[BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: PatchesforWindows(Japanese)

autonotify at bigfix.com autonotify at bigfix.com
Sat Oct 17 02:30:20 PDT 2009


Fixlet Site - PatchesforWindows(Japanese)
Current Version: 314	Published: Fri, 16 Oct 2009 22:52:45  GMT

New Fixlets:
============

***************************************************************
Title: MS09-050: Vulnerabilities in SMBv2 Could Allow Remote Code Execution - Windows Vista Gold/SP1/SP2 (Japanese)
Severity: Critical
Fixlet ID: 905001
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-050.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed and two privately reported vulnerabilities in Server Message Block Version 2 (SMBv2). The most severe of the vulnerabilities could allow remote code execution if an attacker sent a specially crafted SMB packet to a computer running the Server service. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate from outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-050: Vulnerabilities in SMBv2 Could Allow Remote Code Execution - Windows Vista Gold/SP1/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 905003
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-050.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed and two privately reported vulnerabilities in Server Message Block Version 2 (SMBv2). The most severe of the vulnerabilities could allow remote code execution if an attacker sent a specially crafted SMB packet to a computer running the Server service. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate from outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-050: Vulnerabilities in SMBv2 Could Allow Remote Code Execution - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Critical
Fixlet ID: 905005
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-050.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed and two privately reported vulnerabilities in Server Message Block Version 2 (SMBv2). The most severe of the vulnerabilities could allow remote code execution if an attacker sent a specially crafted SMB packet to a computer running the Server service. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate from outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-050: Vulnerabilities in SMBv2 Could Allow Remote Code Execution - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 905007
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-050.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed and two privately reported vulnerabilities in Server Message Block Version 2 (SMBv2). The most severe of the vulnerabilities could allow remote code execution if an attacker sent a specially crafted SMB packet to a computer running the Server service. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate from outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-051: Vulnerabilities in Windows Media Runtime Could Allow Remote Code Execution - DirectShow WMA Voice Codec - Windows 2000 SP4 / 2003 SP2 / XP SP2/SP3 (Japanese)
Severity: Critical
Fixlet ID: 905101
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-051.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media Runtime. The vulnerabilities could allow remote code execution if a user opened a specially crafted media file or received specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-051: Vulnerabilities in Windows Media Runtime Could Allow Remote Code Execution - DirectShow WMA Voice Codec - Windows 2000 SP4 / 2003 SP2 / XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 905102
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-051.mspx

***************************************************************
Title: MS09-051: Vulnerabilities in Windows Media Runtime Could Allow Remote Code Execution - Windows Media Audio Voice Decoder - Microsoft Windows 2000 SP4 (Japanese)
Severity: Critical
Fixlet ID: 905103
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-051.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media Runtime. The vulnerabilities could allow remote code execution if a user opened a specially crafted media file or received specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-051: Vulnerabilities in Windows Media Runtime Could Allow Remote Code Execution - Windows Media Audio Voice Decoder - Microsoft Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 905104
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-051.mspx

***************************************************************
Title: MS09-051: Vulnerabilities in Windows Media Runtime Could Allow Remote Code Execution - Audio Compression Manager - Microsoft Windows 2000 SP4 (Japanese)
Severity: Critical
Fixlet ID: 905105
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-051.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media Runtime. The vulnerabilities could allow remote code execution if a user opened a specially crafted media file or received specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-051: Vulnerabilities in Windows Media Runtime Could Allow Remote Code Execution - Audio Compression Manager - Microsoft Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 905106
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-051.mspx

***************************************************************
Title: MS09-051: Vulnerabilities in Windows Media Runtime Could Allow Remote Code Execution - Windows Media Audio Voice Decoder- Windows XP SP2 (Japanese)
Severity: Critical
Fixlet ID: 905107
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-051.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media Runtime. The vulnerabilities could allow remote code execution if a user opened a specially crafted media file or received specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-051: Vulnerabilities in Windows Media Runtime Could Allow Remote Code Execution - Windows Media Audio Voice Decoder- Windows XP SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 905108
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-051.mspx

***************************************************************
Title: MS09-051: Vulnerabilities in Windows Media Runtime Could Allow Remote Code Execution - Audio Compression Manager Windows XP SP2/SP3 (Japanese)
Severity: Critical
Fixlet ID: 905109
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-051.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media Runtime. The vulnerabilities could allow remote code execution if a user opened a specially crafted media file or received specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-051: Vulnerabilities in Windows Media Runtime Could Allow Remote Code Execution - Audio Compression Manager Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 905110
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-051.mspx

***************************************************************
Title: MS09-051: Vulnerabilities in Windows Media Runtime Could Allow Remote Code Execution - Windows Media Audio Voice Decoder - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 905111
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-051.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media Runtime. The vulnerabilities could allow remote code execution if a user opened a specially crafted media file or received specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-051: Vulnerabilities in Windows Media Runtime Could Allow Remote Code Execution - Windows Media Audio Voice Decoder - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 905112
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-051.mspx

***************************************************************
Title: MS09-051: Vulnerabilities in Windows Media Runtime Could Allow Remote Code Execution - DirectShow WMA Voice Codec - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 905113
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-051.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media Runtime. The vulnerabilities could allow remote code execution if a user opened a specially crafted media file or received specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-051: Vulnerabilities in Windows Media Runtime Could Allow Remote Code Execution - DirectShow WMA Voice Codec - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 905114
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-051.mspx

***************************************************************
Title: MS09-051: Vulnerabilities in Windows Media Runtime Could Allow Remote Code Execution - Windows Media Audio Voice Decoder - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 905115
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-051.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media Runtime. The vulnerabilities could allow remote code execution if a user opened a specially crafted media file or received specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-051: Vulnerabilities in Windows Media Runtime Could Allow Remote Code Execution - Windows Media Audio Voice Decoder - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 905116
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-051.mspx

***************************************************************
Title: MS09-051: Vulnerabilities in Windows Media Runtime Could Allow Remote Code Execution - Windows Media Audio Voice Decoder in Windows Media Format SDK 11 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 905119
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-051.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media Runtime. The vulnerabilities could allow remote code execution if a user opened a specially crafted media file or received specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-051: Vulnerabilities in Windows Media Runtime Could Allow Remote Code Execution - Windows Media Audio Voice Decoder in Windows Media Format SDK 11 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 905120
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-051.mspx

***************************************************************
Title: MS09-051: Vulnerabilities in Windows Media Runtime Could Allow Remote Code Execution - Audio Compression Manager - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 905121
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-051.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media Runtime. The vulnerabilities could allow remote code execution if a user opened a specially crafted media file or received specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-051: Vulnerabilities in Windows Media Runtime Could Allow Remote Code Execution - Audio Compression Manager - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 905122
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-051.mspx

***************************************************************
Title: MS09-051: Vulnerabilities in Windows Media Runtime Could Allow Remote Code Execution - Windows Media Audio Voice Decoder - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 905123
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-051.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media Runtime. The vulnerabilities could allow remote code execution if a user opened a specially crafted media file or received specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-051: Vulnerabilities in Windows Media Runtime Could Allow Remote Code Execution - Windows Media Audio Voice Decoder - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 905124
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-051.mspx

***************************************************************
Title: MS09-051: Vulnerabilities in Windows Media Runtime Could Allow Remote Code Execution - Audio Compression Manager - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 905125
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-051.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media Runtime. The vulnerabilities could allow remote code execution if a user opened a specially crafted media file or received specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-051: Vulnerabilities in Windows Media Runtime Could Allow Remote Code Execution - Audio Compression Manager - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 905126
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-051.mspx

