[BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: PatchesforWindows(Japanese)

autonotify at bigfix.com autonotify at bigfix.com
Fri Dec 11 02:30:15 PST 2009


Fixlet Site - PatchesforWindows(Japanese)
Current Version: 327	Published: Fri, 11 Dec 2009 02:50:13  GMT

New Fixlets:
============

***************************************************************
Title: MS08-037: Vulnerabilities in DNS Could Allow Spoofing - DNS Client - Windows 2000 SP4 (v2, re-released 12/8/2009) (Japanese)
Severity: Important
Fixlet ID: 803723
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-037.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in the Windows Domain Name System (DNS) that could allow spoofing. These vulnerabilities exist in both the DNS client and DNS server and could allow a remote attacker to redirect network traffic intended for systems on the Internet to the attacker’s own systems. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: This patch was re-released on December 8th, 2009. The action below deploys the revised version of the patch. Microsoft recommends that all affected computers install the new patch. See the FAQ section of the security bulletin for more information.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS08-037: Vulnerabilities in DNS Could Allow Spoofing - DNS Client - Windows 2000 SP4 (v2, re-released 12/8/2009) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 803724
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-037.mspx

***************************************************************
Title: MS09-069: Vulnerability in Local Security Authority Subsystem Service Could Allow Denial of Service - Windows 2000 SP4 (Japanese)
Severity: Important
Fixlet ID: 906901
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-069.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow a denial of service if a remote, authenticated attacker, while communicating through Internet Protocol security (IPsec), sends a specially crafted ISAKMP message to the Local Security Authority Subsystem Service (LSASS) on an affected system After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-069: Vulnerability in Local Security Authority Subsystem Service Could Allow Denial of Service - Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 906902
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-069.mspx

***************************************************************
Title: MS09-069: Vulnerability in Local Security Authority Subsystem Service Could Allow Denial of Service - Windows XP SP2/SP3 (Japanese)
Severity: Important
Fixlet ID: 906903
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-069.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow a denial of service if a remote, authenticated attacker, while communicating through Internet Protocol security (IPsec), sends a specially crafted ISAKMP message to the Local Security Authority Subsystem Service (LSASS) on an affected system After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-069: Vulnerability in Local Security Authority Subsystem Service Could Allow Denial of Service - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 906904
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-069.mspx

***************************************************************
Title: MS09-069: Vulnerability in Local Security Authority Subsystem Service Could Allow Denial of Service - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 906905
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-069.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow a denial of service if a remote, authenticated attacker, while communicating through Internet Protocol security (IPsec), sends a specially crafted ISAKMP message to the Local Security Authority Subsystem Service (LSASS) on an affected system After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-069: Vulnerability in Local Security Authority Subsystem Service Could Allow Denial of Service - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 906906
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-069.mspx

***************************************************************
Title: MS09-069: Vulnerability in Local Security Authority Subsystem Service Could Allow Denial of Service - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 906907
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-069.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow a denial of service if a remote, authenticated attacker, while communicating through Internet Protocol security (IPsec), sends a specially crafted ISAKMP message to the Local Security Authority Subsystem Service (LSASS) on an affected system After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-069: Vulnerability in Local Security Authority Subsystem Service Could Allow Denial of Service - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 906908
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-069.mspx

***************************************************************
Title: MS09-069: Vulnerability in Local Security Authority Subsystem Service Could Allow Denial of Service - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 906909
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-069.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow a denial of service if a remote, authenticated attacker, while communicating through Internet Protocol security (IPsec), sends a specially crafted ISAKMP message to the Local Security Authority Subsystem Service (LSASS) on an affected system After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-069: Vulnerability in Local Security Authority Subsystem Service Could Allow Denial of Service - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 906910
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-069.mspx

***************************************************************
Title: MS09-070: Vulnerabilities in Active Directory Federation Services Could Allow Remote Code Execution - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 907001
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-070.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of these vulnerabilities could allow remote code execution if an attacker sent a specially crafted HTTP request to an ADFS-enabled Web server. An attacker would need to be an authenticated user in order to exploit either of these vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-070: Vulnerabilities in Active Directory Federation Services Could Allow Remote Code Execution - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 907002
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-070.mspx

