[BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)'

autonotify at us.ibm.com autonotify at us.ibm.com
Fri Dec 17 02:30:26 PST 2010


Fixlet Site - 'Patches for Windows (Japanese)'
Current Version: 395	Published: Thu, 16 Dec 2010 23:37:35  GMT

New Fixlets:
============

***************************************************************
Title: MS10-090: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1009001
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-090.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and three publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-090: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1009002
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-090.mspx

***************************************************************
Title: MS10-090: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1009003
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-090.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and three publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-090: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1009004
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-090.mspx

***************************************************************
Title: MS10-090: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1009005
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-090.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and three publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-090: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1009006
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-090.mspx

***************************************************************
Title: MS10-090: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1009007
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-090.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and three publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-090: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1009008
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-090.mspx

***************************************************************
Title: MS10-090: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1009009
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-090.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and three publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-090: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1009010
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-090.mspx

***************************************************************
Title: MS10-090: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1009011
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-090.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and three publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-090: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1009012
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-090.mspx

***************************************************************
Title: MS10-090: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1009013
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-090.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and three publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-090: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1009014
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-090.mspx

***************************************************************
Title: MS10-090: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1009015
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-090.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and three publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-090: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1009016
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-090.mspx

***************************************************************
Title: MS10-090: Cumulative Security Update for Internet Explorer - IE 7 - Windows Vista SP1/SP2 (Japanese)
Severity: Critical
Fixlet ID: 1009017
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-090.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and three publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-090: Cumulative Security Update for Internet Explorer - IE 7 - Windows Vista SP1/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1009019
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-090.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and three publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-090: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Critical
Fixlet ID: 1009021
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-090.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and three publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-090: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1009023
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-090.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and three publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-090: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1009025
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-090.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and three publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-090: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1009026
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-090.mspx

***************************************************************
Title: MS10-090: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1009027
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-090.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and three publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-090: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1009028
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-090.mspx

***************************************************************
Title: MS10-090: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1009029
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-090.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and three publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-090: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1009030
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-090.mspx

***************************************************************
Title: MS10-090: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1009031
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-090.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and three publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-090: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1009032
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-090.mspx

***************************************************************
Title: MS10-090: Cumulative Security Update for Internet Explorer - IE 8 - Windows Vista SP1/SP2 (Japanese)
Severity: Critical
Fixlet ID: 1009033
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-090.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and three publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-090: Cumulative Security Update for Internet Explorer - IE 8 - Windows Vista SP1/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1009035
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-090.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and three publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-090: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Critical
Fixlet ID: 1009037
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-090.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and three publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-090: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1009039
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-090.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and three publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-090: Cumulative Security Update for Internet Explorer - IE 8 - Windows 7 (Japanese)
Severity: Critical
Fixlet ID: 1009041
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-090.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and three publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-090: Cumulative Security Update for Internet Explorer - IE 8 - Windows 7 Gold (x64) (Japanese)
Severity: Critical
Fixlet ID: 1009043
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-090.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and three publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-090: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2008 R2 Gold (x64) (Japanese)
Severity: Critical
Fixlet ID: 1009045
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-090.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities and three publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-091: Vulnerabilities in the OpenType Font (OTF) Driver Could Allow Remote Code Execution - Windows XP SP3 (Japanese)
Severity: Important
Fixlet ID: 1009101
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-091.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in the Windows Open Type Font (OTF) driver that could allow remote code execution. An attacker could host a specially crafted OpenType font on a network share. The affected control path is then triggered when the user navigates to the share in Windows Explorer, allowing the specially crafted font to take complete control over an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-091: Vulnerabilities in the OpenType Font (OTF) Driver Could Allow Remote Code Execution - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1009102
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-091.mspx

***************************************************************
Title: MS10-091: Vulnerabilities in the OpenType Font (OTF) Driver Could Allow Remote Code Execution - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1009103
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-091.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in the Windows Open Type Font (OTF) driver that could allow remote code execution. An attacker could host a specially crafted OpenType font on a network share. The affected control path is then triggered when the user navigates to the share in Windows Explorer, allowing the specially crafted font to take complete control over an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-091: Vulnerabilities in the OpenType Font (OTF) Driver Could Allow Remote Code Execution - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1009104
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-091.mspx

***************************************************************
Title: MS10-091: Vulnerabilities in the OpenType Font (OTF) Driver Could Allow Remote Code Execution - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1009105
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-091.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in the Windows Open Type Font (OTF) driver that could allow remote code execution. An attacker could host a specially crafted OpenType font on a network share. The affected control path is then triggered when the user navigates to the share in Windows Explorer, allowing the specially crafted font to take complete control over an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-091: Vulnerabilities in the OpenType Font (OTF) Driver Could Allow Remote Code Execution - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1009106
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-091.mspx

