[BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)'

autonotify at bigfix.com autonotify at bigfix.com
Thu Feb 11 02:31:31 PST 2010


Fixlet Site - 'Patches for Windows (Japanese)'
Current Version: 339	Published: Thu, 11 Feb 2010 00:52:26  GMT

New Fixlets:
============

***************************************************************
Title: MS10-003: Vulnerability in Microsoft Office (MSO) Could Allow Remote Code Execution - Office XP SP3 (Local/Network Install) (Japanese)
Severity: Important
Fixlet ID: 1000301
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-003.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-003: Vulnerability in Microsoft Office (MSO) Could Allow Remote Code Execution - Office XP SP3 (Administrative Install) (Japanese)
Severity: Important
Fixlet ID: 1000303
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-003.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-004: Vulnerabilities in Microsoft Office PowerPoint Could Allow Remote Code Execution - Office XP SP3 (Local/Network Install) (Japanese)
Severity: Important
Fixlet ID: 1000406
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-004.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves six privately reported vulnerabilities in Microsoft Office PowerPoint. The vulnerabilities could allow remote code execution if a user opens a specially crafted PowerPoint file. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-004: Vulnerabilities in Microsoft Office PowerPoint Could Allow Remote Code Execution - Office XP SP3 (Administrative Install) (Japanese)
Severity: Important
Fixlet ID: 1000408
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-004.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves six privately reported vulnerabilities in Microsoft Office PowerPoint. The vulnerabilities could allow remote code execution if a user opens a specially crafted PowerPoint file. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-004: Vulnerabilities in Microsoft Office PowerPoint Could Allow Remote Code Execution - PowerPoint 2003 SP3 (Local/Network Install) (Japanese)
Severity: Important
Fixlet ID: 1000411
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-004.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves six privately reported vulnerabilities in Microsoft Office PowerPoint. The vulnerabilities could allow remote code execution if a user opens a specially crafted PowerPoint file. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-004: Vulnerabilities in Microsoft Office PowerPoint Could Allow Remote Code Execution - PowerPoint 2003 SP3 (Administrative Install) (Japanese)
Severity: Important
Fixlet ID: 1000413
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-004.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves six privately reported vulnerabilities in Microsoft Office PowerPoint. The vulnerabilities could allow remote code execution if a user opens a specially crafted PowerPoint file. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-005: Vulnerability in Microsoft Paint Could Allow Remote Code Execution - Windows 2000 SP4 (Japanese)
Severity: Moderate
Fixlet ID: 1000501
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-005.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Paint. The vulnerability could allow remote code execution if a user viewed a specially crafted JPEG image file using Microsoft Paint. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-005: Vulnerability in Microsoft Paint Could Allow Remote Code Execution - Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1000502
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-005.mspx

***************************************************************
Title: MS10-005: Vulnerability in Microsoft Paint Could Allow Remote Code Execution - Windows XP SP2/SP3 (Japanese)
Severity: Moderate
Fixlet ID: 1000503
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-005.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Paint. The vulnerability could allow remote code execution if a user viewed a specially crafted JPEG image file using Microsoft Paint. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-005: Vulnerability in Microsoft Paint Could Allow Remote Code Execution - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1000504
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-005.mspx

***************************************************************
Title: MS10-005: Vulnerability in Microsoft Paint Could Allow Remote Code Execution - Windows XP SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1000505
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-005.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Paint. The vulnerability could allow remote code execution if a user viewed a specially crafted JPEG image file using Microsoft Paint. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-005: Vulnerability in Microsoft Paint Could Allow Remote Code Execution - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1000506
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-005.mspx

***************************************************************
Title: MS10-005: Vulnerability in Microsoft Paint Could Allow Remote Code Execution - Windows Server 2003 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1000507
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-005.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Paint. The vulnerability could allow remote code execution if a user viewed a specially crafted JPEG image file using Microsoft Paint. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-005: Vulnerability in Microsoft Paint Could Allow Remote Code Execution - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1000508
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-005.mspx

***************************************************************
Title: MS10-005: Vulnerability in Microsoft Paint Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1000509
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-005.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Paint. The vulnerability could allow remote code execution if a user viewed a specially crafted JPEG image file using Microsoft Paint. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-005: Vulnerability in Microsoft Paint Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1000510
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-005.mspx

