 application pools in classic mode are not affected by this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-036: Vulnerability in ASP.NET in Microsoft Windows Could Allow Denial of Service - .NET Framework 2.0 SP1 / 3.5 - Windows Vista Gold (x64) (Japanese)
Severity: Important
Fixlet ID: 903602
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-036.mspx

Fixlet Description: Microsoft has released a security update that addresses a privately reported Denial of Service vulnerability in the Microsoft .NET Framework component of Microsoft Windows. This vulnerability can be exploited only when Internet Information Services (IIS) 7.0 is installed and ASP.NET is configured to use integrated mode on affected versions of Microsoft Windows. An attacker could create specially crafted anonymous HTTP requests that could cause the affected Web server to become non-responsive until the associated application pool is restarted. Customers who are running IIS 7.0 application pools in classic mode are not affected by this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-036: Vulnerability in ASP.NET in Microsoft Windows Could Allow Denial of Service - .NET Framework 2.0 SP2 / 3.5 SP1 - Windows Vista Gold (x64) (Japanese)
Severity: Important
Fixlet ID: 903603
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-036.mspx

Fixlet Description: Microsoft has released a security update that addresses a privately reported Denial of Service vulnerability in the Microsoft .NET Framework component of Microsoft Windows. This vulnerability can be exploited only when Internet Information Services (IIS) 7.0 is installed and ASP.NET is configured to use integrated mode on affected versions of Microsoft Windows. An attacker could create specially crafted anonymous HTTP requests that could cause the affected Web server to become non-responsive until the associated application pool is restarted. Customers who are running IIS 7.0 application pools in classic mode are not affected by this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-036: Vulnerability in ASP.NET in Microsoft Windows Could Allow Denial of Service - .NET Framework 2.0 SP2 / 3.5 SP1 - Windows Vista SP1 / Windows Server 2008 Gold (x64) (Japanese)
Severity: Important
Fixlet ID: 903607
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-036.mspx

Fixlet Description: Microsoft has released a security update that addresses a privately reported Denial of Service vulnerability in the Microsoft .NET Framework component of Microsoft Windows. This vulnerability can be exploited only when Internet Information Services (IIS) 7.0 is installed and ASP.NET is configured to use integrated mode on affected versions of Microsoft Windows. An attacker could create specially crafted anonymous HTTP requests that could cause the affected Web server to become non-responsive until the associated application pool is restarted. Customers who are running IIS 7.0 application pools in classic mode are not affected by this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-036: Vulnerability in ASP.NET in Microsoft Windows Could Allow Denial of Service - .NET Framework 2.0 SP1/3.5 - Windows Vista Gold (Japanese)
Severity: Important
Fixlet ID: 903611
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-036.mspx

Fixlet Description: Microsoft has released a security update that addresses a privately reported Denial of Service vulnerability in the Microsoft .NET Framework component of Microsoft Windows. This vulnerability can be exploited only when Internet Information Services (IIS) 7.0 is installed and ASP.NET is configured to use integrated mode on affected versions of Microsoft Windows. An attacker could create specially crafted anonymous HTTP requests that could cause the affected Web server to become non-responsive until the associated application pool is restarted. Customers who are running IIS 7.0 application pools in classic mode are not affected by this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-036: Vulnerability in ASP.NET in Microsoft Windows Could Allow Denial of Service - .NET Framework 2.0 SP2/3.5 SP1 - Windows Vista Gold (Japanese)
Severity: Important
Fixlet ID: 903613
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-036.mspx

Fixlet Description: Microsoft has released a security update that addresses a privately reported Denial of Service vulnerability in the Microsoft .NET Framework component of Microsoft Windows. This vulnerability can be exploited only when Internet Information Services (IIS) 7.0 is installed and ASP.NET is configured to use integrated mode on affected versions of Microsoft Windows. An attacker could create specially crafted anonymous HTTP requests that could cause the affected Web server to become non-responsive until the associated application pool is restarted. Customers who are running IIS 7.0 application pools in classic mode are not affected by this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-036: Vulnerability in ASP.NET in Microsoft Windows Could Allow Denial of Service - .NET Framework 2.0 SP1 / 3.5 - Windows Vista SP1 / Windows Server 2008 Gold (Japanese)
Severity: Important
Fixlet ID: 903615
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-036.mspx

Fixlet Description: Microsoft has released a security update that addresses a privately reported Denial of Service vulnerability in the Microsoft .NET Framework component of Microsoft Windows. This vulnerability can be exploited only when Internet Information Services (IIS) 7.0 is installed and ASP.NET is configured to use integrated mode on affected versions of Microsoft Windows. An attacker could create specially crafted anonymous HTTP requests that could cause the affected Web server to become non-responsive until the associated application pool is restarted. Customers who are running IIS 7.0 application pools in classic mode are not affected by this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-036: Vulnerability in ASP.NET in Microsoft Windows Could Allow Denial of Service - .NET Framework 2.0 SP2/3.5 SP1 - Windows Vista SP1 / Windows Server 2008 Gold (Japanese)
Severity: Important
Fixlet ID: 903617
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-036.mspx