***************************************************************
Title: MS09-051: Vulnerabilities in Windows Media Runtime Could Allow Remote Code Execution - Windows Media Audio Voice Decoder - Windows Server 2003 SP1/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 905127
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-051.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media Runtime. The vulnerabilities could allow remote code execution if a user opened a specially crafted media file or received specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-051: Vulnerabilities in Windows Media Runtime Could Allow Remote Code Execution - Windows Media Audio Voice Decoder - Windows Server 2003 SP1/SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 905128
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-051.mspx

***************************************************************
Title: MS09-051: Vulnerabilities in Windows Media Runtime Could Allow Remote Code Execution - Windows Media Audio Voice Decoder - Windows Vista Gold/SP1/SP2 (Japanese)
Severity: Critical
Fixlet ID: 905129
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-051.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media Runtime. The vulnerabilities could allow remote code execution if a user opened a specially crafted media file or received specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-051: Vulnerabilities in Windows Media Runtime Could Allow Remote Code Execution - Windows Media Audio Voice Decoder - Windows Vista Gold/SP1/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 905131
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-051.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media Runtime. The vulnerabilities could allow remote code execution if a user opened a specially crafted media file or received specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-051: Vulnerabilities in Windows Media Runtime Could Allow Remote Code Execution - Windows Media Audio Voice Decoder - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Critical
Fixlet ID: 905133
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-051.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media Runtime. The vulnerabilities could allow remote code execution if a user opened a specially crafted media file or received specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-051: Vulnerabilities in Windows Media Runtime Could Allow Remote Code Execution - Windows Media Audio Voice Decoder - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 905135
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-051.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media Runtime. The vulnerabilities could allow remote code execution if a user opened a specially crafted media file or received specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-051: Vulnerabilities in Windows Media Runtime Could Allow Remote Code Execution - Audio Compression Manager - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 905137
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-051.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media Runtime. The vulnerabilities could allow remote code execution if a user opened a specially crafted media file or received specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-051: Vulnerabilities in Windows Media Runtime Could Allow Remote Code Execution - Audio Compression Manager - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 905138
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-051.mspx

***************************************************************
Title: MS09-051: Vulnerabilities in Windows Media Runtime Could Allow Remote Code Execution - DirectShow WMA Voice Codec - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 905143
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-051.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media Runtime. The vulnerabilities could allow remote code execution if a user opened a specially crafted media file or received specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-051: Vulnerabilities in Windows Media Runtime Could Allow Remote Code Execution - DirectShow WMA Voice Codec - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 905144
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-051.mspx

***************************************************************
Title: MS09-052: Vulnerability in Windows Media Player Could Allow Remote Code Execution - Microsoft Windows Media Player 6.4 - Windows 2000 SP4 (Japanese)
Severity: Critical
Fixlet ID: 905201
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-052.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Windows Media Player. The vulnerability could allow remote code execution if a specially crafted ASF file is played using Windows Media Player 6.4. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-052: Vulnerability in Windows Media Player Could Allow Remote Code Execution - Microsoft Windows Media Player 6.4 - Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 905202
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-052.mspx

***************************************************************
Title: MS09-052: Vulnerability in Windows Media Player Could Allow Remote Code Execution - Microsoft Windows Media Player 6.4 - Windows XP SP2/SP3 (Japanese)
Severity: Critical
Fixlet ID: 905203
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-052.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Windows Media Player. The vulnerability could allow remote code execution if a specially crafted ASF file is played using Windows Media Player 6.4. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-052: Vulnerability in Windows Media Player Could Allow Remote Code Execution - Microsoft Windows Media Player 6.4 - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 905204
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-052.mspx

***************************************************************
Title: MS09-052: Vulnerability in Windows Media Player Could Allow Remote Code Execution - Microsoft Windows Media Player 6.4 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 905205
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-052.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Windows Media Player. The vulnerability could allow remote code execution if a specially crafted ASF file is played using Windows Media Player 6.4. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-052: Vulnerability in Windows Media Player Could Allow Remote Code Execution - Microsoft Windows Media Player 6.4 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 905206
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-052.mspx

***************************************************************
Title: MS09-052: Vulnerability in Windows Media Player Could Allow Remote Code Execution - Microsoft Windows Media Player 6.4 - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 905207
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-052.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Windows Media Player. The vulnerability could allow remote code execution if a specially crafted ASF file is played using Windows Media Player 6.4. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-052: Vulnerability in Windows Media Player Could Allow Remote Code Execution - Microsoft Windows Media Player 6.4 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 905208
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-052.mspx

***************************************************************
Title: MS09-052: Vulnerability in Windows Media Player Could Allow Remote Code Execution - Microsoft Windows Media Player 6.4 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 905209
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-052.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Windows Media Player. The vulnerability could allow remote code execution if a specially crafted ASF file is played using Windows Media Player 6.4. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-052: Vulnerability in Windows Media Player Could Allow Remote Code Execution - Microsoft Windows Media Player 6.4 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 905210
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-052.mspx

***************************************************************
Title: MS09-053: Vulnerabilities in FTP Service for Internet Information Services Could Allow Remote Code Execution - IIS 5.0 - Microsoft Windows 2000 SP4 (Japanese)
Severity: Important
Fixlet ID: 905301
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-053.mspx

Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities in the FTP Service in Microsoft Internet Information Services (IIS) 5.0, Microsoft Internet Information Services (IIS) 5.1, Microsoft Internet Information Services (IIS) 6.0, and Microsoft Internet Information Services (IIS) 7.0. On IIS 7.0, only FTP Service 6.0 is affected. The vulnerabilities could allow remote code execution (RCE) on systems running FTP Service on IIS 5.0, or denial of service (DoS) on systems running FTP Service on IIS 5.0, IIS 5.1, IIS 6.0 or IIS 7.0. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-053: Vulnerabilities in FTP Service for Internet Information Services Could Allow Remote Code Execution - IIS 5.0 - Microsoft Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 905302
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-053.mspx

***************************************************************
Title: MS09-053: Vulnerabilities in FTP Service for Internet Information Services Could Allow Remote Code Execution - IIS 5.1 - Windows XP SP2/SP3 (Japanese)
Severity: Important
Fixlet ID: 905303
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-053.mspx

Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities in the FTP Service in Microsoft Internet Information Services (IIS) 5.0, Microsoft Internet Information Services (IIS) 5.1, Microsoft Internet Information Services (IIS) 6.0, and Microsoft Internet Information Services (IIS) 7.0. On IIS 7.0, only FTP Service 6.0 is affected. The vulnerabilities could allow remote code execution (RCE) on systems running FTP Service on IIS 5.0, or denial of service (DoS) on systems running FTP Service on IIS 5.0, IIS 5.1, IIS 6.0 or IIS 7.0. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-053: Vulnerabilities in FTP Service for Internet Information Services Could Allow Remote Code Execution - IIS 5.1 - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 905304
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-053.mspx

***************************************************************
Title: MS09-053: Vulnerabilities in FTP Service for Internet Information Services Could Allow Remote Code Execution - IIS 5.1 - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 905305
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-053.mspx

Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities in the FTP Service in Microsoft Internet Information Services (IIS) 5.0, Microsoft Internet Information Services (IIS) 5.1, Microsoft Internet Information Services (IIS) 6.0, and Microsoft Internet Information Services (IIS) 7.0. On IIS 7.0, only FTP Service 6.0 is affected. The vulnerabilities could allow remote code execution (RCE) on systems running FTP Service on IIS 5.0, or denial of service (DoS) on systems running FTP Service on IIS 5.0, IIS 5.1, IIS 6.0 or IIS 7.0. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-053: Vulnerabilities in FTP Service for Internet Information Services Could Allow Remote Code Execution - IIS 5.1 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 905306
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-053.mspx