***************************************************************
Title: MS10-006: Vulnerabilities in SMB Client Could Allow Remote Code Execution - Windows 2000 SP4 (Japanese)
Severity: Critical
Fixlet ID: 1000601
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-006.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker sent a specially crafted SMB response to a client-initiated SMB request. To exploit these vulnerabilities, an attacker must convince the user to initiate an SMB connection to a malicious SMB server. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-006: Vulnerabilities in SMB Client Could Allow Remote Code Execution - Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1000602
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-006.mspx

***************************************************************
Title: MS10-006: Vulnerabilities in SMB Client Could Allow Remote Code Execution - Windows XP SP2/SP3 (Japanese)
Severity: Critical
Fixlet ID: 1000603
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-006.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker sent a specially crafted SMB response to a client-initiated SMB request. To exploit these vulnerabilities, an attacker must convince the user to initiate an SMB connection to a malicious SMB server. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-006: Vulnerabilities in SMB Client Could Allow Remote Code Execution - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1000604
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-006.mspx

***************************************************************
Title: MS10-006: Vulnerabilities in SMB Client Could Allow Remote Code Execution - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1000605
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-006.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker sent a specially crafted SMB response to a client-initiated SMB request. To exploit these vulnerabilities, an attacker must convince the user to initiate an SMB connection to a malicious SMB server. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-006: Vulnerabilities in SMB Client Could Allow Remote Code Execution - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1000606
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-006.mspx

***************************************************************
Title: MS10-006: Vulnerabilities in SMB Client Could Allow Remote Code Execution - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1000607
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-006.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker sent a specially crafted SMB response to a client-initiated SMB request. To exploit these vulnerabilities, an attacker must convince the user to initiate an SMB connection to a malicious SMB server. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-006: Vulnerabilities in SMB Client Could Allow Remote Code Execution - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1000608
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-006.mspx

***************************************************************
Title: MS10-006: Vulnerabilities in SMB Client Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1000609
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-006.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker sent a specially crafted SMB response to a client-initiated SMB request. To exploit these vulnerabilities, an attacker must convince the user to initiate an SMB connection to a malicious SMB server. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-006: Vulnerabilities in SMB Client Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1000610
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-006.mspx

***************************************************************
Title: MS10-006: Vulnerabilities in SMB Client Could Allow Remote Code Execution - Windows Vista Gold/SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 1000611
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-006.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker sent a specially crafted SMB response to a client-initiated SMB request. To exploit these vulnerabilities, an attacker must convince the user to initiate an SMB connection to a malicious SMB server. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-006: Vulnerabilities in SMB Client Could Allow Remote Code Execution - Windows Vista Gold/SP1/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1000613
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-006.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker sent a specially crafted SMB response to a client-initiated SMB request. To exploit these vulnerabilities, an attacker must convince the user to initiate an SMB connection to a malicious SMB server. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-006: Vulnerabilities in SMB Client Could Allow Remote Code Execution - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Important
Fixlet ID: 1000615
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-006.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker sent a specially crafted SMB response to a client-initiated SMB request. To exploit these vulnerabilities, an attacker must convince the user to initiate an SMB connection to a malicious SMB server. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-006: Vulnerabilities in SMB Client Could Allow Remote Code Execution - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1000617
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-006.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker sent a specially crafted SMB response to a client-initiated SMB request. To exploit these vulnerabilities, an attacker must convince the user to initiate an SMB connection to a malicious SMB server. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-006: Vulnerabilities in SMB Client Could Allow Remote Code Execution - Windows 7 (Japanese)
Severity: Critical
Fixlet ID: 1000619
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-006.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker sent a specially crafted SMB response to a client-initiated SMB request. To exploit these vulnerabilities, an attacker must convince the user to initiate an SMB connection to a malicious SMB server. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-006: Vulnerabilities in SMB Client Could Allow Remote Code Execution - Windows 7 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1000621
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-006.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker sent a specially crafted SMB response to a client-initiated SMB request. To exploit these vulnerabilities, an attacker must convince the user to initiate an SMB connection to a malicious SMB server. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-006: Vulnerabilities in SMB Client Could Allow Remote Code Execution - Windows Server 2008 R2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1000623
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-006.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker sent a specially crafted SMB response to a client-initiated SMB request. To exploit these vulnerabilities, an attacker must convince the user to initiate an SMB connection to a malicious SMB server. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-007: Vulnerability in Windows Shell Handler Could Allow Remote Code Execution - Windows 2000 SP4 (Japanese)
Severity: Critical
Fixlet ID: 1000701
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-007.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows 2000, Windows XP, and Windows Server 2003. Other versions of Windows are not impacted by this security update. The vulnerability could allow remote code execution if an application, such as a Web browser, passes specially crafted data to the ShellExecute API function through the Windows Shell Handler After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-007: Vulnerability in Windows Shell Handler Could Allow Remote Code Execution - Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1000702
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-007.mspx