***************************************************************
Title: MS09-070: Vulnerabilities in Active Directory Federation Services Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 907003
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-070.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of these vulnerabilities could allow remote code execution if an attacker sent a specially crafted HTTP request to an ADFS-enabled Web server. An attacker would need to be an authenticated user in order to exploit either of these vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-070: Vulnerabilities in Active Directory Federation Services Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 907004
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-070.mspx

***************************************************************
Title: MS09-070: Vulnerabilities in Active Directory Federation Services Could Allow Remote Code Execution - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Important
Fixlet ID: 907005
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-070.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of these vulnerabilities could allow remote code execution if an attacker sent a specially crafted HTTP request to an ADFS-enabled Web server. An attacker would need to be an authenticated user in order to exploit either of these vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-070: Vulnerabilities in Active Directory Federation Services Could Allow Remote Code Execution - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 907007
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-070.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of these vulnerabilities could allow remote code execution if an attacker sent a specially crafted HTTP request to an ADFS-enabled Web server. An attacker would need to be an authenticated user in order to exploit either of these vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-071: Vulnerabilities in Internet Authentication Service Could Allow Remote Code Execution - Windows 2000 SP4 (Japanese)
Severity: Important
Fixlet ID: 907101
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-071.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if messages received by the Internet Authentication Service server are copied incorrectly into memory when handling PEAP authentication attempts. An attacker who successfully exploited either of these vulnerabilities could take complete control of an affected system. Servers using Internet Authentication Service are only affected when using PEAP with MS-CHAP v2 authentication. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-071: Vulnerabilities in Internet Authentication Service Could Allow Remote Code Execution - Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 907102
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-071.mspx

***************************************************************
Title: MS09-071: Vulnerabilities in Internet Authentication Service Could Allow Remote Code Execution - Windows XP SP2/SP3 (Japanese)
Severity: Moderate
Fixlet ID: 907103
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-071.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if messages received by the Internet Authentication Service server are copied incorrectly into memory when handling PEAP authentication attempts. An attacker who successfully exploited either of these vulnerabilities could take complete control of an affected system. Servers using Internet Authentication Service are only affected when using PEAP with MS-CHAP v2 authentication. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-071: Vulnerabilities in Internet Authentication Service Could Allow Remote Code Execution - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 907104
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-071.mspx

***************************************************************
Title: MS09-071: Vulnerabilities in Internet Authentication Service Could Allow Remote Code Execution - Windows XP SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 907105
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-071.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if messages received by the Internet Authentication Service server are copied incorrectly into memory when handling PEAP authentication attempts. An attacker who successfully exploited either of these vulnerabilities could take complete control of an affected system. Servers using Internet Authentication Service are only affected when using PEAP with MS-CHAP v2 authentication. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-071: Vulnerabilities in Internet Authentication Service Could Allow Remote Code Execution - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 907106
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-071.mspx

***************************************************************
Title: MS09-071: Vulnerabilities in Internet Authentication Service Could Allow Remote Code Execution - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 907107
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-071.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if messages received by the Internet Authentication Service server are copied incorrectly into memory when handling PEAP authentication attempts. An attacker who successfully exploited either of these vulnerabilities could take complete control of an affected system. Servers using Internet Authentication Service are only affected when using PEAP with MS-CHAP v2 authentication. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-071: Vulnerabilities in Internet Authentication Service Could Allow Remote Code Execution - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 907108
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-071.mspx

***************************************************************
Title: MS09-071: Vulnerabilities in Internet Authentication Service Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 907109
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-071.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if messages received by the Internet Authentication Service server are copied incorrectly into memory when handling PEAP authentication attempts. An attacker who successfully exploited either of these vulnerabilities could take complete control of an affected system. Servers using Internet Authentication Service are only affected when using PEAP with MS-CHAP v2 authentication. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-071: Vulnerabilities in Internet Authentication Service Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 907110
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-071.mspx