***************************************************************
Title: MS09-053: Vulnerabilities in FTP Service for Internet Information Services Could Allow Remote Code Execution - IIS 6.0 - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 905307
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-053.mspx

Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities in the FTP Service in Microsoft Internet Information Services (IIS) 5.0, Microsoft Internet Information Services (IIS) 5.1, Microsoft Internet Information Services (IIS) 6.0, and Microsoft Internet Information Services (IIS) 7.0. On IIS 7.0, only FTP Service 6.0 is affected. The vulnerabilities could allow remote code execution (RCE) on systems running FTP Service on IIS 5.0, or denial of service (DoS) on systems running FTP Service on IIS 5.0, IIS 5.1, IIS 6.0 or IIS 7.0. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-053: Vulnerabilities in FTP Service for Internet Information Services Could Allow Remote Code Execution - IIS 6.0 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 905308
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-053.mspx

***************************************************************
Title: MS09-053: Vulnerabilities in FTP Service for Internet Information Services Could Allow Remote Code Execution - IIS 6.0 - Windows Server 2003 (x64) SP2 (Japanese)
Severity: Important
Fixlet ID: 905309
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-053.mspx

Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities in the FTP Service in Microsoft Internet Information Services (IIS) 5.0, Microsoft Internet Information Services (IIS) 5.1, Microsoft Internet Information Services (IIS) 6.0, and Microsoft Internet Information Services (IIS) 7.0. On IIS 7.0, only FTP Service 6.0 is affected. The vulnerabilities could allow remote code execution (RCE) on systems running FTP Service on IIS 5.0, or denial of service (DoS) on systems running FTP Service on IIS 5.0, IIS 5.1, IIS 6.0 or IIS 7.0. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-053: Vulnerabilities in FTP Service for Internet Information Services Could Allow Remote Code Execution - IIS 6.0 - Windows Server 2003 (x64) SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 905310
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-053.mspx

***************************************************************
Title: MS09-053: Vulnerabilities in FTP Service for Internet Information Services Could Allow Remote Code Execution - IIS 7.0 - Windows Vista Gold/SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 905311
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-053.mspx

Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities in the FTP Service in Microsoft Internet Information Services (IIS) 5.0, Microsoft Internet Information Services (IIS) 5.1, Microsoft Internet Information Services (IIS) 6.0, and Microsoft Internet Information Services (IIS) 7.0. On IIS 7.0, only FTP Service 6.0 is affected. The vulnerabilities could allow remote code execution (RCE) on systems running FTP Service on IIS 5.0, or denial of service (DoS) on systems running FTP Service on IIS 5.0, IIS 5.1, IIS 6.0 or IIS 7.0. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-053: Vulnerabilities in FTP Service for Internet Information Services Could Allow Remote Code Execution - IIS 7.0 - Windows Vista Gold/SP1/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 905313
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-053.mspx

Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities in the FTP Service in Microsoft Internet Information Services (IIS) 5.0, Microsoft Internet Information Services (IIS) 5.1, Microsoft Internet Information Services (IIS) 6.0, and Microsoft Internet Information Services (IIS) 7.0. On IIS 7.0, only FTP Service 6.0 is affected. The vulnerabilities could allow remote code execution (RCE) on systems running FTP Service on IIS 5.0, or denial of service (DoS) on systems running FTP Service on IIS 5.0, IIS 5.1, IIS 6.0 or IIS 7.0. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-053: Vulnerabilities in FTP Service for Internet Information Services Could Allow Remote Code Execution - IIS 7.0 - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Important
Fixlet ID: 905315
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-053.mspx

Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities in the FTP Service in Microsoft Internet Information Services (IIS) 5.0, Microsoft Internet Information Services (IIS) 5.1, Microsoft Internet Information Services (IIS) 6.0, and Microsoft Internet Information Services (IIS) 7.0. On IIS 7.0, only FTP Service 6.0 is affected. The vulnerabilities could allow remote code execution (RCE) on systems running FTP Service on IIS 5.0, or denial of service (DoS) on systems running FTP Service on IIS 5.0, IIS 5.1, IIS 6.0 or IIS 7.0. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-053: Vulnerabilities in FTP Service for Internet Information Services Could Allow Remote Code Execution - IIS 7.0 - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 905317
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-053.mspx

Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities in the FTP Service in Microsoft Internet Information Services (IIS) 5.0, Microsoft Internet Information Services (IIS) 5.1, Microsoft Internet Information Services (IIS) 6.0, and Microsoft Internet Information Services (IIS) 7.0. On IIS 7.0, only FTP Service 6.0 is affected. The vulnerabilities could allow remote code execution (RCE) on systems running FTP Service on IIS 5.0, or denial of service (DoS) on systems running FTP Service on IIS 5.0, IIS 5.1, IIS 6.0 or IIS 7.0. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-054: Cumulative Security Update for Internet Explorer - Internet Explorer 5.01 SP4 - Windows 2000 SP4 (Japanese)
Severity: Critical
Fixlet ID: 905401
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-054.mspx

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-054: Cumulative Security Update for Internet Explorer - Internet Explorer 5.01 SP4 - Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 905402
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-054.mspx

***************************************************************
Title: MS09-054: Cumulative Security Update for Internet Explorer - Internet Explorer 6 SP1 - Windows 2000 SP4 (Japanese)
Severity: Critical
Fixlet ID: 905403
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-054.mspx

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-054: Cumulative Security Update for Internet Explorer - Internet Explorer 6 SP1 - Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 905404
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-054.mspx

***************************************************************
Title: MS09-054: Cumulative Security Update for Internet Explorer - Internet Explorer 6 - Windows XP SP2/SP3 (Japanese)
Severity: Critical
Fixlet ID: 905405
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-054.mspx

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-054: Cumulative Security Update for Internet Explorer - Internet Explorer 6 - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 905406
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-054.mspx

***************************************************************
Title: MS09-054: Cumulative Security Update for Internet Explorer - Internet Explorer 6 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 905407
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-054.mspx

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-054: Cumulative Security Update for Internet Explorer - Internet Explorer 6 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 905408
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-054.mspx

***************************************************************
Title: MS09-054: Cumulative Security Update for Internet Explorer - Internet Explorer 6 - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 905409
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-054.mspx

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-054: Cumulative Security Update for Internet Explorer - Internet Explorer 6 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 905410
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-054.mspx

***************************************************************
Title: MS09-054: Cumulative Security Update for Internet Explorer - Internet Explorer 6 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 905411
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-054.mspx

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-054: Cumulative Security Update for Internet Explorer - Internet Explorer 6 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 905412
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-054.mspx

***************************************************************
Title: MS09-054: Cumulative Security Update for Internet Explorer - Internet Explorer 7 - Windows XP SP2/SP3 (Japanese)
Severity: Critical
Fixlet ID: 905413
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-054.mspx

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-054: Cumulative Security Update for Internet Explorer - Internet Explorer 7 - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 905414
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-054.mspx

***************************************************************
Title: MS09-054: Cumulative Security Update for Internet Explorer - Internet Explorer 7 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 905415
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-054.mspx

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-054: Cumulative Security Update for Internet Explorer - Internet Explorer 7 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 905416
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-054.mspx

***************************************************************
Title: MS09-054: Cumulative Security Update for Internet Explorer - Internet Explorer 7 - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 905417
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-054.mspx

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-054: Cumulative Security Update for Internet Explorer - Internet Explorer 7 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 905418
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-054.mspx

***************************************************************
Title: MS09-054: Cumulative Security Update for Internet Explorer - Internet Explorer 7 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 905419
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-054.mspx

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-054: Cumulative Security Update for Internet Explorer - Internet Explorer 7 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 905420
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-054.mspx