***************************************************************
Title: MS10-091: Vulnerabilities in the OpenType Font (OTF) Driver Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1009107
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-091.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in the Windows Open Type Font (OTF) driver that could allow remote code execution. An attacker could host a specially crafted OpenType font on a network share. The affected control path is then triggered when the user navigates to the share in Windows Explorer, allowing the specially crafted font to take complete control over an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-091: Vulnerabilities in the OpenType Font (OTF) Driver Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1009108
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-091.mspx

***************************************************************
Title: MS10-091: Vulnerabilities in the OpenType Font (OTF) Driver Could Allow Remote Code Execution - Windows Vista SP1/SP2 (Japanese)
Severity: Critical
Fixlet ID: 1009109
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-091.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in the Windows Open Type Font (OTF) driver that could allow remote code execution. An attacker could host a specially crafted OpenType font on a network share. The affected control path is then triggered when the user navigates to the share in Windows Explorer, allowing the specially crafted font to take complete control over an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-091: Vulnerabilities in the OpenType Font (OTF) Driver Could Allow Remote Code Execution - Windows Vista SP1/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1009111
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-091.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in the Windows Open Type Font (OTF) driver that could allow remote code execution. An attacker could host a specially crafted OpenType font on a network share. The affected control path is then triggered when the user navigates to the share in Windows Explorer, allowing the specially crafted font to take complete control over an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-091: Vulnerabilities in the OpenType Font (OTF) Driver Could Allow Remote Code Execution - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Critical
Fixlet ID: 1009113
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-091.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in the Windows Open Type Font (OTF) driver that could allow remote code execution. An attacker could host a specially crafted OpenType font on a network share. The affected control path is then triggered when the user navigates to the share in Windows Explorer, allowing the specially crafted font to take complete control over an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-091: Vulnerabilities in the OpenType Font (OTF) Driver Could Allow Remote Code Execution - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1009115
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-091.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in the Windows Open Type Font (OTF) driver that could allow remote code execution. An attacker could host a specially crafted OpenType font on a network share. The affected control path is then triggered when the user navigates to the share in Windows Explorer, allowing the specially crafted font to take complete control over an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-091: Vulnerabilities in the OpenType Font (OTF) Driver Could Allow Remote Code Execution - Windows 7 (Japanese)
Severity: Critical
Fixlet ID: 1009117
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-091.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in the Windows Open Type Font (OTF) driver that could allow remote code execution. An attacker could host a specially crafted OpenType font on a network share. The affected control path is then triggered when the user navigates to the share in Windows Explorer, allowing the specially crafted font to take complete control over an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-091: Vulnerabilities in the OpenType Font (OTF) Driver Could Allow Remote Code Execution - Windows 7 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1009119
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-091.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in the Windows Open Type Font (OTF) driver that could allow remote code execution. An attacker could host a specially crafted OpenType font on a network share. The affected control path is then triggered when the user navigates to the share in Windows Explorer, allowing the specially crafted font to take complete control over an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-091: Vulnerabilities in the OpenType Font (OTF) Driver Could Allow Remote Code Execution - Windows Server 2008 R2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1009121
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-091.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in the Windows Open Type Font (OTF) driver that could allow remote code execution. An attacker could host a specially crafted OpenType font on a network share. The affected control path is then triggered when the user navigates to the share in Windows Explorer, allowing the specially crafted font to take complete control over an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-092: Vulnerability in Task Scheduler Could Allow Elevation of Privilege - Windows Vista SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 1009201
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-092.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Windows Task Scheduler. The vulnerability could allow elevation of privilege if an attacker logged on to an affected system and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-092: Vulnerability in Task Scheduler Could Allow Elevation of Privilege - Windows Vista SP1/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1009203
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-092.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Windows Task Scheduler. The vulnerability could allow elevation of privilege if an attacker logged on to an affected system and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-092: Vulnerability in Task Scheduler Could Allow Elevation of Privilege - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Important
Fixlet ID: 1009205
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-092.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Windows Task Scheduler. The vulnerability could allow elevation of privilege if an attacker logged on to an affected system and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-092: Vulnerability in Task Scheduler Could Allow Elevation of Privilege - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1009207
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-092.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Windows Task Scheduler. The vulnerability could allow elevation of privilege if an attacker logged on to an affected system and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-092: Vulnerability in Task Scheduler Could Allow Elevation of Privilege - Windows 7 (Japanese)
Severity: Important
Fixlet ID: 1009209
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-092.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Windows Task Scheduler. The vulnerability could allow elevation of privilege if an attacker logged on to an affected system and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-092: Vulnerability in Task Scheduler Could Allow Elevation of Privilege - Windows 7 (x64) (Japanese)
Severity: Important
Fixlet ID: 1009211
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-092.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Windows Task Scheduler. The vulnerability could allow elevation of privilege if an attacker logged on to an affected system and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-092: Vulnerability in Task Scheduler Could Allow Elevation of Privilege - Windows Server 2008 R2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1009213
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-092.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Windows Task Scheduler. The vulnerability could allow elevation of privilege if an attacker logged on to an affected system and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-093: Vulnerability in Windows Movie Maker Could Allow Remote Code Execution - Movie Maker 2.6 - Windows Vista SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 1009301
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-093.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Windows Movie Maker. The vulnerability could allow remote code execution if an attacker convinces a user to open a legitimate Windows Movie Maker file that is located in the same network directory as a specially crafted library file. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-093: Vulnerability in Windows Movie Maker Could Allow Remote Code Execution - Movie Maker 2.6 - Windows Vista SP1/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1009303
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-093.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Windows Movie Maker. The vulnerability could allow remote code execution if an attacker convinces a user to open a legitimate Windows Movie Maker file that is located in the same network directory as a specially crafted library file. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-094: Vulnerability in Windows Media Encoder Could Allow Remote Code Execution - Windows Media Encoder 9 (32-bit) - Windows XP SP3/Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1009401
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-094.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Windows Media Encoder. The vulnerability could allow remote code execution if an attacker convinces a user to open a legitimate Windows Media Profile (.prx) file that is located in the same network directory as a specially crafted library file. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-094: Vulnerability in Windows Media Encoder Could Allow Remote Code Execution - Windows Media Encoder 9 (32-bit) - Windows XP SP3/Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1009402
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-094.mspx