Fixlet Description: Microsoft has released a security update that addresses a privately reported Denial of Service vulnerability in the Microsoft .NET Framework component of Microsoft Windows. This vulnerability can be exploited only when Internet Information Services (IIS) 7.0 is installed and ASP.NET is configured to use integrated mode on affected versions of Microsoft Windows. An attacker could create specially crafted anonymous HTTP requests that could cause the affected Web server to become non-responsive until the associated application pool is restarted. Customers who are running IIS 7.0 application pools in classic mode are not affected by this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows 2000 SP4 - Outlook Express 5.5 SP2 (Japanese)
Severity: Critical
Fixlet ID: 903701
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows 2000 SP4 - Outlook Express 5.5 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 903702
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows 2000 SP4 - Outlook Express 6 SP1 (Japanese)
Severity: Critical
Fixlet ID: 903703
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows 2000 SP4 - Outlook Express 6 SP1 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 903704
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows 2000 SP4 - Windows Media Player 9 (Japanese)
Severity: Critical
Fixlet ID: 903705
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows 2000 SP4 - Windows Media Player 9 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 903706
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows ATL Component - Windows 2000 SP4 (Japanese)
Severity: Critical
Fixlet ID: 903707
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows ATL Component - Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 903708
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution -  DHTML Editing Component ActiveX Control - Windows 2000 SP4 (Japanese)
Severity: Critical
Fixlet ID: 903709
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution -  DHTML Editing Component ActiveX Control - Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 903710
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Outlook Express 6 - Windows XP SP2/SP3 (Japanese)
Severity: Critical
Fixlet ID: 903711
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Outlook Express 6 - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 903712
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows Media Player 9, 10, 11 - Windows XP SP2 (Japanese)
Severity: Critical
Fixlet ID: 903713
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows Media Player 9, 10, 11 - Windows XP SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 903714
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows Media Player 9, 10, 11 -Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 903717
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows Media Player 9, 10, 11 -Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 903718
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows ATL Component - Windows XP SP2/SP3 (Japanese)
Severity: Critical
Fixlet ID: 903719
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows ATL Component - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 903720
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - DHTML Editing Component ActiveX Control - Windows XP SP2/SP3 (Japanese)
Severity: Critical
Fixlet ID: 903721
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - DHTML Editing Component ActiveX Control - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 903722
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Microsoft MSWebDVD ActiveX Control - Windows XP SP2/SP3 (Japanese)
Severity: Critical
Fixlet ID: 903723
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Microsoft MSWebDVD ActiveX Control - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 903724
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Outlook Express 6 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 903725
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Outlook Express 6 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 903726
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows Media Player 10 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 903727
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows Media Player 10 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 903728
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows Media Player 11- Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 903729
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows ATL Component - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 903731
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows ATL Component - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 903732
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - DHTML Editing Component ActiveX Control - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 903733
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - DHTML Editing Component ActiveX Control - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 903734
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - MSWebDVD ActiveX Control - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 903735
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - MSWebDVD ActiveX Control - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 903736
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Outlook Express 6 - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 903737
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Outlook Express 6 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 903738
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows Media Player 10 - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 903739
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows Media Player 10 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 903740
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows ATL Component -  Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 903741
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows ATL Component -  Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 903742
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - DHTML Editing Component ActiveX Control - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 903743
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - DHTML Editing Component ActiveX Control - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 903744
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - MSWebDVD ActiveX Control - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 903745
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - MSWebDVD ActiveX Control - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 903746
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Outlook Express 6 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 903747
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Outlook Express 6 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 903748
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows Media Player 10 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 903749
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows Media Player 10 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 903750
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows ATL Component - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 903751
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows ATL Component - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 903752
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - DHTML Editing Component ActiveX Control - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 903753
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - DHTML Editing Component ActiveX Control - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 903754
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - MSWebDVD ActiveX Control - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 903755
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - MSWebDVD ActiveX Control - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 903756
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows Media Player 11 - Windows Vista Gold/SP1/SP2 (Japanese)
Severity: Critical
Fixlet ID: 903757
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows ATL Component - Windows Vista Gold/SP1/SP2 (Japanese)
Severity: Critical
Fixlet ID: 903759
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows Media Player 11 - Windows Vista Gold/SP1/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 903761
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows ATL Component - Windows Vista Gold/SP1/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 903763
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows Media Player 11 - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Critical
Fixlet ID: 903765
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows ATL Component - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Critical
Fixlet ID: 903767
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows Media Player 11 - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 903769
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - Windows ATL Component - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 903771
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-038: Vulnerabilities in Windows Media File Processing Could Allow Remote Code Execution - Windows 2000 SP4 (Japanese)
Severity: Critical
Fixlet ID: 903801
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-038.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media file processing. Either vulnerability could allow remote code execution if a user opened a specially crafted AVI file. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-038: Vulnerabilities in Windows Media File Processing Could Allow Remote Code Execution - Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 903802
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-038.mspx