***************************************************************
Title: MS09-054: Cumulative Security Update for Internet Explorer - Internet Explorer 7 - Windows Vista Gold/SP1/SP2 (Japanese)
Severity: Critical
Fixlet ID: 905421
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-054.mspx

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-054: Cumulative Security Update for Internet Explorer - Internet Explorer 7 - Windows Vista Gold/SP1/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 905423
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-054.mspx

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-054: Cumulative Security Update for Internet Explorer - Internet Explorer 7 - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Critical
Fixlet ID: 905425
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-054.mspx

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-054: Cumulative Security Update for Internet Explorer - Internet Explorer 7 - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 905427
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-054.mspx

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-054: Cumulative Security Update for Internet Explorer - Internet Explorer 8 - Windows XP SP2/SP3 (Japanese)
Severity: Critical
Fixlet ID: 905429
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-054.mspx

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-054: Cumulative Security Update for Internet Explorer - Internet Explorer 8 - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 905430
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-054.mspx

***************************************************************
Title: MS09-054: Cumulative Security Update for Internet Explorer - Internet Explorer 8 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 905431
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-054.mspx

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-054: Cumulative Security Update for Internet Explorer - Internet Explorer 8 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 905432
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-054.mspx

***************************************************************
Title: MS09-054: Cumulative Security Update for Internet Explorer - Internet Explorer 8 - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 905433
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-054.mspx

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-054: Cumulative Security Update for Internet Explorer - Internet Explorer 8 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 905434
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-054.mspx

***************************************************************
Title: MS09-054: Cumulative Security Update for Internet Explorer - Internet Explorer 8 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 905435
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-054.mspx

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-054: Cumulative Security Update for Internet Explorer - Internet Explorer 8 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 905436
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-054.mspx

***************************************************************
Title: MS09-054: Cumulative Security Update for Internet Explorer - Internet Explorer 8 - Windows Vista Gold/SP1/SP2 (Japanese)
Severity: Critical
Fixlet ID: 905437
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-054.mspx

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-054: Cumulative Security Update for Internet Explorer - Internet Explorer 8 - Windows Vista Gold/SP1/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 905439
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-054.mspx

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-054: Cumulative Security Update for Internet Explorer - Internet Explorer 8 - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Critical
Fixlet ID: 905441
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-054.mspx

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-054: Cumulative Security Update for Internet Explorer - Internet Explorer 8 - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 905443
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-054.mspx

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-055: Cumulative Security Update of ActiveX Kill Bits - Windows 2000 SP4 (Japanese)
Severity: Critical
Fixlet ID: 905501
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-055.mspx

Fixlet Description: Microsoft has released a security update that addresses a privately reported vulnerability that is common to multiple ActiveX controls and is currently being exploited. The vulnerability that affects ActiveX controls that were compiled using the vulnerable version of the Microsoft Active Template Library (ATL) could allow remote code execution if a user views a specially crafted Web page with Internet Explorer, instantiating the ActiveX control. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-055: Cumulative Security Update of ActiveX Kill Bits - Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 905502
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-055.mspx

***************************************************************
Title: MS09-055: Cumulative Security Update of ActiveX Kill Bits - Windows XP SP2/SP3 (Japanese)
Severity: Critical
Fixlet ID: 905503
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-055.mspx

Fixlet Description: Microsoft has released a security update that addresses a privately reported vulnerability that is common to multiple ActiveX controls and is currently being exploited. The vulnerability that affects ActiveX controls that were compiled using the vulnerable version of the Microsoft Active Template Library (ATL) could allow remote code execution if a user views a specially crafted Web page with Internet Explorer, instantiating the ActiveX control. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-055: Cumulative Security Update of ActiveX Kill Bits - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 905504
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-055.mspx

***************************************************************
Title: MS09-055: Cumulative Security Update of ActiveX Kill Bits - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 905505
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-055.mspx

Fixlet Description: Microsoft has released a security update that addresses a privately reported vulnerability that is common to multiple ActiveX controls and is currently being exploited. The vulnerability that affects ActiveX controls that were compiled using the vulnerable version of the Microsoft Active Template Library (ATL) could allow remote code execution if a user views a specially crafted Web page with Internet Explorer, instantiating the ActiveX control. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-055: Cumulative Security Update of ActiveX Kill Bits - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 905506
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-055.mspx

***************************************************************
Title: MS09-055: Cumulative Security Update of ActiveX Kill Bits - Windows 2003 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 905507
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-055.mspx

Fixlet Description: Microsoft has released a security update that addresses a privately reported vulnerability that is common to multiple ActiveX controls and is currently being exploited. The vulnerability that affects ActiveX controls that were compiled using the vulnerable version of the Microsoft Active Template Library (ATL) could allow remote code execution if a user views a specially crafted Web page with Internet Explorer, instantiating the ActiveX control. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-055: Cumulative Security Update of ActiveX Kill Bits - Windows 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 905508
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-055.mspx

***************************************************************
Title: MS09-055: Cumulative Security Update of ActiveX Kill Bits - Windows Vista Gold/SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 905509
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-055.mspx

Fixlet Description: Microsoft has released a security update that addresses a privately reported vulnerability that is common to multiple ActiveX controls and is currently being exploited. The vulnerability that affects ActiveX controls that were compiled using the vulnerable version of the Microsoft Active Template Library (ATL) could allow remote code execution if a user views a specially crafted Web page with Internet Explorer, instantiating the ActiveX control. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-055: Cumulative Security Update of ActiveX Kill Bits - Windows Vista Gold/SP1/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 905511
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-055.mspx

Fixlet Description: Microsoft has released a security update that addresses a privately reported vulnerability that is common to multiple ActiveX controls and is currently being exploited. The vulnerability that affects ActiveX controls that were compiled using the vulnerable version of the Microsoft Active Template Library (ATL) could allow remote code execution if a user views a specially crafted Web page with Internet Explorer, instantiating the ActiveX control. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-055: Cumulative Security Update of ActiveX Kill Bits - Windows 2008 Gold/SP2 (Japanese)
Severity: Low
Fixlet ID: 905513
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-055.mspx

Fixlet Description: Microsoft has released a security update that addresses a privately reported vulnerability that is common to multiple ActiveX controls and is currently being exploited. The vulnerability that affects ActiveX controls that were compiled using the vulnerable version of the Microsoft Active Template Library (ATL) could allow remote code execution if a user views a specially crafted Web page with Internet Explorer, instantiating the ActiveX control. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-055: Cumulative Security Update of ActiveX Kill Bits - Windows 2008 Gold/SP2 (x64) (Japanese)
Severity: Low
Fixlet ID: 905515
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-055.mspx

Fixlet Description: Microsoft has released a security update that addresses a privately reported vulnerability that is common to multiple ActiveX controls and is currently being exploited. The vulnerability that affects ActiveX controls that were compiled using the vulnerable version of the Microsoft Active Template Library (ATL) could allow remote code execution if a user views a specially crafted Web page with Internet Explorer, instantiating the ActiveX control. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-055: Cumulative Security Update of ActiveX Kill Bits - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 905523
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-055.mspx

Fixlet Description: Microsoft has released a security update that addresses a privately reported vulnerability that is common to multiple ActiveX controls and is currently being exploited. The vulnerability that affects ActiveX controls that were compiled using the vulnerable version of the Microsoft Active Template Library (ATL) could allow remote code execution if a user views a specially crafted Web page with Internet Explorer, instantiating the ActiveX control. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-055: Cumulative Security Update of ActiveX Kill Bits - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 905524
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-055.mspx

***************************************************************
Title: MS09-056: Vulnerabilities in Windows CryptoAPI Could Allow Spoofing - Windows 2000 SP4 (Japanese)
Severity: Important
Fixlet ID: 905601
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-056.mspx

Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities in Microsoft Windows. The vulnerabilities could allow spoofing if an attacker gains access to the certificate used by the end user for authentication. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-056: Vulnerabilities in Windows CryptoAPI Could Allow Spoofing - Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 905602
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-056.mspx

***************************************************************
Title: MS09-056: Vulnerabilities in Windows CryptoAPI Could Allow Spoofing - Windows XP SP2/SP3 (Japanese)
Severity: Important
Fixlet ID: 905603
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-056.mspx

Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities in Microsoft Windows. The vulnerabilities could allow spoofing if an attacker gains access to the certificate used by the end user for authentication. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-056: Vulnerabilities in Windows CryptoAPI Could Allow Spoofing - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 905604
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-056.mspx

***************************************************************
Title: MS09-056: Vulnerabilities in Windows CryptoAPI Could Allow Spoofing - Windows XP Pro SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 905605
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-056.mspx

Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities in Microsoft Windows. The vulnerabilities could allow spoofing if an attacker gains access to the certificate used by the end user for authentication. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-056: Vulnerabilities in Windows CryptoAPI Could Allow Spoofing - Windows XP Pro SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 905606
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-056.mspx

***************************************************************
Title: MS09-056: Vulnerabilities in Windows CryptoAPI Could Allow Spoofing - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 905607
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-056.mspx

Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities in Microsoft Windows. The vulnerabilities could allow spoofing if an attacker gains access to the certificate used by the end user for authentication. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-056: Vulnerabilities in Windows CryptoAPI Could Allow Spoofing - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 905608
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-056.mspx

***************************************************************
Title: MS09-056: Vulnerabilities in Windows CryptoAPI Could Allow Spoofing - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 905609
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-056.mspx

Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities in Microsoft Windows. The vulnerabilities could allow spoofing if an attacker gains access to the certificate used by the end user for authentication. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-056: Vulnerabilities in Windows CryptoAPI Could Allow Spoofing - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 905610
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-056.mspx

***************************************************************
Title: MS09-056: Vulnerabilities in Windows CryptoAPI Could Allow Spoofing - Windows Vista Gold/SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 905611
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-056.mspx

Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities in Microsoft Windows. The vulnerabilities could allow spoofing if an attacker gains access to the certificate used by the end user for authentication. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-056: Vulnerabilities in Windows CryptoAPI Could Allow Spoofing - Windows Vista Gold/SP1/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 905613
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-056.mspx

Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities in Microsoft Windows. The vulnerabilities could allow spoofing if an attacker gains access to the certificate used by the end user for authentication. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-056: Vulnerabilities in Windows CryptoAPI Could Allow Spoofing - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Important
Fixlet ID: 905615
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-056.mspx

Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities in Microsoft Windows. The vulnerabilities could allow spoofing if an attacker gains access to the certificate used by the end user for authentication. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-056: Vulnerabilities in Windows CryptoAPI Could Allow Spoofing - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 905617
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-056.mspx

Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities in Microsoft Windows. The vulnerabilities could allow spoofing if an attacker gains access to the certificate used by the end user for authentication. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-057: Vulnerability in Indexing Service Could Allow Remote Code Execution - Windows 2000 SP4 (Japanese)
Severity: Important
Fixlet ID: 905701
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-057.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker set up a malicious Web page that invokes the Indexing Service through a call to its ActiveX component. This call could include a malicious URL and exploit the vulnerability, granting the attacker access to the client system with the privileges of the user browsing the Web page. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-057: Vulnerability in Indexing Service Could Allow Remote Code Execution - Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 905702
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-057.mspx

***************************************************************
Title: MS09-057: Vulnerability in Indexing Service Could Allow Remote Code Execution - Windows XP SP2/SP3 (Japanese)
Severity: Important
Fixlet ID: 905703
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-057.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker set up a malicious Web page that invokes the Indexing Service through a call to its ActiveX component. This call could include a malicious URL and exploit the vulnerability, granting the attacker access to the client system with the privileges of the user browsing the Web page. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-057: Vulnerability in Indexing Service Could Allow Remote Code Execution - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 905704
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-057.mspx

***************************************************************
Title: MS09-057: Vulnerability in Indexing Service Could Allow Remote Code Execution - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 905705
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-057.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker set up a malicious Web page that invokes the Indexing Service through a call to its ActiveX component. This call could include a malicious URL and exploit the vulnerability, granting the attacker access to the client system with the privileges of the user browsing the Web page. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-057: Vulnerability in Indexing Service Could Allow Remote Code Execution - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 905706
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-057.mspx

***************************************************************
Title: MS09-057: Vulnerability in Indexing Service Could Allow Remote Code Execution - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 905707
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-057.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker set up a malicious Web page that invokes the Indexing Service through a call to its ActiveX component. This call could include a malicious URL and exploit the vulnerability, granting the attacker access to the client system with the privileges of the user browsing the Web page. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-057: Vulnerability in Indexing Service Could Allow Remote Code Execution - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 905708
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-057.mspx

***************************************************************
Title: MS09-057: Vulnerability in Indexing Service Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 905709
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-057.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker set up a malicious Web page that invokes the Indexing Service through a call to its ActiveX component. This call could include a malicious URL and exploit the vulnerability, granting the attacker access to the client system with the privileges of the user browsing the Web page. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS09-057: Vulnerability in Indexing Service Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 905710
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-057.mspx

***************************************************************
Title: MS09-058: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Microsoft Windows 2000 SP4 (Japanese)
Severity: Important
Fixlet ID: 905801
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-058.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in the Windows kernel. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logged on to the system and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit any of these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-058: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Microsoft Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 905802
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-058.mspx

***************************************************************
Title: MS09-058: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows XP SP2/SP3 (Japanese)
Severity: Important
Fixlet ID: 905803
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-058.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in the Windows kernel. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logged on to the system and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit any of these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-058: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 905804
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-058.mspx

***************************************************************
Title: MS09-058: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 905805
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-058.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in the Windows kernel. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logged on to the system and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit any of these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-058: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 905806
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-058.mspx

***************************************************************
Title: MS09-058: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 905807
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-058.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in the Windows kernel. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logged on to the system and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit any of these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-058: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 905808
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-058.mspx

***************************************************************
Title: MS09-058: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 905809
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-058.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in the Windows kernel. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logged on to the system and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit any of these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-058: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 905810
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-058.mspx

***************************************************************
Title: MS09-058: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Vista Gold/SP1/SP2 (Japanese)
Severity: Moderate
Fixlet ID: 905811
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-058.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in the Windows kernel. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logged on to the system and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit any of these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-058: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Vista Gold/SP1/SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 905813
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-058.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in the Windows kernel. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logged on to the system and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit any of these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-058: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Moderate
Fixlet ID: 905815
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-058.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in the Windows kernel. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logged on to the system and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit any of these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-058: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 905817
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-058.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in the Windows kernel. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logged on to the system and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit any of these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-059: Vulnerability in Local Security Authority Subsystem Service Could Allow Denial of Service - Windows XP SP2/SP3 (Japanese)
Severity: Important
Fixlet ID: 905901
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-059.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker sent a maliciously crafted packet during the NTLM authentication process. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-059: Vulnerability in Local Security Authority Subsystem Service Could Allow Denial of Service - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 905902
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-059.mspx

***************************************************************
Title: MS09-059: Vulnerability in Local Security Authority Subsystem Service Could Allow Denial of Service - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 905903
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-059.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker sent a maliciously crafted packet during the NTLM authentication process. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-059: Vulnerability in Local Security Authority Subsystem Service Could Allow Denial of Service - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 905904
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-059.mspx

***************************************************************
Title: MS09-059: Vulnerability in Local Security Authority Subsystem Service Could Allow Denial of Service - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 905905
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-059.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker sent a maliciously crafted packet during the NTLM authentication process. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-059: Vulnerability in Local Security Authority Subsystem Service Could Allow Denial of Service - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 905906
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-059.mspx