***************************************************************
Title: MS10-094: Vulnerability in Windows Media Encoder Could Allow Remote Code Execution - Windows Media Encoder 9 (32-bit) - Windows XP SP2/Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1009403
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-094.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Windows Media Encoder. The vulnerability could allow remote code execution if an attacker convinces a user to open a legitimate Windows Media Profile (.prx) file that is located in the same network directory as a specially crafted library file. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-094: Vulnerability in Windows Media Encoder Could Allow Remote Code Execution - Windows Media Encoder 9 (32-bit) - Windows XP SP2/Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1009404
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-094.mspx

***************************************************************
Title: MS10-094: Vulnerability in Windows Media Encoder Could Allow Remote Code Execution - Windows Media Encoder 9 (64-bit) - Windows XP SP2/Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1009405
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-094.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Windows Media Encoder. The vulnerability could allow remote code execution if an attacker convinces a user to open a legitimate Windows Media Profile (.prx) file that is located in the same network directory as a specially crafted library file. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-094: Vulnerability in Windows Media Encoder Could Allow Remote Code Execution - Windows Media Encoder 9 (64-bit) - Windows XP SP2/Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1009406
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-094.mspx

***************************************************************
Title: MS10-094: Vulnerability in Windows Media Encoder Could Allow Remote Code Execution - Windows Media Encoder 9 (32-bit) - Windows Vista SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 1009407
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-094.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Windows Media Encoder. The vulnerability could allow remote code execution if an attacker convinces a user to open a legitimate Windows Media Profile (.prx) file that is located in the same network directory as a specially crafted library file. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-094: Vulnerability in Windows Media Encoder Could Allow Remote Code Execution - Windows Media Encoder 9 (32-bit) - Windows Vista SP1/SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1009408
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-094.mspx

***************************************************************
Title: MS10-094: Vulnerability in Windows Media Encoder Could Allow Remote Code Execution - Windows Media Encoder 9 (32-bit) - Windows Vista SP1/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1009409
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-094.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Windows Media Encoder. The vulnerability could allow remote code execution if an attacker convinces a user to open a legitimate Windows Media Profile (.prx) file that is located in the same network directory as a specially crafted library file. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-094: Vulnerability in Windows Media Encoder Could Allow Remote Code Execution - Windows Media Encoder 9 (32-bit) - Windows Vista SP1/SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1009410
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-094.mspx