***************************************************************
Title: MS09-071: Vulnerabilities in Internet Authentication Service Could Allow Remote Code Execution - Windows Vista Gold/SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 907111
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-071.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if messages received by the Internet Authentication Service server are copied incorrectly into memory when handling PEAP authentication attempts. An attacker who successfully exploited either of these vulnerabilities could take complete control of an affected system. Servers using Internet Authentication Service are only affected when using PEAP with MS-CHAP v2 authentication. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-071: Vulnerabilities in Internet Authentication Service Could Allow Remote Code Execution - Windows Vista Gold/SP1/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 907113
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-071.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if messages received by the Internet Authentication Service server are copied incorrectly into memory when handling PEAP authentication attempts. An attacker who successfully exploited either of these vulnerabilities could take complete control of an affected system. Servers using Internet Authentication Service are only affected when using PEAP with MS-CHAP v2 authentication. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-071: Vulnerabilities in Internet Authentication Service Could Allow Remote Code Execution - Windows 2008 Gold/SP2 (Japanese)
Severity: Critical
Fixlet ID: 907115
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-071.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if messages received by the Internet Authentication Service server are copied incorrectly into memory when handling PEAP authentication attempts. An attacker who successfully exploited either of these vulnerabilities could take complete control of an affected system. Servers using Internet Authentication Service are only affected when using PEAP with MS-CHAP v2 authentication. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-071: Vulnerabilities in Internet Authentication Service Could Allow Remote Code Execution - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 907117
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-071.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if messages received by the Internet Authentication Service server are copied incorrectly into memory when handling PEAP authentication attempts. An attacker who successfully exploited either of these vulnerabilities could take complete control of an affected system. Servers using Internet Authentication Service are only affected when using PEAP with MS-CHAP v2 authentication. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-072: Cumulative Security Update for Internet Explorer - IE 5.01 SP4 - Windows 2000 SP4 (Japanese)
Severity: Critical
Fixlet ID: 907201
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-072.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. An ActiveX control built with Microsoft Active Template Library (ATL) headers could also allow remote code execution; for more information about this issue, see the subsection, Frequently Asked Questions (FAQ) Related to This Security Update, in this section. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-072: Cumulative Security Update for Internet Explorer - IE 5.01 SP4 - Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 907202
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-072.mspx

***************************************************************
Title: MS09-072: Cumulative Security Update for Internet Explorer - IE 6 SP1 - Windows 2000 SP4 (Japanese)
Severity: Critical
Fixlet ID: 907203
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-072.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. An ActiveX control built with Microsoft Active Template Library (ATL) headers could also allow remote code execution; for more information about this issue, see the subsection, Frequently Asked Questions (FAQ) Related to This Security Update, in this section. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-072: Cumulative Security Update for Internet Explorer - IE 6 SP1 - Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 907204
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-072.mspx

***************************************************************
Title: MS09-072: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2/SP3 (Japanese)
Severity: Critical
Fixlet ID: 907205
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-072.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. An ActiveX control built with Microsoft Active Template Library (ATL) headers could also allow remote code execution; for more information about this issue, see the subsection, Frequently Asked Questions (FAQ) Related to This Security Update, in this section. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-072: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 907206
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-072.mspx

***************************************************************
Title: MS09-072: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 907207
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-072.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. An ActiveX control built with Microsoft Active Template Library (ATL) headers could also allow remote code execution; for more information about this issue, see the subsection, Frequently Asked Questions (FAQ) Related to This Security Update, in this section. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-072: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 907208
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-072.mspx

***************************************************************
Title: MS09-072: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 907209
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-072.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. An ActiveX control built with Microsoft Active Template Library (ATL) headers could also allow remote code execution; for more information about this issue, see the subsection, Frequently Asked Questions (FAQ) Related to This Security Update, in this section. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-072: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 907210
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-072.mspx

***************************************************************
Title: MS09-072: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 907211
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-072.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. An ActiveX control built with Microsoft Active Template Library (ATL) headers could also allow remote code execution; for more information about this issue, see the subsection, Frequently Asked Questions (FAQ) Related to This Security Update, in this section. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-072: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 907212
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-072.mspx

***************************************************************
Title: MS09-072: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2/SP3 (Japanese)
Severity: Critical
Fixlet ID: 907213
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-072.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. An ActiveX control built with Microsoft Active Template Library (ATL) headers could also allow remote code execution; for more information about this issue, see the subsection, Frequently Asked Questions (FAQ) Related to This Security Update, in this section. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-072: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 907214
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-072.mspx

***************************************************************
Title: MS09-072: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 907215
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-072.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. An ActiveX control built with Microsoft Active Template Library (ATL) headers could also allow remote code execution; for more information about this issue, see the subsection, Frequently Asked Questions (FAQ) Related to This Security Update, in this section. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-072: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 907216
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-072.mspx