***************************************************************
Title: MS10-007: Vulnerability in Windows Shell Handler Could Allow Remote Code Execution - Windows XP SP2/SP3 (Japanese)
Severity: Critical
Fixlet ID: 1000703
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-007.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows 2000, Windows XP, and Windows Server 2003. Other versions of Windows are not impacted by this security update. The vulnerability could allow remote code execution if an application, such as a Web browser, passes specially crafted data to the ShellExecute API function through the Windows Shell Handler After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-007: Vulnerability in Windows Shell Handler Could Allow Remote Code Execution - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1000704
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-007.mspx

***************************************************************
Title: MS10-007: Vulnerability in Windows Shell Handler Could Allow Remote Code Execution - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1000705
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-007.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows 2000, Windows XP, and Windows Server 2003. Other versions of Windows are not impacted by this security update. The vulnerability could allow remote code execution if an application, such as a Web browser, passes specially crafted data to the ShellExecute API function through the Windows Shell Handler After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-007: Vulnerability in Windows Shell Handler Could Allow Remote Code Execution - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1000706
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-007.mspx

***************************************************************
Title: MS10-007: Vulnerability in Windows Shell Handler Could Allow Remote Code Execution - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1000707
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-007.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows 2000, Windows XP, and Windows Server 2003. Other versions of Windows are not impacted by this security update. The vulnerability could allow remote code execution if an application, such as a Web browser, passes specially crafted data to the ShellExecute API function through the Windows Shell Handler After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-007: Vulnerability in Windows Shell Handler Could Allow Remote Code Execution - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1000708
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-007.mspx

***************************************************************
Title: MS10-007: Vulnerability in Windows Shell Handler Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1000709
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-007.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows 2000, Windows XP, and Windows Server 2003. Other versions of Windows are not impacted by this security update. The vulnerability could allow remote code execution if an application, such as a Web browser, passes specially crafted data to the ShellExecute API function through the Windows Shell Handler After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-007: Vulnerability in Windows Shell Handler Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1000710
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-007.mspx

***************************************************************
Title: MS10-008: Cumulative Security Update of ActiveX Kill Bits - Windows 2000 SP4 (Japanese)
Severity: Critical
Fixlet ID: 1000801
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-008.mspx

Fixlet Description: Microsoft has released a security update that addresses a privately reported vulnerability for Microsoft software. This security update is rated Critical for all supported editions of Microsoft Windows 2000 and Windows XP, Important for all supported editions of Windows Vista and Windows 7, Moderate for all supported editions of Windows Server 2003, and Low for all supported editions of Windows Server 2008 and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-008: Cumulative Security Update of ActiveX Kill Bits - Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1000802
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-008.mspx

***************************************************************
Title: MS10-008: Cumulative Security Update of ActiveX Kill Bits - Windows XP SP2/SP3 (Japanese)
Severity: Critical
Fixlet ID: 1000803
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-008.mspx

Fixlet Description: Microsoft has released a security update that addresses a privately reported vulnerability for Microsoft software. This security update is rated Critical for all supported editions of Microsoft Windows 2000 and Windows XP, Important for all supported editions of Windows Vista and Windows 7, Moderate for all supported editions of Windows Server 2003, and Low for all supported editions of Windows Server 2008 and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-008: Cumulative Security Update of ActiveX Kill Bits - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1000804
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-008.mspx

***************************************************************
Title: MS10-008: Cumulative Security Update of ActiveX Kill Bits - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1000805
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-008.mspx