***************************************************************
Title: MS10-094: Vulnerability in Windows Media Encoder Could Allow Remote Code Execution - Windows Media Encoder 9 (64-bit) - Windows Vista SP1/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1009411
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-094.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Windows Media Encoder. The vulnerability could allow remote code execution if an attacker convinces a user to open a legitimate Windows Media Profile (.prx) file that is located in the same network directory as a specially crafted library file. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-094: Vulnerability in Windows Media Encoder Could Allow Remote Code Execution - Windows Media Encoder 9 (64-bit) - Windows Vista SP1/SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1009412
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-094.mspx

***************************************************************
Title: MS10-094: Vulnerability in Windows Media Encoder Could Allow Remote Code Execution - Windows Media Encoder 9 (32-bit) - Windows Server 2008 (Japanese)
Severity: Important
Fixlet ID: 1009413
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-094.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Windows Media Encoder. The vulnerability could allow remote code execution if an attacker convinces a user to open a legitimate Windows Media Profile (.prx) file that is located in the same network directory as a specially crafted library file. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-094: Vulnerability in Windows Media Encoder Could Allow Remote Code Execution - Windows Media Encoder 9 (32-bit) - Windows Server 2008 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1009414
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-094.mspx

***************************************************************
Title: MS10-094: Vulnerability in Windows Media Encoder Could Allow Remote Code Execution - Windows Media Encoder 9 (32-bit) - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1009415
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-094.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Windows Media Encoder. The vulnerability could allow remote code execution if an attacker convinces a user to open a legitimate Windows Media Profile (.prx) file that is located in the same network directory as a specially crafted library file. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-094: Vulnerability in Windows Media Encoder Could Allow Remote Code Execution - Windows Media Encoder 9 (32-bit) - Windows Server 2008 Gold/SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1009416
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-094.mspx

***************************************************************
Title: MS10-094: Vulnerability in Windows Media Encoder Could Allow Remote Code Execution - Windows Media Encoder 9 (64-bit) - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1009417
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-094.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Windows Media Encoder. The vulnerability could allow remote code execution if an attacker convinces a user to open a legitimate Windows Media Profile (.prx) file that is located in the same network directory as a specially crafted library file. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-094: Vulnerability in Windows Media Encoder Could Allow Remote Code Execution - Windows Media Encoder 9 (64-bit) - Windows Server 2008 Gold/SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1009418
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-094.mspx

***************************************************************
Title: MS10-095: Vulnerability in Microsoft Windows Could Allow Remote Code Execution - Windows 7 (Japanese)
Severity: Important
Fixlet ID: 1009501
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-095.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a file type such as .eml and .rss (Windows Live Mail) or .wpost (Microsoft Live Writer) located in the same network folder as a specially crafted library file. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-095: Vulnerability in Microsoft Windows Could Allow Remote Code Execution - Windows 7 (x64) (Japanese)
Severity: Important
Fixlet ID: 1009503
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-095.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a file type such as .eml and .rss (Windows Live Mail) or .wpost (Microsoft Live Writer) located in the same network folder as a specially crafted library file. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-095: Vulnerability in Microsoft Windows Could Allow Remote Code Execution - Windows Server 2008 R2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1009505
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-095.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a file type such as .eml and .rss (Windows Live Mail) or .wpost (Microsoft Live Writer) located in the same network folder as a specially crafted library file. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-096: Vulnerability in Windows Address Book Could Allow Remote Code Execution - Windows XP SP3 (Japanese)
Severity: Important
Fixlet ID: 1009601
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-096.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Windows Address Book. The vulnerability could allow remote code execution if a user opens a Windows Address Book file located in the same network folder as a specially crafted library file. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-096: Vulnerability in Windows Address Book Could Allow Remote Code Execution - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1009602
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-096.mspx

***************************************************************
Title: MS10-096: Vulnerability in Windows Address Book Could Allow Remote Code Execution - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1009603
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-096.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Windows Address Book. The vulnerability could allow remote code execution if a user opens a Windows Address Book file located in the same network folder as a specially crafted library file. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-096: Vulnerability in Windows Address Book Could Allow Remote Code Execution - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1009604
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-096.mspx

***************************************************************
Title: MS10-096: Vulnerability in Windows Address Book Could Allow Remote Code Execution - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1009605
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-096.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Windows Address Book. The vulnerability could allow remote code execution if a user opens a Windows Address Book file located in the same network folder as a specially crafted library file. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-096: Vulnerability in Windows Address Book Could Allow Remote Code Execution - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1009606
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-096.mspx

***************************************************************
Title: MS10-096: Vulnerability in Windows Address Book Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1009607
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-096.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Windows Address Book. The vulnerability could allow remote code execution if a user opens a Windows Address Book file located in the same network folder as a specially crafted library file. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-096: Vulnerability in Windows Address Book Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1009608
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-096.mspx