***************************************************************
Title: MS09-072: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 907217
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-072.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. An ActiveX control built with Microsoft Active Template Library (ATL) headers could also allow remote code execution; for more information about this issue, see the subsection, Frequently Asked Questions (FAQ) Related to This Security Update, in this section. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-072: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 907218
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-072.mspx

***************************************************************
Title: MS09-072: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 907219
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-072.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. An ActiveX control built with Microsoft Active Template Library (ATL) headers could also allow remote code execution; for more information about this issue, see the subsection, Frequently Asked Questions (FAQ) Related to This Security Update, in this section. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-072: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 907220
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-072.mspx

***************************************************************
Title: MS09-072: Cumulative Security Update for Internet Explorer - IE 7 - Windows Vista Gold/SP1/SP2 (Japanese)
Severity: Critical
Fixlet ID: 907221
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-072.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. An ActiveX control built with Microsoft Active Template Library (ATL) headers could also allow remote code execution; for more information about this issue, see the subsection, Frequently Asked Questions (FAQ) Related to This Security Update, in this section. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-072: Cumulative Security Update for Internet Explorer - IE 7 - Windows Vista Gold/SP1/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 907223
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-072.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. An ActiveX control built with Microsoft Active Template Library (ATL) headers could also allow remote code execution; for more information about this issue, see the subsection, Frequently Asked Questions (FAQ) Related to This Security Update, in this section. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-072: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Moderate
Fixlet ID: 907225
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-072.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. An ActiveX control built with Microsoft Active Template Library (ATL) headers could also allow remote code execution; for more information about this issue, see the subsection, Frequently Asked Questions (FAQ) Related to This Security Update, in this section. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-072: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 907227
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-072.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. An ActiveX control built with Microsoft Active Template Library (ATL) headers could also allow remote code execution; for more information about this issue, see the subsection, Frequently Asked Questions (FAQ) Related to This Security Update, in this section. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-072: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP2/SP3 (Japanese)
Severity: Critical
Fixlet ID: 907229
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-072.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. An ActiveX control built with Microsoft Active Template Library (ATL) headers could also allow remote code execution; for more information about this issue, see the subsection, Frequently Asked Questions (FAQ) Related to This Security Update, in this section. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-072: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 907230
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-072.mspx

***************************************************************
Title: MS09-072: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 907231
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-072.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. An ActiveX control built with Microsoft Active Template Library (ATL) headers could also allow remote code execution; for more information about this issue, see the subsection, Frequently Asked Questions (FAQ) Related to This Security Update, in this section. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-072: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 907232
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-072.mspx

***************************************************************
Title: MS09-072: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 907233
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-072.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. An ActiveX control built with Microsoft Active Template Library (ATL) headers could also allow remote code execution; for more information about this issue, see the subsection, Frequently Asked Questions (FAQ) Related to This Security Update, in this section. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-072: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 907234
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-072.mspx

***************************************************************
Title: MS09-072: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 907235
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-072.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. An ActiveX control built with Microsoft Active Template Library (ATL) headers could also allow remote code execution; for more information about this issue, see the subsection, Frequently Asked Questions (FAQ) Related to This Security Update, in this section. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-072: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 907236
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-072.mspx