Fixlet Description: Microsoft has released a security update that addresses a privately reported vulnerability for Microsoft software. This security update is rated Critical for all supported editions of Microsoft Windows 2000 and Windows XP, Important for all supported editions of Windows Vista and Windows 7, Moderate for all supported editions of Windows Server 2003, and Low for all supported editions of Windows Server 2008 and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-008: Cumulative Security Update of ActiveX Kill Bits - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1000806
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-008.mspx

***************************************************************
Title: MS10-008: Cumulative Security Update of ActiveX Kill Bits - Windows Server 2003 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1000807
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-008.mspx

Fixlet Description: Microsoft has released a security update that addresses a privately reported vulnerability for Microsoft software. This security update is rated Critical for all supported editions of Microsoft Windows 2000 and Windows XP, Important for all supported editions of Windows Vista and Windows 7, Moderate for all supported editions of Windows Server 2003, and Low for all supported editions of Windows Server 2008 and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-008: Cumulative Security Update of ActiveX Kill Bits - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1000808
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-008.mspx

***************************************************************
Title: MS10-008: Cumulative Security Update of ActiveX Kill Bits - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1000809
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-008.mspx

Fixlet Description: Microsoft has released a security update that addresses a privately reported vulnerability for Microsoft software. This security update is rated Critical for all supported editions of Microsoft Windows 2000 and Windows XP, Important for all supported editions of Windows Vista and Windows 7, Moderate for all supported editions of Windows Server 2003, and Low for all supported editions of Windows Server 2008 and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-008: Cumulative Security Update of ActiveX Kill Bits - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1000810
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-008.mspx

***************************************************************
Title: MS10-008: Cumulative Security Update of ActiveX Kill Bits - Windows Vista Gold/SP1/SP2 (Japanese)
Severity: N/A
Fixlet ID: 1000811
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-008.mspx

Fixlet Description: Microsoft has released a security update that addresses a privately reported vulnerability for Microsoft software. This security update is rated Critical for all supported editions of Microsoft Windows 2000 and Windows XP, Important for all supported editions of Windows Vista and Windows 7, Moderate for all supported editions of Windows Server 2003, and Low for all supported editions of Windows Server 2008 and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-008: Cumulative Security Update of ActiveX Kill Bits - Windows Vista Gold/SP1/SP2 (x64) (Japanese)
Severity: N/A
Fixlet ID: 1000813
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-008.mspx

Fixlet Description: Microsoft has released a security update that addresses a privately reported vulnerability for Microsoft software. This security update is rated Critical for all supported editions of Microsoft Windows 2000 and Windows XP, Important for all supported editions of Windows Vista and Windows 7, Moderate for all supported editions of Windows Server 2003, and Low for all supported editions of Windows Server 2008 and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-008: Cumulative Security Update of ActiveX Kill Bits - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Low
Fixlet ID: 1000815
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-008.mspx

Fixlet Description: Microsoft has released a security update that addresses a privately reported vulnerability for Microsoft software. This security update is rated Critical for all supported editions of Microsoft Windows 2000 and Windows XP, Important for all supported editions of Windows Vista and Windows 7, Moderate for all supported editions of Windows Server 2003, and Low for all supported editions of Windows Server 2008 and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-008: Cumulative Security Update of ActiveX Kill Bits - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Low
Fixlet ID: 1000817
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-008.mspx

Fixlet Description: Microsoft has released a security update that addresses a privately reported vulnerability for Microsoft software. This security update is rated Critical for all supported editions of Microsoft Windows 2000 and Windows XP, Important for all supported editions of Windows Vista and Windows 7, Moderate for all supported editions of Windows Server 2003, and Low for all supported editions of Windows Server 2008 and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-008: Cumulative Security Update of ActiveX Kill Bits - Windows 7 (Japanese)
Severity: Important
Fixlet ID: 1000819
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-008.mspx

Fixlet Description: Microsoft has released a security update that addresses a privately reported vulnerability for Microsoft software. This security update is rated Critical for all supported editions of Microsoft Windows 2000 and Windows XP, Important for all supported editions of Windows Vista and Windows 7, Moderate for all supported editions of Windows Server 2003, and Low for all supported editions of Windows Server 2008 and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-008: Cumulative Security Update of ActiveX Kill Bits - Windows 7 (x64) (Japanese)
Severity: Important
Fixlet ID: 1000821
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-008.mspx