***************************************************************
Title: MS10-096: Vulnerability in Windows Address Book Could Allow Remote Code Execution - Windows Vista SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 1009609
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-096.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Windows Address Book. The vulnerability could allow remote code execution if a user opens a Windows Address Book file located in the same network folder as a specially crafted library file. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-096: Vulnerability in Windows Address Book Could Allow Remote Code Execution - Windows Vista SP1/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1009611
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-096.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Windows Address Book. The vulnerability could allow remote code execution if a user opens a Windows Address Book file located in the same network folder as a specially crafted library file. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-096: Vulnerability in Windows Address Book Could Allow Remote Code Execution - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Important
Fixlet ID: 1009613
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-096.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Windows Address Book. The vulnerability could allow remote code execution if a user opens a Windows Address Book file located in the same network folder as a specially crafted library file. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-096: Vulnerability in Windows Address Book Could Allow Remote Code Execution - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1009615
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-096.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Windows Address Book. The vulnerability could allow remote code execution if a user opens a Windows Address Book file located in the same network folder as a specially crafted library file. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-096: Vulnerability in Windows Address Book Could Allow Remote Code Execution - Windows 7 (Japanese)
Severity: Important
Fixlet ID: 1009617
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-096.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Windows Address Book. The vulnerability could allow remote code execution if a user opens a Windows Address Book file located in the same network folder as a specially crafted library file. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-096: Vulnerability in Windows Address Book Could Allow Remote Code Execution - Windows 7 (x64) (Japanese)
Severity: Important
Fixlet ID: 1009619
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-096.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Windows Address Book. The vulnerability could allow remote code execution if a user opens a Windows Address Book file located in the same network folder as a specially crafted library file. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-096: Vulnerability in Windows Address Book Could Allow Remote Code Execution - Windows Server 2008 R2 Gold(x64) (Japanese)
Severity: Important
Fixlet ID: 1009621
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-096.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Windows Address Book. The vulnerability could allow remote code execution if a user opens a Windows Address Book file located in the same network folder as a specially crafted library file. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-097: Insecure Library Loading in Internet Connection Signup Wizard Could Allow Remote Code Execution - Windows XP SP3 (Japanese)
Severity: Important
Fixlet ID: 1009701
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-097.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in the Internet Connection Signup Wizard of Microsoft Windows. This security update is rated Important for all supported editions of Windows XP and Windows Server 2003. All supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-097: Insecure Library Loading in Internet Connection Signup Wizard Could Allow Remote Code Execution - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1009702
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-097.mspx

***************************************************************
Title: MS10-097: Insecure Library Loading in Internet Connection Signup Wizard Could Allow Remote Code Execution - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1009703
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-097.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in the Internet Connection Signup Wizard of Microsoft Windows. This security update is rated Important for all supported editions of Windows XP and Windows Server 2003. All supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-097: Insecure Library Loading in Internet Connection Signup Wizard Could Allow Remote Code Execution - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1009704
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-097.mspx

***************************************************************
Title: MS10-097: Insecure Library Loading in Internet Connection Signup Wizard Could Allow Remote Code Execution - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1009705
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-097.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in the Internet Connection Signup Wizard of Microsoft Windows. This security update is rated Important for all supported editions of Windows XP and Windows Server 2003. All supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-097: Insecure Library Loading in Internet Connection Signup Wizard Could Allow Remote Code Execution - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1009706
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-097.mspx

***************************************************************
Title: MS10-097: Insecure Library Loading in Internet Connection Signup Wizard Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1009707
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-097.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in the Internet Connection Signup Wizard of Microsoft Windows. This security update is rated Important for all supported editions of Windows XP and Windows Server 2003. All supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-097: Insecure Library Loading in Internet Connection Signup Wizard Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1009708
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-097.mspx

***************************************************************
Title: MS10-098: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows XP SP3 (Japanese)
Severity: Important
Fixlet ID: 1009801
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-098.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and several privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-098: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1009802
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-098.mspx

***************************************************************
Title: MS10-098: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1009803
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-098.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and several privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-098: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1009804
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-098.mspx

***************************************************************
Title: MS10-098: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1009805
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-098.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and several privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-098: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1009806
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-098.mspx

***************************************************************
Title: MS10-098: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1009807
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-098.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and several privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-098: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1009808
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-098.mspx