***************************************************************
Title: MS09-072: Cumulative Security Update for Internet Explorer - IE 8 - Windows Vista Gold/SP1/SP2 (Japanese)
Severity: Critical
Fixlet ID: 907237
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-072.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. An ActiveX control built with Microsoft Active Template Library (ATL) headers could also allow remote code execution; for more information about this issue, see the subsection, Frequently Asked Questions (FAQ) Related to This Security Update, in this section. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-072: Cumulative Security Update for Internet Explorer - IE 8 - Windows Vista Gold/SP1/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 907239
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-072.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. An ActiveX control built with Microsoft Active Template Library (ATL) headers could also allow remote code execution; for more information about this issue, see the subsection, Frequently Asked Questions (FAQ) Related to This Security Update, in this section. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-072: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Moderate
Fixlet ID: 907241
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-072.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. An ActiveX control built with Microsoft Active Template Library (ATL) headers could also allow remote code execution; for more information about this issue, see the subsection, Frequently Asked Questions (FAQ) Related to This Security Update, in this section. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-072: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 907243
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-072.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. An ActiveX control built with Microsoft Active Template Library (ATL) headers could also allow remote code execution; for more information about this issue, see the subsection, Frequently Asked Questions (FAQ) Related to This Security Update, in this section. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-072: Cumulative Security Update for Internet Explorer - IE 8 - Windows 7 (Japanese)
Severity: Critical
Fixlet ID: 907245
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-072.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. An ActiveX control built with Microsoft Active Template Library (ATL) headers could also allow remote code execution; for more information about this issue, see the subsection, Frequently Asked Questions (FAQ) Related to This Security Update, in this section. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-072: Cumulative Security Update for Internet Explorer - IE 8 - Windows 7 (x64) (Japanese)
Severity: Critical
Fixlet ID: 907247
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-072.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. An ActiveX control built with Microsoft Active Template Library (ATL) headers could also allow remote code execution; for more information about this issue, see the subsection, Frequently Asked Questions (FAQ) Related to This Security Update, in this section. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-072: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2008 R2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 907249
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-072.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. An ActiveX control built with Microsoft Active Template Library (ATL) headers could also allow remote code execution; for more information about this issue, see the subsection, Frequently Asked Questions (FAQ) Related to This Security Update, in this section. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-073: Vulnerability in WordPad and Office Text Converters Could Allow Remote Code Execution - Windows 2000 SP4 (Japanese)
Severity: Important
Fixlet ID: 907301
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-073.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft WordPad and Microsoft Office text converters. The vulnerability could allow remote code execution if a specially crafted Word 97 file is opened in WordPad or Microsoft Office Word. An attacker who successfully exploited this vulnerability could gain the same privileges as the user. Users whose accounts are configured to have fewer privileges on the system could be less impacted than users who operate with administrative privileges. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-073: Vulnerability in WordPad and Office Text Converters Could Allow Remote Code Execution - Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 907302
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-073.mspx

***************************************************************
Title: MS09-073: Vulnerability in WordPad and Office Text Converters Could Allow Remote Code Execution - Windows XP SP2/SP3 (Japanese)
Severity: Important
Fixlet ID: 907303
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-073.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft WordPad and Microsoft Office text converters. The vulnerability could allow remote code execution if a specially crafted Word 97 file is opened in WordPad or Microsoft Office Word. An attacker who successfully exploited this vulnerability could gain the same privileges as the user. Users whose accounts are configured to have fewer privileges on the system could be less impacted than users who operate with administrative privileges. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-073: Vulnerability in WordPad and Office Text Converters Could Allow Remote Code Execution - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 907304
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-073.mspx

***************************************************************
Title: MS09-073: Vulnerability in WordPad and Office Text Converters Could Allow Remote Code Execution - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 907305
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-073.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft WordPad and Microsoft Office text converters. The vulnerability could allow remote code execution if a specially crafted Word 97 file is opened in WordPad or Microsoft Office Word. An attacker who successfully exploited this vulnerability could gain the same privileges as the user. Users whose accounts are configured to have fewer privileges on the system could be less impacted than users who operate with administrative privileges. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-073: Vulnerability in WordPad and Office Text Converters Could Allow Remote Code Execution - Office XP SP3 (Local Install/Network) (Japanese)
Severity: Important
Fixlet ID: 907306
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-073.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft WordPad and Microsoft Office text converters. The vulnerability could allow remote code execution if a specially crafted Word 97 file is opened in WordPad or Microsoft Office Word. An attacker who successfully exploited this vulnerability could gain the same privileges as the user. Users whose accounts are configured to have fewer privileges on the system could be less impacted than users who operate with administrative privileges. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: Some files may not be updated until a Microsoft Word file is opened. As a result, this fixlet will return failed until such action is taken. See the Known Issues section of the security bulletin for more information.