***************************************************************
Title: MS09-038: Vulnerabilities in Windows Media File Processing Could Allow Remote Code Execution - Windows XP SP2/SP3 (Japanese)
Severity: Critical
Fixlet ID: 903803
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-038.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media file processing. Either vulnerability could allow remote code execution if a user opened a specially crafted AVI file. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-038: Vulnerabilities in Windows Media File Processing Could Allow Remote Code Execution - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 903804
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-038.mspx

***************************************************************
Title: MS09-038: Vulnerabilities in Windows Media File Processing Could Allow Remote Code Execution - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 903805
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-038.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media file processing. Either vulnerability could allow remote code execution if a user opened a specially crafted AVI file. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-038: Vulnerabilities in Windows Media File Processing Could Allow Remote Code Execution - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 903806
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-038.mspx

***************************************************************
Title: MS09-038: Vulnerabilities in Windows Media File Processing Could Allow Remote Code Execution - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 903807
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-038.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media file processing. Either vulnerability could allow remote code execution if a user opened a specially crafted AVI file. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-038: Vulnerabilities in Windows Media File Processing Could Allow Remote Code Execution - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 903808
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-038.mspx

***************************************************************
Title: MS09-038: Vulnerabilities in Windows Media File Processing Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 903809
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-038.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media file processing. Either vulnerability could allow remote code execution if a user opened a specially crafted AVI file. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-038: Vulnerabilities in Windows Media File Processing Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 903810
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-038.mspx

***************************************************************
Title: MS09-038: Vulnerabilities in Windows Media File Processing Could Allow Remote Code Execution - Windows Vista Gold/SP1/SP2 (Japanese)
Severity: Critical
Fixlet ID: 903811
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-038.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media file processing. Either vulnerability could allow remote code execution if a user opened a specially crafted AVI file. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-038: Vulnerabilities in Windows Media File Processing Could Allow Remote Code Execution - Windows Vista Gold/SP1/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 903813
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-038.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media file processing. Either vulnerability could allow remote code execution if a user opened a specially crafted AVI file. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-038: Vulnerabilities in Windows Media File Processing Could Allow Remote Code Execution - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Critical
Fixlet ID: 903815
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-038.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media file processing. Either vulnerability could allow remote code execution if a user opened a specially crafted AVI file. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-038: Vulnerabilities in Windows Media File Processing Could Allow Remote Code Execution - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 903817
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-038.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media file processing. Either vulnerability could allow remote code execution if a user opened a specially crafted AVI file. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-039: Vulnerabilities in WINS Could Allow Remote Code Execution - Windows 2000 Server SP4 (Japanese)
Severity: Critical
Fixlet ID: 903901
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-039.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in the Windows Internet Name Service (WINS). Either vulnerability could allow remote code execution if a user received a specially crafted WINS replication packet on an affected system running the WINS service. By default, WINS is not installed on any affected operating system version. Only customers who manually install this component are affected by this issue. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-039: Vulnerabilities in WINS Could Allow Remote Code Execution - Windows 2000 Server SP4 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 903902
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-039.mspx

***************************************************************
Title: MS09-039: Vulnerabilities in WINS Could Allow Remote Code Execution - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 903903
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-039.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in the Windows Internet Name Service (WINS). Either vulnerability could allow remote code execution if a user received a specially crafted WINS replication packet on an affected system running the WINS service. By default, WINS is not installed on any affected operating system version. Only customers who manually install this component are affected by this issue. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-039: Vulnerabilities in WINS Could Allow Remote Code Execution - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 903904
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-039.mspx

***************************************************************
Title: MS09-039: Vulnerabilities in WINS Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 903905
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-039.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in the Windows Internet Name Service (WINS). Either vulnerability could allow remote code execution if a user received a specially crafted WINS replication packet on an affected system running the WINS service. By default, WINS is not installed on any affected operating system version. Only customers who manually install this component are affected by this issue. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-039: Vulnerabilities in WINS Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 903906
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-039.mspx