***************************************************************
Title: MS10-098: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Vista SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 1009809
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-098.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and several privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-098: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Vista SP1/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1009811
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-098.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and several privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-098: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Important
Fixlet ID: 1009813
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-098.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and several privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-098: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1009815
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-098.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and several privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-098: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows 7 (Japanese)
Severity: Important
Fixlet ID: 1009817
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-098.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and several privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-098: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows 7 (x64) (Japanese)
Severity: Important
Fixlet ID: 1009819
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-098.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and several privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-098: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Server 2008 R2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1009821
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-098.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and several privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-099: Vulnerability in Routing and Remote Access Could Allow Elevation of Privilege - Windows XP SP3 (Japanese)
Severity: Important
Fixlet ID: 1009901
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-099.mspx

Fixlet Description: Microsoft has released a security update that addresses a privately reported vulnerability in the Routing and Remote Access NDProxy component of Microsoft Windows. This security update is rated Important for all supported editions of Windows XP and Windows Server 2003. All supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-099: Vulnerability in Routing and Remote Access Could Allow Elevation of Privilege - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1009902
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-099.mspx

***************************************************************
Title: MS10-099: Vulnerability in Routing and Remote Access Could Allow Elevation of Privilege - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1009903
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-099.mspx

Fixlet Description: Microsoft has released a security update that addresses a privately reported vulnerability in the Routing and Remote Access NDProxy component of Microsoft Windows. This security update is rated Important for all supported editions of Windows XP and Windows Server 2003. All supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-099: Vulnerability in Routing and Remote Access Could Allow Elevation of Privilege - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1009904
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-099.mspx

***************************************************************
Title: MS10-099: Vulnerability in Routing and Remote Access Could Allow Elevation of Privilege - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1009905
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-099.mspx

Fixlet Description: Microsoft has released a security update that addresses a privately reported vulnerability in the Routing and Remote Access NDProxy component of Microsoft Windows. This security update is rated Important for all supported editions of Windows XP and Windows Server 2003. All supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-099: Vulnerability in Routing and Remote Access Could Allow Elevation of Privilege - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1009906
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-099.mspx

***************************************************************
Title: MS10-099: Vulnerability in Routing and Remote Access Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1009907
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-099.mspx

Fixlet Description: Microsoft has released a security update that addresses a privately reported vulnerability in the Routing and Remote Access NDProxy component of Microsoft Windows. This security update is rated Important for all supported editions of Windows XP and Windows Server 2003. All supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-099: Vulnerability in Routing and Remote Access Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1009908
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-099.mspx

***************************************************************
Title: MS10-100: Vulnerability in Consent User Interface Could Allow Elevation of Privilege - Windows Vista SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 1010001
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-100.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Consent User Interface (UI). The vulnerability could allow elevation of privilege if an attacker runs a specially crafted application on an affected system. An attacker must have valid logon credentials and the SeImpersonatePrivilege and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-100: Vulnerability in Consent User Interface Could Allow Elevation of Privilege - Windows Vista SP1/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1010003
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-100.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Consent User Interface (UI). The vulnerability could allow elevation of privilege if an attacker runs a specially crafted application on an affected system. An attacker must have valid logon credentials and the SeImpersonatePrivilege and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-100: Vulnerability in Consent User Interface Could Allow Elevation of Privilege - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Important
Fixlet ID: 1010005
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-100.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Consent User Interface (UI). The vulnerability could allow elevation of privilege if an attacker runs a specially crafted application on an affected system. An attacker must have valid logon credentials and the SeImpersonatePrivilege and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-100: Vulnerability in Consent User Interface Could Allow Elevation of Privilege - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1010007
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-100.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Consent User Interface (UI). The vulnerability could allow elevation of privilege if an attacker runs a specially crafted application on an affected system. An attacker must have valid logon credentials and the SeImpersonatePrivilege and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-100: Vulnerability in Consent User Interface Could Allow Elevation of Privilege - Windows 7 (Japanese)
Severity: Important
Fixlet ID: 1010009
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-100.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Consent User Interface (UI). The vulnerability could allow elevation of privilege if an attacker runs a specially crafted application on an affected system. An attacker must have valid logon credentials and the SeImpersonatePrivilege and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-100: Vulnerability in Consent User Interface Could Allow Elevation of Privilege - Windows 7 (x64) (Japanese)
Severity: Important
Fixlet ID: 1010011
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-100.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Consent User Interface (UI). The vulnerability could allow elevation of privilege if an attacker runs a specially crafted application on an affected system. An attacker must have valid logon credentials and the SeImpersonatePrivilege and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-100: Vulnerability in Consent User Interface Could Allow Elevation of Privilege - Windows Server 2008 R2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1010013
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-100.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Consent User Interface (UI). The vulnerability could allow elevation of privilege if an attacker runs a specially crafted application on an affected system. An attacker must have valid logon credentials and the SeImpersonatePrivilege and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-101: Vulnerability in Windows Netlogon Service Could Allow Denial of Service - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1010101
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-101.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Netlogon RPC Service on affected versions of Windows Server that are configured to serve as domain controllers. The vulnerability could allow denial of service if an attacker sends a specially crafted RPC packet to the Netlogon RPC Service interface on an affected system. An attacker requires administrator privileges on a machine that is joined to the same domain as the affected domain controller in order to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-101: Vulnerability in Windows Netlogon Service Could Allow Denial of Service - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1010102
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-101.mspx