***************************************************************
Title: MS09-059: Vulnerability in Local Security Authority Subsystem Service Could Allow Denial of Service - Windows Server 2003  SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 905907
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-059.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker sent a maliciously crafted packet during the NTLM authentication process. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-059: Vulnerability in Local Security Authority Subsystem Service Could Allow Denial of Service - Windows Server 2003  SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 905908
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-059.mspx

***************************************************************
Title: MS09-059: Vulnerability in Local Security Authority Subsystem Service Could Allow Denial of Service - Windows Vista Gold/SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 905909
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-059.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker sent a maliciously crafted packet during the NTLM authentication process. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-059: Vulnerability in Local Security Authority Subsystem Service Could Allow Denial of Service - Windows Vista Gold/SP1/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 905911
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-059.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker sent a maliciously crafted packet during the NTLM authentication process. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-059: Vulnerability in Local Security Authority Subsystem Service Could Allow Denial of Service - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Important
Fixlet ID: 905913
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-059.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker sent a maliciously crafted packet during the NTLM authentication process. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-059: Vulnerability in Local Security Authority Subsystem Service Could Allow Denial of Service - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 905915
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-059.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker sent a maliciously crafted packet during the NTLM authentication process. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-060: Vulnerabilities in Microsoft Active Template Library (ATL) ActiveX Controls for Microsoft Office Could Allow Remote Code Execution - Outlook 2002 SP3 (Local/Network Install) (Japanese)
Severity: Critical
Fixlet ID: 906001
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-060.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in ActiveX Controls for Microsoft that were compiled with a vulnerable version of Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."'); } catch (e) { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.'; } }

***************************************************************
Title: MS09-060: Vulnerabilities in Microsoft Active Template Library (ATL) ActiveX Controls for Microsoft Office Could Allow Remote Code Execution - Outlook 2002 SP3 (Administrative Install) (Japanese)
Severity: Critical
Fixlet ID: 906003
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-060.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in ActiveX Controls for Microsoft that were compiled with a vulnerable version of Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."'); } catch (e) { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.'; } }

***************************************************************
Title: MS09-060: Vulnerabilities in Microsoft Active Template Library (ATL) ActiveX Controls for Microsoft Office Could Allow Remote Code Execution - Outlook 2003 SP3 (Local/Network Install) (Japanese)
Severity: Critical
Fixlet ID: 906006
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-060.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in ActiveX Controls for Microsoft that were compiled with a vulnerable version of Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."'); } catch (e) { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.'; } }

***************************************************************
Title: MS09-060: Vulnerabilities in Microsoft Active Template Library (ATL) ActiveX Controls for Microsoft Office Could Allow Remote Code Execution - Outlook 2003 SP3 (Administrative Install) (Japanese)
Severity: Critical
Fixlet ID: 906008
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-060.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in ActiveX Controls for Microsoft that were compiled with a vulnerable version of Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-060: Vulnerabilities in Microsoft Active Template Library (ATL) ActiveX Controls for Microsoft Office Could Allow Remote Code Execution - Outlook 2007 SP1/SP2 (Japanese)
Severity: Critical
Fixlet ID: 906011
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-060.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in ActiveX Controls for Microsoft that were compiled with a vulnerable version of Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."'); } catch (e) { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.'; } }

***************************************************************
Title: MS09-060: Vulnerabilities in Microsoft Active Template Library (ATL) ActiveX Controls for Microsoft Office Could Allow Remote Code Execution - Visio Viewer 2007 SP1/SP2 (Japanese)
Severity: Critical
Fixlet ID: 906016
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-060.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in ActiveX Controls for Microsoft that were compiled with a vulnerable version of Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."'); } catch (e) { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.'; } }

***************************************************************
Title: MS09-061: Vulnerabilities in the Microsoft .NET Common Language Runtime Could Allow Remote Code Execution - .NET Framework 1.1 SP1 (Japanese)
Severity: Important
Fixlet ID: 906101
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-061.mspx

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications, or if an attacker succeeds in persuading a user to run a specially crafted Microsoft .NET application. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerabilities could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and executing it, as could be the case in a Web hosting scenario. Microsoft .NET applications, Silverlight applications, XBAPs and ASP.NET pages that are not malicious are not at risk of being compromised because of this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-061: Vulnerabilities in the Microsoft .NET Common Language Runtime Could Allow Remote Code Execution - .NET Framework 1.1 SP1 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 906102
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-061.mspx

***************************************************************
Title: MS09-061: Vulnerabilities in the Microsoft .NET Common Language Runtime Could Allow Remote Code Execution - .NET Framework 2.0 SP1/3.5 - Windows 2000 SP4 / XP SP2/SP3 / Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 906103
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-061.mspx

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications, or if an attacker succeeds in persuading a user to run a specially crafted Microsoft .NET application. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerabilities could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and executing it, as could be the case in a Web hosting scenario. Microsoft .NET applications, Silverlight applications, XBAPs and ASP.NET pages that are not malicious are not at risk of being compromised because of this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-061: Vulnerabilities in the Microsoft .NET Common Language Runtime Could Allow Remote Code Execution - .NET Framework 2.0 SP1/3.5 - Windows 2000 SP4 / XP SP2/SP3 / Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 906104
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-061.mspx

***************************************************************
Title: MS09-061: Vulnerabilities in the Microsoft .NET Common Language Runtime Could Allow Remote Code Execution - .NET Framework 2.0 SP2 / 3.5 SP1 - Windows 2000 SP4 / XP SP2/SP3 / Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 906105
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-061.mspx

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications, or if an attacker succeeds in persuading a user to run a specially crafted Microsoft .NET application. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerabilities could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and executing it, as could be the case in a Web hosting scenario. Microsoft .NET applications, Silverlight applications, XBAPs and ASP.NET pages that are not malicious are not at risk of being compromised because of this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-061: Vulnerabilities in the Microsoft .NET Common Language Runtime Could Allow Remote Code Execution - .NET Framework 2.0 SP2 / 3.5 SP1 - Windows 2000 SP4 / XP SP2/SP3 / Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 906106
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-061.mspx

***************************************************************
Title: MS09-061: Vulnerabilities in the Microsoft .NET Common Language Runtime Could Allow Remote Code Execution - .NET Framework 1.0 SP3 (Media Center / Windows XP Tablet PC Edition (Japanese)
Severity: Critical
Fixlet ID: 906107
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-061.mspx

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications, or if an attacker succeeds in persuading a user to run a specially crafted Microsoft .NET application. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerabilities could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and executing it, as could be the case in a Web hosting scenario. Microsoft .NET applications, Silverlight applications, XBAPs and ASP.NET pages that are not malicious are not at risk of being compromised because of this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-061: Vulnerabilities in the Microsoft .NET Common Language Runtime Could Allow Remote Code Execution - .NET Framework 1.0 SP3 (Media Center / Windows XP Tablet PC Edition - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 906108
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-061.mspx

***************************************************************
Title: MS09-061: Vulnerabilities in the Microsoft .NET Common Language Runtime Could Allow Remote Code Execution - .NET Framework 1.1 SP1 - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 906109
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-061.mspx

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications, or if an attacker succeeds in persuading a user to run a specially crafted Microsoft .NET application. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerabilities could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and executing it, as could be the case in a Web hosting scenario. Microsoft .NET applications, Silverlight applications, XBAPs and ASP.NET pages that are not malicious are not at risk of being compromised because of this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-061: Vulnerabilities in the Microsoft .NET Common Language Runtime Could Allow Remote Code Execution - .NET Framework 1.1 SP1 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 906110
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-061.mspx