***************************************************************
Title: MS09-040: Vulnerability in Message Queuing Could Allow Elevation of Privilege - Windows 2000 SP4 (Japanese)
Severity: Important
Fixlet ID: 904001
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-040.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows Message Queuing Service (MSMQ). The vulnerability could allow elevation of privilege if a user received a specially crafted request to an affected MSMQ service. By default, the Message Queuing component is not installed on any affected operating system edition and can only be enabled by a user with administrative privileges. Only customers who manually install the Message Queuing component are likely to be vulnerable to this issue. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-040: Vulnerability in Message Queuing Could Allow Elevation of Privilege - Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 904002
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-040.mspx

***************************************************************
Title: MS09-040: Vulnerability in Message Queuing Could Allow Elevation of Privilege - Windows XP SP2 (Japanese)
Severity: Important
Fixlet ID: 904003
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-040.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows Message Queuing Service (MSMQ). The vulnerability could allow elevation of privilege if a user received a specially crafted request to an affected MSMQ service. By default, the Message Queuing component is not installed on any affected operating system edition and can only be enabled by a user with administrative privileges. Only customers who manually install the Message Queuing component are likely to be vulnerable to this issue. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-040: Vulnerability in Message Queuing Could Allow Elevation of Privilege - Windows XP SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 904004
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-040.mspx

***************************************************************
Title: MS09-040: Vulnerability in Message Queuing Could Allow Elevation of Privilege - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 904005
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-040.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows Message Queuing Service (MSMQ). The vulnerability could allow elevation of privilege if a user received a specially crafted request to an affected MSMQ service. By default, the Message Queuing component is not installed on any affected operating system edition and can only be enabled by a user with administrative privileges. Only customers who manually install the Message Queuing component are likely to be vulnerable to this issue. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-040: Vulnerability in Message Queuing Could Allow Elevation of Privilege - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 904006
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-040.mspx

***************************************************************
Title: MS09-040: Vulnerability in Message Queuing Could Allow Elevation of Privilege - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 904007
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-040.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows Message Queuing Service (MSMQ). The vulnerability could allow elevation of privilege if a user received a specially crafted request to an affected MSMQ service. By default, the Message Queuing component is not installed on any affected operating system edition and can only be enabled by a user with administrative privileges. Only customers who manually install the Message Queuing component are likely to be vulnerable to this issue. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-040: Vulnerability in Message Queuing Could Allow Elevation of Privilege - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 904008
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-040.mspx

***************************************************************
Title: MS09-040: Vulnerability in Message Queuing Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 904009
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-040.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows Message Queuing Service (MSMQ). The vulnerability could allow elevation of privilege if a user received a specially crafted request to an affected MSMQ service. By default, the Message Queuing component is not installed on any affected operating system edition and can only be enabled by a user with administrative privileges. Only customers who manually install the Message Queuing component are likely to be vulnerable to this issue. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-040: Vulnerability in Message Queuing Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 904010
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-040.mspx

***************************************************************
Title: MS09-040: Vulnerability in Message Queuing Could Allow Elevation of Privilege - Windows Vista Gold (Japanese)
Severity: Important
Fixlet ID: 904011
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-040.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows Message Queuing Service (MSMQ). The vulnerability could allow elevation of privilege if a user received a specially crafted request to an affected MSMQ service. By default, the Message Queuing component is not installed on any affected operating system edition and can only be enabled by a user with administrative privileges. Only customers who manually install the Message Queuing component are likely to be vulnerable to this issue. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-040: Vulnerability in Message Queuing Could Allow Elevation of Privilege - Windows Vista Gold (x64) (Japanese)
Severity: Important
Fixlet ID: 904013
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-040.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows Message Queuing Service (MSMQ). The vulnerability could allow elevation of privilege if a user received a specially crafted request to an affected MSMQ service. By default, the Message Queuing component is not installed on any affected operating system edition and can only be enabled by a user with administrative privileges. Only customers who manually install the Message Queuing component are likely to be vulnerable to this issue. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-041: Vulnerability in Workstation Service Could Allow Elevation of Privilege - Windows XP SP2/SP3 (Japanese)
Severity: Important
Fixlet ID: 904101
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-041.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows Workstation Service. The vulnerability could allow elevation of privilege if an attacker created a specially crafted RPC message and sent the message to an affected system. An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. An attacker must have valid logon credentials to a vulnerable system in order to exploit this vulnerability. The vulnerability could not be exploited by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-041: Vulnerability in Workstation Service Could Allow Elevation of Privilege - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 904102
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-041.mspx

***************************************************************
Title: MS09-041: Vulnerability in Workstation Service Could Allow Elevation of Privilege - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 904103
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-041.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows Workstation Service. The vulnerability could allow elevation of privilege if an attacker created a specially crafted RPC message and sent the message to an affected system. An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. An attacker must have valid logon credentials to a vulnerable system in order to exploit this vulnerability. The vulnerability could not be exploited by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-041: Vulnerability in Workstation Service Could Allow Elevation of Privilege - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 904104
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-041.mspx