***************************************************************
Title: MS10-101: Vulnerability in Windows Netlogon Service Could Allow Denial of Service - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1010103
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-101.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Netlogon RPC Service on affected versions of Windows Server that are configured to serve as domain controllers. The vulnerability could allow denial of service if an attacker sends a specially crafted RPC packet to the Netlogon RPC Service interface on an affected system. An attacker requires administrator privileges on a machine that is joined to the same domain as the affected domain controller in order to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-101: Vulnerability in Windows Netlogon Service Could Allow Denial of Service - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1010104
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-101.mspx

***************************************************************
Title: MS10-101: Vulnerability in Windows Netlogon Service Could Allow Denial of Service - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Important
Fixlet ID: 1010105
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-101.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Netlogon RPC Service on affected versions of Windows Server that are configured to serve as domain controllers. The vulnerability could allow denial of service if an attacker sends a specially crafted RPC packet to the Netlogon RPC Service interface on an affected system. An attacker requires administrator privileges on a machine that is joined to the same domain as the affected domain controller in order to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-101: Vulnerability in Windows Netlogon Service Could Allow Denial of Service - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1010107
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-101.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Netlogon RPC Service on affected versions of Windows Server that are configured to serve as domain controllers. The vulnerability could allow denial of service if an attacker sends a specially crafted RPC packet to the Netlogon RPC Service interface on an affected system. An attacker requires administrator privileges on a machine that is joined to the same domain as the affected domain controller in order to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-101: Vulnerability in Windows Netlogon Service Could Allow Denial of Service - Windows Server 2008 R2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1010109
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-101.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Netlogon RPC Service on affected versions of Windows Server that are configured to serve as domain controllers. The vulnerability could allow denial of service if an attacker sends a specially crafted RPC packet to the Netlogon RPC Service interface on an affected system. An attacker requires administrator privileges on a machine that is joined to the same domain as the affected domain controller in order to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-102: Vulnerability in Hyper-V Could Allow Denial of Service - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1010201
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-102.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Windows Server 2008 Hyper-V and Windows Server 2008 R2 Hyper-V. The vulnerability could allow denial of service if a specially crafted packet is sent to the VMBus by an authenticated user in one of the guest virtual machines hosted by the Hyper-V server. An attacker must have valid logon credentials and be able to send specially crafted content from a guest virtual machine to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-102: Vulnerability in Hyper-V Could Allow Denial of Service - Windows Server 2008 R2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1010203
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-102.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Windows Server 2008 Hyper-V and Windows Server 2008 R2 Hyper-V. The vulnerability could allow denial of service if a specially crafted packet is sent to the VMBus by an authenticated user in one of the guest virtual machines hosted by the Hyper-V server. An attacker must have valid logon credentials and be able to send specially crafted content from a guest virtual machine to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-103: Vulnerabilities in Microsoft Publisher Could Allow Remote Code Execution - Microsoft Publisher 2002 SP3 - Office XP SP3 (Local/Network Install) (Japanese)
Severity: Important
Fixlet ID: 1010301
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-103.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in Microsoft Publisher that could allow remote code execution if a user opens a specially crafted Publisher file. An attacker who successfully exploited any of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-103: Vulnerabilities in Microsoft Publisher Could Allow Remote Code Execution - Microsoft Publisher 2002 SP3 - Office XP SP3 (Administrative Install) (Japanese)
Severity: Important
Fixlet ID: 1010303
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-103.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in Microsoft Publisher that could allow remote code execution if a user opens a specially crafted Publisher file. An attacker who successfully exploited any of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-103: Vulnerabilities in Microsoft Publisher Could Allow Remote Code Execution - Microsoft Publisher 2003 SP3 - Office 2003 SP3 (Local/Network Install) (Japanese)
Severity: Important
Fixlet ID: 1010306
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-103.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in Microsoft Publisher that could allow remote code execution if a user opens a specially crafted Publisher file. An attacker who successfully exploited any of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-103: Vulnerabilities in Microsoft Publisher Could Allow Remote Code Execution - Microsoft Publisher 2003 SP3 - Office 2003 SP3 (Administrative Install) (Japanese)
Severity: Important
Fixlet ID: 1010308
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-103.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in Microsoft Publisher that could allow remote code execution if a user opens a specially crafted Publisher file. An attacker who successfully exploited any of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-103: Vulnerabilities in Microsoft Publisher Could Allow Remote Code Execution - Microsoft Publisher 2007 SP2 - Office 2007 SP2 (Japanese)