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."'); } catch (e) { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.'; } }

***************************************************************
Title: MS09-073: Vulnerability in WordPad and Office Text Converters Could Allow Remote Code Execution - Office XP SP3 (Administrative Install) (Japanese)
Severity: Important
Fixlet ID: 907308
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-073.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft WordPad and Microsoft Office text converters. The vulnerability could allow remote code execution if a specially crafted Word 97 file is opened in WordPad or Microsoft Office Word. An attacker who successfully exploited this vulnerability could gain the same privileges as the user. Users whose accounts are configured to have fewer privileges on the system could be less impacted than users who operate with administrative privileges. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

Important Note: Some files may not be updated until a Microsoft Word file is opened. As a result, this fixlet will return failed until such action is taken. See the Known Issues section of the security bulletin for more information.

document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."'); } catch (e) { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.'; } }

***************************************************************
Title: MS09-073: Vulnerability in WordPad and Office Text Converters Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 907309
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-073.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft WordPad and Microsoft Office text converters. The vulnerability could allow remote code execution if a specially crafted Word 97 file is opened in WordPad or Microsoft Office Word. An attacker who successfully exploited this vulnerability could gain the same privileges as the user. Users whose accounts are configured to have fewer privileges on the system could be less impacted than users who operate with administrative privileges. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-073: Vulnerability in WordPad and Office Text Converters Could Allow Remote Code Execution - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 907310
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-073.mspx

***************************************************************
Title: MS09-073: Vulnerability in WordPad and Office Text Converters Could Allow Remote Code Execution - Office 2003 SP3 (Local/Network Install) (Japanese)
Severity: Important
Fixlet ID: 907311
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-073.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft WordPad and Microsoft Office text converters. The vulnerability could allow remote code execution if a specially crafted Word 97 file is opened in WordPad or Microsoft Office Word. An attacker who successfully exploited this vulnerability could gain the same privileges as the user. Users whose accounts are configured to have fewer privileges on the system could be less impacted than users who operate with administrative privileges. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

Important Note: Some files may not be updated until a Microsoft Word file is opened. As a result, this fixlet will return failed until such action is taken. See the Known Issues section of the security bulletin for more information.

document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."'); } catch (e) { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.'; } }

***************************************************************
Title: MS09-073: Vulnerability in WordPad and Office Text Converters Could Allow Remote Code Execution - Office 2003 SP3 (Administrative Install) (Japanese)
Severity: Important
Fixlet ID: 907313
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-073.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft WordPad and Microsoft Office text converters. The vulnerability could allow remote code execution if a specially crafted Word 97 file is opened in WordPad or Microsoft Office Word. An attacker who successfully exploited this vulnerability could gain the same privileges as the user. Users whose accounts are configured to have fewer privileges on the system could be less impacted than users who operate with administrative privileges. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

Important Note: Some files may not be updated until a Microsoft Word file is opened. As a result, this fixlet will return failed until such action is taken. See the Known Issues section of the security bulletin for more information.

document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."'); } catch (e) { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.'; } }

***************************************************************
Title: MS09-073: Vulnerability in WordPad and Office Text Converters Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 907314
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-073.mspx

***************************************************************
Title: MS09-073: Vulnerability in WordPad and Office Text Converters Could Allow Remote Code Execution - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 907325
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-073.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft WordPad and Microsoft Office text converters. The vulnerability could allow remote code execution if a specially crafted Word 97 file is opened in WordPad or Microsoft Office Word. An attacker who successfully exploited this vulnerability could gain the same privileges as the user. Users whose accounts are configured to have fewer privileges on the system could be less impacted than users who operate with administrative privileges. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-073: Vulnerability in WordPad and Office Text Converters Could Allow Remote Code Execution - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 907326
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-073.mspx

***************************************************************
Title: MS09-074: Vulnerability in Microsoft Office Project Could Allow Remote Code Execution - Project 2000 SR-1 (Japanese)
Severity: Critical
Fixlet ID: 907401
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-074.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Office Project. The vulnerability could allow remote code execution if a user opens a specially crafted Project file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-074: Vulnerability in Microsoft Office Project Could Allow Remote Code Execution - Project 2002 SP1 (Japanese)
Severity: Important
Fixlet ID: 907403
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-074.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Office Project. The vulnerability could allow remote code execution if a user opens a specially crafted Project file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-074: Vulnerability in Microsoft Office Project Could Allow Remote Code Execution - Project 2003 SP3 (Japanese)
Severity: Important
Fixlet ID: 907405
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-074.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Office Project. The vulnerability could allow remote code execution if a user opens a specially crafted Project file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.



More information about the BigFix-Announcements-Japan mailing list