***************************************************************
Title: MS09-041: Vulnerability in Workstation Service Could Allow Elevation of Privilege - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 904105
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-041.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows Workstation Service. The vulnerability could allow elevation of privilege if an attacker created a specially crafted RPC message and sent the message to an affected system. An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. An attacker must have valid logon credentials to a vulnerable system in order to exploit this vulnerability. The vulnerability could not be exploited by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-041: Vulnerability in Workstation Service Could Allow Elevation of Privilege - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 904106
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-041.mspx

***************************************************************
Title: MS09-041: Vulnerability in Workstation Service Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 904107
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-041.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows Workstation Service. The vulnerability could allow elevation of privilege if an attacker created a specially crafted RPC message and sent the message to an affected system. An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. An attacker must have valid logon credentials to a vulnerable system in order to exploit this vulnerability. The vulnerability could not be exploited by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-041: Vulnerability in Workstation Service Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 904108
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-041.mspx

***************************************************************
Title: MS09-041: Vulnerability in Workstation Service Could Allow Elevation of Privilege - Windows Vista Gold/SP1/SP2 (Japanese)
Severity: Moderate
Fixlet ID: 904109
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-041.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows Workstation Service. The vulnerability could allow elevation of privilege if an attacker created a specially crafted RPC message and sent the message to an affected system. An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. An attacker must have valid logon credentials to a vulnerable system in order to exploit this vulnerability. The vulnerability could not be exploited by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-041: Vulnerability in Workstation Service Could Allow Elevation of Privilege - Windows Vista Gold/SP1/SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 904111
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-041.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows Workstation Service. The vulnerability could allow elevation of privilege if an attacker created a specially crafted RPC message and sent the message to an affected system. An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. An attacker must have valid logon credentials to a vulnerable system in order to exploit this vulnerability. The vulnerability could not be exploited by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-041: Vulnerability in Workstation Service Could Allow Elevation of Privilege - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Moderate
Fixlet ID: 904113
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-041.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows Workstation Service. The vulnerability could allow elevation of privilege if an attacker created a specially crafted RPC message and sent the message to an affected system. An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. An attacker must have valid logon credentials to a vulnerable system in order to exploit this vulnerability. The vulnerability could not be exploited by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-041: Vulnerability in Workstation Service Could Allow Elevation of Privilege - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 904115
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-041.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows Workstation Service. The vulnerability could allow elevation of privilege if an attacker created a specially crafted RPC message and sent the message to an affected system. An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. An attacker must have valid logon credentials to a vulnerable system in order to exploit this vulnerability. The vulnerability could not be exploited by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-042: Vulnerability in Telnet Could Allow Remote Code Execution - Windows 2000 SP4 (Japanese)
Severity: Important
Fixlet ID: 904201
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-042.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in the Microsoft Telnet service. The vulnerability could allow an attacker to obtain credentials and then use them to log back into affected systems. The attacker would then acquire user rights on a system identical to the user rights of the logged-on user. This scenario could ultimately result in remote code execution on affected systems. An attacker who successfully exploited this vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-042: Vulnerability in Telnet Could Allow Remote Code Execution - Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 904202
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-042.mspx

***************************************************************
Title: MS09-042: Vulnerability in Telnet Could Allow Remote Code Execution - Windows XP SP2/SP3 (Japanese)
Severity: Important
Fixlet ID: 904203
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-042.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in the Microsoft Telnet service. The vulnerability could allow an attacker to obtain credentials and then use them to log back into affected systems. The attacker would then acquire user rights on a system identical to the user rights of the logged-on user. This scenario could ultimately result in remote code execution on affected systems. An attacker who successfully exploited this vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-042: Vulnerability in Telnet Could Allow Remote Code Execution - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 904204
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-042.mspx

***************************************************************
Title: MS09-042: Vulnerability in Telnet Could Allow Remote Code Execution - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 904205
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-042.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in the Microsoft Telnet service. The vulnerability could allow an attacker to obtain credentials and then use them to log back into affected systems. The attacker would then acquire user rights on a system identical to the user rights of the logged-on user. This scenario could ultimately result in remote code execution on affected systems. An attacker who successfully exploited this vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-042: Vulnerability in Telnet Could Allow Remote Code Execution - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 904206
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-042.mspx

***************************************************************
Title: MS09-042: Vulnerability in Telnet Could Allow Remote Code Execution - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 904207
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-042.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in the Microsoft Telnet service. The vulnerability could allow an attacker to obtain credentials and then use them to log back into affected systems. The attacker would then acquire user rights on a system identical to the user rights of the logged-on user. This scenario could ultimately result in remote code execution on affected systems. An attacker who successfully exploited this vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-042: Vulnerability in Telnet Could Allow Remote Code Execution - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 904208
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-042.mspx