Severity: Important
Fixlet ID: 1010311
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-103.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in Microsoft Publisher that could allow remote code execution if a user opens a specially crafted Publisher file. An attacker who successfully exploited any of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-103: Vulnerabilities in Microsoft Publisher Could Allow Remote Code Execution - Microsoft Publisher 2010 - Office 2010 (Japanese)
Severity: Important
Fixlet ID: 1010316
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-103.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in Microsoft Publisher that could allow remote code execution if a user opens a specially crafted Publisher file. An attacker who successfully exploited any of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-103: Vulnerabilities in Microsoft Publisher Could Allow Remote Code Execution - Microsoft Publisher 2010 - Office 2010 (x64) (Japanese)
Severity: Important
Fixlet ID: 1010321
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-103.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in Microsoft Publisher that could allow remote code execution if a user opens a specially crafted Publisher file. An attacker who successfully exploited any of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-104: Vulnerability in Microsoft SharePoint Could Allow Remote Code Execution - Sharepoint Server 2007 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1010403
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-104.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft SharePoint. The vulnerability could allow remote code execution in the security context of a guest user if an attacker sent a specially crafted SOAP request to the Document Conversions Launcher Service in a SharePoint server environment that is using the Document Conversions Load Balancer Service. By default, the Document Conversions Load Balancer Service and Document Conversions Launcher Service are not enabled in Microsoft Office SharePoint Server 2007. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-104: Vulnerability in Microsoft SharePoint Could Allow Remote Code Execution - Sharepoint Server 2007 SP2 (Japanese)
Severity: Important
Fixlet ID: 1010405
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-104.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft SharePoint. The vulnerability could allow remote code execution in the security context of a guest user if an attacker sent a specially crafted SOAP request to the Document Conversions Launcher Service in a SharePoint server environment that is using the Document Conversions Load Balancer Service. By default, the Document Conversions Load Balancer Service and Document Conversions Launcher Service are not enabled in Microsoft Office SharePoint Server 2007. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-105: Vulnerabilities in Microsoft Office Graphics Filters Could Allow for Remote Code Execution - Office XP SP3 (Local/Network Install) (Japanese)
Severity: Important
Fixlet ID: 1010501
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-105.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves seven privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using Microsoft Office. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-105: Vulnerabilities in Microsoft Office Graphics Filters Could Allow for Remote Code Execution - Office XP SP3 (Administrative Install) (Japanese)
Severity: Important
Fixlet ID: 1010503
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-105.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves seven privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using Microsoft Office. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-105: Vulnerabilities in Microsoft Office Graphics Filters Could Allow for Remote Code Execution - Office 2003 SP3 (Local/Network Install) (Japanese)
Severity: Important
Fixlet ID: 1010506
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-105.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves seven privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using Microsoft Office. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-105: Vulnerabilities in Microsoft Office Graphics Filters Could Allow for Remote Code Execution - Office 2003 SP3 (Administrative Install) (Japanese)
Severity: Important
Fixlet ID: 1010508
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-105.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves seven privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using Microsoft Office. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-105: Vulnerabilities in Microsoft Office Graphics Filters Could Allow for Remote Code Execution - Office 2007 SP2 (Japanese)
Severity: None
Fixlet ID: 1010511
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-105.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves seven privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using Microsoft Office. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-105: Vulnerabilities in Microsoft Office Graphics Filters Could Allow for Remote Code Execution - Office 2010 (Japanese)
Severity: None
Fixlet ID: 1010516
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-105.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves seven privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using Microsoft Office. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-105: Vulnerabilities in Microsoft Office Graphics Filters Could Allow for Remote Code Execution - Office 2010 x64 (Japanese)
Severity: None
Fixlet ID: 1010521
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-105.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves seven privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using Microsoft Office. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-106: Vulnerability in Microsoft Exchange Server Could Allow Denial of Service - Microsoft Exchange Server 2007 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1010601
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-106.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Exchange Server. The vulnerability could allow denial of service if an authenticated attacker sent a specially crafted network message to a computer running the Exchange service. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.



More information about the BigFix-Announcements-Japan mailing list