***************************************************************
Title: MS09-061: Vulnerabilities in the Microsoft .NET Common Language Runtime Could Allow Remote Code Execution - .NET Framework 2.0 - Windows Vista Gold (x64) (Japanese)
Severity: Critical
Fixlet ID: 906113
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-061.mspx

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications, or if an attacker succeeds in persuading a user to run a specially crafted Microsoft .NET application. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerabilities could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and executing it, as could be the case in a Web hosting scenario. Microsoft .NET applications, Silverlight applications, XBAPs and ASP.NET pages that are not malicious are not at risk of being compromised because of this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-061: Vulnerabilities in the Microsoft .NET Common Language Runtime Could Allow Remote Code Execution - .NET Framework 2.0 SP2/3.5 SP1  - Windows Vista Gold (x64) (Japanese)
Severity: Critical
Fixlet ID: 906115
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-061.mspx

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications, or if an attacker succeeds in persuading a user to run a specially crafted Microsoft .NET application. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerabilities could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and executing it, as could be the case in a Web hosting scenario. Microsoft .NET applications, Silverlight applications, XBAPs and ASP.NET pages that are not malicious are not at risk of being compromised because of this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-061: Vulnerabilities in the Microsoft .NET Common Language Runtime Could Allow Remote Code Execution - .NET Framework 2.0 SP1 Vista SP1/Server 2008 Gold (Japanese)
Severity: Important
Fixlet ID: 906117
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-061.mspx

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications, or if an attacker succeeds in persuading a user to run a specially crafted Microsoft .NET application. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerabilities could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and executing it, as could be the case in a Web hosting scenario. Microsoft .NET applications, Silverlight applications, XBAPs and ASP.NET pages that are not malicious are not at risk of being compromised because of this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-061: Vulnerabilities in the Microsoft .NET Common Language Runtime Could Allow Remote Code Execution - .NET Framework 2.0 SP2 / 3.5 SP1 - Windows Vista SP1 / Windows Server 2008 Gold (Japanese)
Severity: Important
Fixlet ID: 906119
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-061.mspx

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications, or if an attacker succeeds in persuading a user to run a specially crafted Microsoft .NET application. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerabilities could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and executing it, as could be the case in a Web hosting scenario. Microsoft .NET applications, Silverlight applications, XBAPs and ASP.NET pages that are not malicious are not at risk of being compromised because of this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-061: Vulnerabilities in the Microsoft .NET Common Language Runtime Could Allow Remote Code Execution - .NET Framework 2.0 SP2 / 3.5 SP1 - Windows Vista SP1 / Windows Server 2008 Gold (x64) (Japanese)
Severity: Important
Fixlet ID: 906120
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-061.mspx

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications, or if an attacker succeeds in persuading a user to run a specially crafted Microsoft .NET application. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerabilities could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and executing it, as could be the case in a Web hosting scenario. Microsoft .NET applications, Silverlight applications, XBAPs and ASP.NET pages that are not malicious are not at risk of being compromised because of this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-061: Vulnerabilities in the Microsoft .NET Common Language Runtime Could Allow Remote Code Execution - .NET Framework 2.0 SP2 - Windows Vista SP2/2008 SP2 (Japanese)
Severity: Important
Fixlet ID: 906121
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-061.mspx

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications, or if an attacker succeeds in persuading a user to run a specially crafted Microsoft .NET application. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerabilities could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and executing it, as could be the case in a Web hosting scenario. Microsoft .NET applications, Silverlight applications, XBAPs and ASP.NET pages that are not malicious are not at risk of being compromised because of this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-061: Vulnerabilities in the Microsoft .NET Common Language Runtime Could Allow Remote Code Execution - .NET Framework 2.0 SP2 - Windows Vista SP2/2008 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 906123
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-061.mspx

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications, or if an attacker succeeds in persuading a user to run a specially crafted Microsoft .NET application. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerabilities could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and executing it, as could be the case in a Web hosting scenario. Microsoft .NET applications, Silverlight applications, XBAPs and ASP.NET pages that are not malicious are not at risk of being compromised because of this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-061: Vulnerabilities in the Microsoft .NET Common Language Runtime Could Allow Remote Code Execution - .NET Framework 2.0 SP1/3.5 -  Windows XP SP2 / Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 906125
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-061.mspx

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications, or if an attacker succeeds in persuading a user to run a specially crafted Microsoft .NET application. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerabilities could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and executing it, as could be the case in a Web hosting scenario. Microsoft .NET applications, Silverlight applications, XBAPs and ASP.NET pages that are not malicious are not at risk of being compromised because of this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-061: Vulnerabilities in the Microsoft .NET Common Language Runtime Could Allow Remote Code Execution - .NET Framework 2.0 SP1/3.5 -  Windows XP SP2 / Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 906126
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-061.mspx

***************************************************************
Title: MS09-061: Vulnerabilities in the Microsoft .NET Common Language Runtime Could Allow Remote Code Execution - .NET Framework 2.0 SP1 - Vista SP1 / Server 2008 Gold (x64) (Japanese)
Severity: Important
Fixlet ID: 906127
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-061.mspx

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications, or if an attacker succeeds in persuading a user to run a specially crafted Microsoft .NET application. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerabilities could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and executing it, as could be the case in a Web hosting scenario. Microsoft .NET applications, Silverlight applications, XBAPs and ASP.NET pages that are not malicious are not at risk of being compromised because of this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-061: Vulnerabilities in the Microsoft .NET Common Language Runtime Could Allow Remote Code Execution - Microsoft Silverlight (Japanese)
Severity: Critical
Fixlet ID: 906129
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS09-061.mspx

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications, or if an attacker succeeds in persuading a user to run a specially crafted Microsoft .NET application. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerabilities could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and executing it, as could be the case in a Web hosting scenario. Microsoft .NET applications, Silverlight applications, XBAPs and ASP.NET pages that are not malicious are not at risk of being compromised because of this vulnerability. Microsoft recommends that users upgrade Microsoft Silverlight 2 to Microsoft Silverlight 3, which addresses the vulnerability.

***************************************************************
Title: MS09-061: Vulnerabilities in the Microsoft .NET Common Language Runtime Could Allow Remote Code Execution - .NET Framework 2.0 - Windows Vista Gold (Japanese)
Severity: Critical
Fixlet ID: 906131
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-061.mspx

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications, or if an attacker succeeds in persuading a user to run a specially crafted Microsoft .NET application. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerabilities could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and executing it, as could be the case in a Web hosting scenario. Microsoft .NET applications, Silverlight applications, XBAPs and ASP.NET pages that are not malicious are not at risk of being compromised because of this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-061: Vulnerabilities in the Microsoft .NET Common Language Runtime Could Allow Remote Code Execution - .NET Framework 2.0 SP2/3.5 SP1  - Windows Vista Gold (Japanese)
Severity: Critical
Fixlet ID: 906133
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-061.mspx

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications, or if an attacker succeeds in persuading a user to run a specially crafted Microsoft .NET application. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerabilities could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and executing it, as could be the case in a Web hosting scenario. Microsoft .NET applications, Silverlight applications, XBAPs and ASP.NET pages that are not malicious are not at risk of being compromised because of this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-061: Vulnerabilities in the Microsoft .NET Common Language Runtime Could Allow Remote Code Execution - .NET Framework 2.0 SP2 / 3.5 SP1 - Windows XP SP2 / Windows 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 906135
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-061.mspx

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications, or if an attacker succeeds in persuading a user to run a specially crafted Microsoft .NET application. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerabilities could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and executing it, as could be the case in a Web hosting scenario. Microsoft .NET applications, Silverlight applications, XBAPs and ASP.NET pages that are not malicious are not at risk of being compromised because of this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Windows XP SP2/SP3 (Japanese)
Severity: Critical
Fixlet ID: 906201
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-062.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows GDI+. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 906202
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-062.mspx