***************************************************************
Title: MS09-042: Vulnerability in Telnet Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 904209
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-042.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in the Microsoft Telnet service. The vulnerability could allow an attacker to obtain credentials and then use them to log back into affected systems. The attacker would then acquire user rights on a system identical to the user rights of the logged-on user. This scenario could ultimately result in remote code execution on affected systems. An attacker who successfully exploited this vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-042: Vulnerability in Telnet Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 904210
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-042.mspx

***************************************************************
Title: MS09-042: Vulnerability in Telnet Could Allow Remote Code Execution - Windows Vista Gold/SP1/SP2 (Japanese)
Severity: Moderate
Fixlet ID: 904211
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-042.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in the Microsoft Telnet service. The vulnerability could allow an attacker to obtain credentials and then use them to log back into affected systems. The attacker would then acquire user rights on a system identical to the user rights of the logged-on user. This scenario could ultimately result in remote code execution on affected systems. An attacker who successfully exploited this vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-042: Vulnerability in Telnet Could Allow Remote Code Execution - Windows Vista Gold/SP1/SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 904213
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-042.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in the Microsoft Telnet service. The vulnerability could allow an attacker to obtain credentials and then use them to log back into affected systems. The attacker would then acquire user rights on a system identical to the user rights of the logged-on user. This scenario could ultimately result in remote code execution on affected systems. An attacker who successfully exploited this vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-042: Vulnerability in Telnet Could Allow Remote Code Execution - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Moderate
Fixlet ID: 904215
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-042.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in the Microsoft Telnet service. The vulnerability could allow an attacker to obtain credentials and then use them to log back into affected systems. The attacker would then acquire user rights on a system identical to the user rights of the logged-on user. This scenario could ultimately result in remote code execution on affected systems. An attacker who successfully exploited this vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-042: Vulnerability in Telnet Could Allow Remote Code Execution - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 904217
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-042.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in the Microsoft Telnet service. The vulnerability could allow an attacker to obtain credentials and then use them to log back into affected systems. The attacker would then acquire user rights on a system identical to the user rights of the logged-on user. This scenario could ultimately result in remote code execution on affected systems. An attacker who successfully exploited this vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-043: Vulnerabilities in Microsoft Office Web Components Could Allow Remote Code Execution - Office XP SP3 (Local/Network Install)/ Office Web Components XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 904301
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-043.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Office Web Components that could allow remote code execution if a user viewed a specially crafted Web page. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."'); } catch (e) { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.'; } }

***************************************************************
Title: MS09-043: Vulnerabilities in Microsoft Office Web Components Could Allow Remote Code Execution - Office XP SP3 (Administrative Install) (Japanese)
Severity: Critical
Fixlet ID: 904303
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-043.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Office Web Components that could allow remote code execution if a user viewed a specially crafted Web page. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."'); } catch (e) { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.'; } }

***************************************************************
Title: MS09-043: Vulnerabilities in Microsoft Office Web Components Could Allow Remote Code Execution - Office 2003 SP3 (Local/Network Install)/Office Web Components 2003 SP3 (Japanese)
Severity: Critical
Fixlet ID: 904306
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-043.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Office Web Components that could allow remote code execution if a user viewed a specially crafted Web page. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."'); } catch (e) { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.'; } }

***************************************************************
Title: MS09-043: Vulnerabilities in Microsoft Office Web Components Could Allow Remote Code Execution - Office 2003 SP3 (Administrative Install) (Japanese)
Severity: Critical
Fixlet ID: 904308
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-043.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Office Web Components that could allow remote code execution if a user viewed a specially crafted Web page. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."'); } catch (e) { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.'; } }

***************************************************************
Title: MS09-043: Vulnerabilities in Microsoft Office Web Components Could Allow Remote Code Execution - Office Access Runtime 2007/Office 2003 Web Components for Office 2007 SP1 (Japanese)
Severity: Critical
Fixlet ID: 904316
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-043.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Office Web Components that could allow remote code execution if a user viewed a specially crafted Web page. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."'); } catch (e) { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.'; } }