Fixlet Description: Microsoft has released a security update that addresses a privately reported vulnerability for Microsoft software. This security update is rated Critical for all supported editions of Microsoft Windows 2000 and Windows XP, Important for all supported editions of Windows Vista and Windows 7, Moderate for all supported editions of Windows Server 2003, and Low for all supported editions of Windows Server 2008 and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-008: Cumulative Security Update of ActiveX Kill Bits - Windows Server 2008 R2 (x64) (Japanese)
Severity: Low
Fixlet ID: 1000823
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-008.mspx

Fixlet Description: Microsoft has released a security update that addresses a privately reported vulnerability for Microsoft software. This security update is rated Critical for all supported editions of Microsoft Windows 2000 and Windows XP, Important for all supported editions of Windows Vista and Windows 7, Moderate for all supported editions of Windows Server 2003, and Low for all supported editions of Windows Server 2008 and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-009: Vulnerabilities in Windows TCP/IP Could Allow Remote Code Execution - Windows Vista Gold/SP1/SP2 (Japanese)
Severity: Critical
Fixlet ID: 1000901
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-009.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if specially crafted packets are sent to a computer with IPv6 enabled. An attacker could try to exploit the vulnerability by creating specially crafted ICMPv6 packets and sending the packets to a system with IPv6 enabled. This vulnerability may only be exploited if the attacker is on-link. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-009: Vulnerabilities in Windows TCP/IP Could Allow Remote Code Execution - Windows Vista Gold/SP1/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1000903
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-009.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if specially crafted packets are sent to a computer with IPv6 enabled. An attacker could try to exploit the vulnerability by creating specially crafted ICMPv6 packets and sending the packets to a system with IPv6 enabled. This vulnerability may only be exploited if the attacker is on-link. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-009: Vulnerabilities in Windows TCP/IP Could Allow Remote Code Execution - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Critical
Fixlet ID: 1000905
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-009.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if specially crafted packets are sent to a computer with IPv6 enabled. An attacker could try to exploit the vulnerability by creating specially crafted ICMPv6 packets and sending the packets to a system with IPv6 enabled. This vulnerability may only be exploited if the attacker is on-link. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-009: Vulnerabilities in Windows TCP/IP Could Allow Remote Code Execution - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1000907
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-009.mspx

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if specially crafted packets are sent to a computer with IPv6 enabled. An attacker could try to exploit the vulnerability by creating specially crafted ICMPv6 packets and sending the packets to a system with IPv6 enabled. This vulnerability may only be exploited if the attacker is on-link. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-010: Vulnerability in Windows Server 2008 Hyper-V Could Allow Denial of Service - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1001001
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-010.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Windows Server 2008 Hyper-V and Windows Server 2008 R2 Hyper-V. The vulnerability could allow denial of service if a malformed sequence of machine instructions is run by an authenticated user in one of the guest virtual machines hosted by the Hyper-V server. An attacker must have valid logon credentials and be able to log on locally into a guest virtual machine to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-010: Vulnerability in Windows Server 2008 Hyper-V Could Allow Denial of Service - Windows Server 2008 R2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1001003
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-010.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Windows Server 2008 Hyper-V and Windows Server 2008 R2 Hyper-V. The vulnerability could allow denial of service if a malformed sequence of machine instructions is run by an authenticated user in one of the guest virtual machines hosted by the Hyper-V server. An attacker must have valid logon credentials and be able to log on locally into a guest virtual machine to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-011: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows 2000 SP4 (Japanese)
Severity: Important
Fixlet ID: 1001101
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-011.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows Client/Server Run-time Subsystem (CSRSS) in Microsoft Windows 2000, Windows XP, and Windows Server 2003. Other versions of Windows are not affected. The vulnerability could allow elevation of privilege if an attacker logs on to the system and starts a specially crafted application designed to continue running after the attacker logs out. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-011: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1001102
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-011.mspx

***************************************************************
Title: MS10-011: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows XP SP2/SP3 (Japanese)
Severity: Important
Fixlet ID: 1001103
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-011.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows Client/Server Run-time Subsystem (CSRSS) in Microsoft Windows 2000, Windows XP, and Windows Server 2003. Other versions of Windows are not affected. The vulnerability could allow elevation of privilege if an attacker logs on to the system and starts a specially crafted application designed to continue running after the attacker logs out. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-011: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1001104
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-011.mspx