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 906203
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-062.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows GDI+. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 906204
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-062.mspx

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 906205
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-062.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows GDI+. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 906207
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-062.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows GDI+. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 906208
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-062.mspx

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Windows Vista Gold/SP1 (Japanese)
Severity: Critical
Fixlet ID: 906209
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-062.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows GDI+. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 906210
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-062.mspx

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Windows Vista Gold/SP1(x64) (Japanese)
Severity: Critical
Fixlet ID: 906211
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-062.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows GDI+. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Windows Server 2008 (Japanese)
Severity: Critical
Fixlet ID: 906213
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-062.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows GDI+. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Windows Server 2008 (x64) (Japanese)
Severity: Critical
Fixlet ID: 906215
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-062.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows GDI+. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - IE 6 SP1 - Windows 2000 SP4 (Japanese)
Severity: Critical
Fixlet ID: 906217
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-062.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows GDI+. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - .NET Framework 1.1 SP1-  Windows 2000 SP4 (Japanese)
Severity: Important
Fixlet ID: 906219
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-062.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows GDI+. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - IE 6 SP1 - Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 906220
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-062.mspx

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - .NET Framework 2.0 SP1 - Windows 2000 SP4 (Japanese)
Severity: Important
Fixlet ID: 906221
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-062.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows GDI+. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - .NET Framework 1.1 SP1-  Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 906222
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-062.mspx

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - .NET Framework 2.0 SP2  - Windows 2000 SP4 (Japanese)
Severity: Important
Fixlet ID: 906223
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-062.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows GDI+. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

The update for this issue will be included in Microsoft .NET Framework 2.0 Service Pack 3

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - .NET Framework 2.0 SP1 - Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 906224
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-062.mspx

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - .NET Framework 2.0 SP2  - Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 906225
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-062.mspx

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Office XP SP3 (Local/Network Install) (Japanese)
Severity: Important
Fixlet ID: 906273
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms09-062.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows GDI+. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Office XP SP3 (Administrative Install) (Japanese)
Severity: Important
Fixlet ID: 906274
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms09-062.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows GDI+. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Office 2003 SP3 (Local/Network Install) (Japanese)
Severity: Important
Fixlet ID: 906277
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-062.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows GDI+. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."'); } catch (e) { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.'; } }

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Office 2003 SP3 (Administrative Install) (Japanese)
Severity: Important
Fixlet ID: 906278
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-062.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows GDI+. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."'); } catch (e) { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.'; } }

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Word Viewer 2003, Excel Viewer 2003 (Japanese)
Severity: Important
Fixlet ID: 906279
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-062.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows GDI+. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Office 2007 SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 906281
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-062.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows GDI+. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Excel/PowerPoint Viewer 2007 Gold/SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 906282
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-062.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows GDI+. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Gold/SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 906283
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-062.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows GDI+. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Groove 2007 Gold/SP1 (Japanese)
Severity: Important
Fixlet ID: 906284
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-062.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows GDI+. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Expression Web 1/2 (Japanese)
Severity: Important
Fixlet ID: 906286
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-062.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows GDI+. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Project 2002 SP1 (Local/Network Install) (Japanese)
Severity: Important
Fixlet ID: 906289
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-062.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows GDI+. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Visio 2002 SP2 (Local/Network Install) (Japanese)
Severity: Important
Fixlet ID: 906293
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms09-062.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows GDI+. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-062: Vulneraibilities in GDI+ Could Allow Remote Code Execution - SQL Server 2005 SP2 - GDR Branch (x64) (Japanese)
Severity: Important
Fixlet ID: 906295
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-062.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows GDI+. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

The update for this issue will be included in SQL Server 2005 Service Pack 4.

***************************************************************
Title: MS09-062: Vulneraibilities in GDI+ Could Allow Remote Code Execution - SQL Server 2005 SP2 - GDR Branch (Japanese)
Severity: Critical
Fixlet ID: 906297
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-062.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows GDI+. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

The update for this issue will be included in SQL Server 2005 Service Pack 4.

***************************************************************
Title: MS09-062: Vulneraibilities in GDI+ Could Allow Remote Code Execution - SQL Server 2005 SP3 - GDR Branch (x64) (Japanese)
Severity: Critical
Fixlet ID: 906298
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-062.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows GDI+. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

The update for this issue will be included in SQL Server 2005 Service Pack 4.

***************************************************************
Title: MS09-062: Vulneraibilities in GDI+ Could Allow Remote Code Execution - SQL Server 2005 SP3 - GDR Branch (Japanese)
Severity: Critical
Fixlet ID: 906299
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-062.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows GDI+. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

The update for this issue will be included in SQL Server 2005 Service Pack 4.

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - SQL Server 2005 SP2 - QFE Branch (Japanese)
Severity: Critical
Fixlet ID: 9062103
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-062.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows GDI+. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

The update for this issue will be included in  SQL Server 2005 Service Pack 4

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - SQL Server 2005 SP2 - QFE Branch (x64) (Japanese)
Severity: Critical
Fixlet ID: 9062105
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms09-062.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows GDI+. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

The update for this issue will be included in Microsoft .NET Framework 2.0 Service Pack 3

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Report Viewer 2005 (Japanese)
Severity: Critical
Fixlet ID: 9062111
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-062.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows GDI+. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

The update for this issue will be included in Report Viewer 2005 Service Pack 2 Redistributable.

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Report Viewer 2008 (Japanese)
Severity: Critical
Fixlet ID: 9062113
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-062.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows GDI+. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

The update for this issue will be included in Report Viewer 2008 Service Pack 2 Redistributable.

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Report Viewer 2008 SP1 (Japanese)
Severity: Critical
Fixlet ID: 9062115
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-062.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows GDI+. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

The update for this issue will be included in Report Viewer 2008 Service Pack 2 Redistributable.

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Visual Studio .NET 2003 Service Pack 1 (Japanese)
Severity: Important
Fixlet ID: 9062119
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms09-062.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows GDI+. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Visual Studio .NET 2003 Service Pack 1 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 9062120
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms09-062.mspx

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Forefront Client Security (Japanese)
Severity: Critical
Fixlet ID: 9062123
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-062.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows GDI+. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Forefront Client Security - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 9062124
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-062.mspx

***************************************************************
Title: MS09-062: Vulneraibilities in GDI+ Could Allow Remote Code Execution - SQL Server 2005 SP3 - QFE Branch (x64) (Japanese)
Severity: Critical
Fixlet ID: 9062127
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-062.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows GDI+. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-062: Vulneraibilities in GDI+ Could Allow Remote Code Execution - SQL Server 2005 SP3 - QFE Branch (Japanese)
Severity: Critical
Fixlet ID: 9062128
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-062.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows GDI+. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Visual Studio 2005 Service Pack 1 (Japanese)
Severity: Important
Fixlet ID: 9062129
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms09-062.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows GDI+. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Visual Studio 2005 Service Pack 1 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 9062130
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms09-062.mspx

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Visual Studio 2008 (Japanese)
Severity: Important
Fixlet ID: 9062131
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms09-062.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows GDI+. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Visual Studio 2008 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 9062132
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms09-062.mspx

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Visual Studio 2008 Service Pack 1 (Japanese)
Severity: None
Fixlet ID: 9062133
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms09-062.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows GDI+. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS09-062: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Visual Studio 2008 Service Pack 1 - CORRUPT PATCH (Japanese)
Severity: None
Fixlet ID: 9062134
Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms09-062.mspx



More information about the BigFix-Announcements-Japan mailing list