***************************************************************
Title: MS09-043: Vulnerabilities in Microsoft Office Web Components Could Allow Remote Code Execution - ISA 2004 SE/EE SP3, ISA 2006 SE/EE SP1 (Japanese)
Severity: Critical
Fixlet ID: 904321
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-043.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Office Web Components that could allow remote code execution if a user viewed a specially crafted Web page. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-043: Vulnerabilities in Microsoft Office Web Components Could Allow Remote Code Execution - BizTalk Server 2002 (Japanese)
Severity: Critical
Fixlet ID: 904326
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-043.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Office Web Components that could allow remote code execution if a user viewed a specially crafted Web page. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-043: Vulnerabilities in Microsoft Office Web Components Could Allow Remote Code Execution - Visual Studio .NET 2003 SP1 (Japanese)
Severity: Critical
Fixlet ID: 904331
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-043.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Office Web Components that could allow remote code execution if a user viewed a specially crafted Web page. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 5.0 - Windows 2000 SP4 (Japanese)
Severity: Critical
Fixlet ID: 904401
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Remote Desktop Connection. The vulnerabilities could allow remote code execution if an attacker successfully convinced a user of Terminal Services to connect to a malicious RDP server or if a user visits a specially crafted Web site that exploits this vulnerability. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will need to apply   document.body.onload = setLink; function setLink() { try { fixletLink.innerHTML = EvaluateRelevance('(link "Fixlet 904403" of fixlet 904403 of (bes site whose (name of it = "EnterpriseSecurity")'); } catch (e) { fixletLink.innerHTML = 'Fixlet message 904403'; } }  before they will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 5.0 - Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 904402
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx

***************************************************************
Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 5.1/5.2 - Windows 2000 SP4 (Japanese)
Severity: Critical
Fixlet ID: 904403
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Remote Desktop Connection. The vulnerabilities could allow remote code execution if an attacker successfully convinced a user of Terminal Services to connect to a malicious RDP server or if a user visits a specially crafted Web site that exploits this vulnerability. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 5.1/5.2 - Windows XP SP2 (Japanese)
Severity: Critical
Fixlet ID: 904405
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Remote Desktop Connection. The vulnerabilities could allow remote code execution if an attacker successfully convinced a user of Terminal Services to connect to a malicious RDP server or if a user visits a specially crafted Web site that exploits this vulnerability. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 5.1/5.2 - Windows XP SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 904406
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx

***************************************************************
Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 6.0/6.1  - Windows XP SP2/SP3 (Japanese)
Severity: Critical
Fixlet ID: 904407
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Remote Desktop Connection. The vulnerabilities could allow remote code execution if an attacker successfully convinced a user of Terminal Services to connect to a malicious RDP server or if a user visits a specially crafted Web site that exploits this vulnerability. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 6.0/6.1  - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 904408
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx

***************************************************************
Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 5.2 - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 904409
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Remote Desktop Connection. The vulnerabilities could allow remote code execution if an attacker successfully convinced a user of Terminal Services to connect to a malicious RDP server or if a user visits a specially crafted Web site that exploits this vulnerability. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 5.2 - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 904410
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx

***************************************************************
Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 5.2 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 904411
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Remote Desktop Connection. The vulnerabilities could allow remote code execution if an attacker successfully convinced a user of Terminal Services to connect to a malicious RDP server or if a user visits a specially crafted Web site that exploits this vulnerability. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 5.2 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 904412
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx

***************************************************************
Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 6.0/6.1 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 904413
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Remote Desktop Connection. The vulnerabilities could allow remote code execution if an attacker successfully convinced a user of Terminal Services to connect to a malicious RDP server or if a user visits a specially crafted Web site that exploits this vulnerability. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 6.0/6.1 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 904414
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx

***************************************************************
Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 5.2 - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 904415
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Remote Desktop Connection. The vulnerabilities could allow remote code execution if an attacker successfully convinced a user of Terminal Services to connect to a malicious RDP server or if a user visits a specially crafted Web site that exploits this vulnerability. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 5.2 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 904416
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx

***************************************************************
Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 6.0 - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 904417
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Remote Desktop Connection. The vulnerabilities could allow remote code execution if an attacker successfully convinced a user of Terminal Services to connect to a malicious RDP server or if a user visits a specially crafted Web site that exploits this vulnerability. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 6.0 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 904418
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx

***************************************************************
Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 5.2 - Windows Server 2003 SP2 (x64 ) (Japanese)
Severity: Critical
Fixlet ID: 904419
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Remote Desktop Connection. The vulnerabilities could allow remote code execution if an attacker successfully convinced a user of Terminal Services to connect to a malicious RDP server or if a user visits a specially crafted Web site that exploits this vulnerability. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 5.2 - Windows Server 2003 SP2 (x64 ) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 904420
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx

***************************************************************
Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 6.0 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 904421
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Remote Desktop Connection. The vulnerabilities could allow remote code execution if an attacker successfully convinced a user of Terminal Services to connect to a malicious RDP server or if a user visits a specially crafted Web site that exploits this vulnerability. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 6.0 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 904422
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx

***************************************************************
Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 6.0/6.1 - Windows Vista Gold/SP1/SP2 (Japanese)
Severity: Critical
Fixlet ID: 904423
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Remote Desktop Connection. The vulnerabilities could allow remote code execution if an attacker successfully convinced a user of Terminal Services to connect to a malicious RDP server or if a user visits a specially crafted Web site that exploits this vulnerability. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 6.0/6.1 - Windows Vista Gold/SP1/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 904425
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Remote Desktop Connection. The vulnerabilities could allow remote code execution if an attacker successfully convinced a user of Terminal Services to connect to a malicious RDP server or if a user visits a specially crafted Web site that exploits this vulnerability. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 6.1 - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Critical
Fixlet ID: 904427
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Remote Desktop Connection. The vulnerabilities could allow remote code execution if an attacker successfully convinced a user of Terminal Services to connect to a malicious RDP server or if a user visits a specially crafted Web site that exploits this vulnerability. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution - RDP 6.1 - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 904429
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Remote Desktop Connection. The vulnerabilities could allow remote code execution if an attacker successfully convinced a user of Terminal Services to connect to a malicious RDP server or if a user visits a specially crafted Web site that exploits this vulnerability. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: 970653: Aug. 2009 Cumulative Time Zone Update - Windows XP SP2/SP3 (Japanese)
Severity: <Unspecified>
Fixlet ID: 97065301
Fixlet Link: http://support.microsoft.com/kb/970653

Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes.

Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates.  See the Microsoft web page on the 2007 DST changes here for more information.

***************************************************************
Title: 970653: Aug. 2009 Cumulative Time Zone Update - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: <Unspecified>
Fixlet ID: 97065302
Fixlet Link: http://support.microsoft.com/kb/970653

***************************************************************
Title: 970653: Aug. 2009 Cumulative Time Zone Update - Windows Server 2003 SP2 (Japanese)
Severity: <Unspecified>
Fixlet ID: 97065303
Fixlet Link: http://support.microsoft.com/kb/970653

Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes.

Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates.  See the Microsoft web page on the 2007 DST changes here for more information.

***************************************************************
Title: 970653: Aug. 2009 Cumulative Time Zone Update - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: <Unspecified>
Fixlet ID: 97065304
Fixlet Link: http://support.microsoft.com/kb/970653

***************************************************************
Title: 970653: Aug. 2009 Cumulative Time Zone Update - Windows Vista Gold/SP1/SP2 (Japanese)
Severity: <Unspecified>
Fixlet ID: 97065305
Fixlet Link: http://support.microsoft.com/kb/970653

Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes.

Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates.  See the Microsoft web page on the 2007 DST changes here for more information.

***************************************************************
Title: 970653: Aug. 2009 Cumulative Time Zone Update - Windows Server 2008 Gold/SP2 (Japanese)
Severity: <Unspecified>
Fixlet ID: 97065307
Fixlet Link: http://support.microsoft.com/kb/970653

Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes.

Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates.  See the Microsoft web page on the 2007 DST changes here for more information.

***************************************************************
Title: 970653: Aug. 2009 Cumulative Time Zone Update - Windows XP SP2 (x64) (Japanese)
Severity: <Unspecified>
Fixlet ID: 97065309
Fixlet Link: http://support.microsoft.com/kb/970653

Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes.

Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates.  See the Microsoft web page on the 2007 DST changes here for more information.

***************************************************************
Title: 970653: Aug. 2009 Cumulative Time Zone Update - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: <Unspecified>
Fixlet ID: 97065310
Fixlet Link: http://support.microsoft.com/kb/970653

***************************************************************
Title: 970653: Aug. 2009 Cumulative Time Zone Update - Windows Server 2003 SP2 (x64) (Japanese)
Severity: <Unspecified>
Fixlet ID: 97065311
Fixlet Link: http://support.microsoft.com/kb/970653

Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes.

Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates.  See the Microsoft web page on the 2007 DST changes here for more information.

***************************************************************
Title: 970653: Aug. 2009 Cumulative Time Zone Update - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: <Unspecified>
Fixlet ID: 97065312
Fixlet Link: http://support.microsoft.com/kb/970653

***************************************************************
Title: 970653: Aug. 2009 Cumulative Time Zone Update - Windows Vista Gold/SP1/SP2 (x64) (Japanese)
Severity: <Unspecified>
Fixlet ID: 97065313
Fixlet Link: http://support.microsoft.com/kb/970653

Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes.

Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates.  See the Microsoft web page on the 2007 DST changes here for more information.

***************************************************************
Title: 970653: Aug. 2009 Cumulative Time Zone Update - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: <Unspecified>
Fixlet ID: 97065315
Fixlet Link: http://support.microsoft.com/kb/970653

Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes.

Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates.  See the Microsoft web page on the 2007 DST changes here for more information.


More information about the BigFix-Announcements-Japan mailing list