***************************************************************
Title: MS10-011: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1001105
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-011.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows Client/Server Run-time Subsystem (CSRSS) in Microsoft Windows 2000, Windows XP, and Windows Server 2003. Other versions of Windows are not affected. The vulnerability could allow elevation of privilege if an attacker logs on to the system and starts a specially crafted application designed to continue running after the attacker logs out. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-011: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1001106
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-011.mspx

***************************************************************
Title: MS10-011: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1001107
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-011.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows Client/Server Run-time Subsystem (CSRSS) in Microsoft Windows 2000, Windows XP, and Windows Server 2003. Other versions of Windows are not affected. The vulnerability could allow elevation of privilege if an attacker logs on to the system and starts a specially crafted application designed to continue running after the attacker logs out. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-011: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1001108
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-011.mspx

***************************************************************
Title: MS10-011: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1001109
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-011.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows Client/Server Run-time Subsystem (CSRSS) in Microsoft Windows 2000, Windows XP, and Windows Server 2003. Other versions of Windows are not affected. The vulnerability could allow elevation of privilege if an attacker logs on to the system and starts a specially crafted application designed to continue running after the attacker logs out. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-011: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1001110
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-011.mspx

***************************************************************
Title: MS10-012: Vulnerabilities in SMB Server Could Allow Remote Code Execution - Windows 2000 SP4 (Japanese)
Severity: Important
Fixlet ID: 1001201
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-012.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker created a specially crafted SMB packet and sent the packet to an affected system. Firewall best practices and standard default firewall configurations can help protect networks from attacks originating outside the enterprise perimeter that would attempt to exploit these vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-012: Vulnerabilities in SMB Server Could Allow Remote Code Execution - Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1001202
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-012.mspx

***************************************************************
Title: MS10-012: Vulnerabilities in SMB Server Could Allow Remote Code Execution - Windows XP SP2/SP3 (Japanese)
Severity: Important
Fixlet ID: 1001203
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-012.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker created a specially crafted SMB packet and sent the packet to an affected system. Firewall best practices and standard default firewall configurations can help protect networks from attacks originating outside the enterprise perimeter that would attempt to exploit these vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-012: Vulnerabilities in SMB Server Could Allow Remote Code Execution - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1001204
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-012.mspx

***************************************************************
Title: MS10-012: Vulnerabilities in SMB Server Could Allow Remote Code Execution - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1001205
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-012.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker created a specially crafted SMB packet and sent the packet to an affected system. Firewall best practices and standard default firewall configurations can help protect networks from attacks originating outside the enterprise perimeter that would attempt to exploit these vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-012: Vulnerabilities in SMB Server Could Allow Remote Code Execution - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1001206
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-012.mspx

***************************************************************
Title: MS10-012: Vulnerabilities in SMB Server Could Allow Remote Code Execution - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1001207
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-012.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker created a specially crafted SMB packet and sent the packet to an affected system. Firewall best practices and standard default firewall configurations can help protect networks from attacks originating outside the enterprise perimeter that would attempt to exploit these vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-012: Vulnerabilities in SMB Server Could Allow Remote Code Execution - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1001208
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-012.mspx

***************************************************************
Title: MS10-012: Vulnerabilities in SMB Server Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1001209
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-012.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker created a specially crafted SMB packet and sent the packet to an affected system. Firewall best practices and standard default firewall configurations can help protect networks from attacks originating outside the enterprise perimeter that would attempt to exploit these vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-012: Vulnerabilities in SMB Server Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1001210
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-012.mspx

***************************************************************
Title: MS10-012: Vulnerabilities in SMB Server Could Allow Remote Code Execution - Windows Vista Gold/SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 1001211
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-012.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker created a specially crafted SMB packet and sent the packet to an affected system. Firewall best practices and standard default firewall configurations can help protect networks from attacks originating outside the enterprise perimeter that would attempt to exploit these vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-012: Vulnerabilities in SMB Server Could Allow Remote Code Execution - Windows Vista Gold/SP1/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1001213
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-012.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker created a specially crafted SMB packet and sent the packet to an affected system. Firewall best practices and standard default firewall configurations can help protect networks from attacks originating outside the enterprise perimeter that would attempt to exploit these vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-012: Vulnerabilities in SMB Server Could Allow Remote Code Execution - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Important
Fixlet ID: 1001215
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-012.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker created a specially crafted SMB packet and sent the packet to an affected system. Firewall best practices and standard default firewall configurations can help protect networks from attacks originating outside the enterprise perimeter that would attempt to exploit these vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-012: Vulnerabilities in SMB Server Could Allow Remote Code Execution - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1001217
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-012.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker created a specially crafted SMB packet and sent the packet to an affected system. Firewall best practices and standard default firewall configurations can help protect networks from attacks originating outside the enterprise perimeter that would attempt to exploit these vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-012: Vulnerabilities in SMB Server Could Allow Remote Code Execution - Windows 7 (Japanese)
Severity: Important
Fixlet ID: 1001219
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-012.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker created a specially crafted SMB packet and sent the packet to an affected system. Firewall best practices and standard default firewall configurations can help protect networks from attacks originating outside the enterprise perimeter that would attempt to exploit these vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-012: Vulnerabilities in SMB Server Could Allow Remote Code Execution - Windows 7 (x64) (Japanese)
Severity: Important
Fixlet ID: 1001221
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-012.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker created a specially crafted SMB packet and sent the packet to an affected system. Firewall best practices and standard default firewall configurations can help protect networks from attacks originating outside the enterprise perimeter that would attempt to exploit these vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-012: Vulnerabilities in SMB Server Could Allow Remote Code Execution - Windows Server 2008 R2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1001223
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-012.mspx

Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker created a specially crafted SMB packet and sent the packet to an affected system. Firewall best practices and standard default firewall configurations can help protect networks from attacks originating outside the enterprise perimeter that would attempt to exploit these vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS10-013: Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution - AVI Filter - Windows 2000 SP4 (Japanese)
Severity: Critical
Fixlet ID: 1001301
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-013.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft DirectShow. The vulnerability could allow remote code execution if a user opened a specially crafted AVI file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-013: Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution - AVI Filter - Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1001302
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-013.mspx

***************************************************************
Title: MS10-013: Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution - Quartz - Windows 2000 SP4 (Japanese)
Severity: Critical
Fixlet ID: 1001303
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-013.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft DirectShow. The vulnerability could allow remote code execution if a user opened a specially crafted AVI file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-013: Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution - Quartz - Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1001304
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-013.mspx

***************************************************************
Title: MS10-013: Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution - Quartz in DirectX 9.0 - Windows 2000 SP4 (Japanese)
Severity: Critical
Fixlet ID: 1001305
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-013.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft DirectShow. The vulnerability could allow remote code execution if a user opened a specially crafted AVI file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-013: Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution - Quartz in DirectX 9.0 - Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1001306
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-013.mspx

***************************************************************
Title: MS10-013: Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution - AVI Filter - Windows XP SP2/SP3 (Japanese)
Severity: Critical
Fixlet ID: 1001307
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-013.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft DirectShow. The vulnerability could allow remote code execution if a user opened a specially crafted AVI file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-013: Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution - AVI Filter - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1001308
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-013.mspx

***************************************************************
Title: MS10-013: Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution - Quartz - Windows XP SP2/SP3 (Japanese)
Severity: Critical
Fixlet ID: 1001309
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-013.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft DirectShow. The vulnerability could allow remote code execution if a user opened a specially crafted AVI file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-013: Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution - Quartz - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1001310
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-013.mspx

***************************************************************
Title: MS10-013: Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution - AVI Filter - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1001311
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-013.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft DirectShow. The vulnerability could allow remote code execution if a user opened a specially crafted AVI file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-013: Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution - AVI Filter - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1001312
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-013.mspx

***************************************************************
Title: MS10-013: Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution - Quartz - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1001313
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-013.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft DirectShow. The vulnerability could allow remote code execution if a user opened a specially crafted AVI file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-013: Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution - Quartz - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1001314
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-013.mspx

***************************************************************
Title: MS10-013: Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution - AVI Filter - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1001315
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-013.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft DirectShow. The vulnerability could allow remote code execution if a user opened a specially crafted AVI file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-013: Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution - AVI Filter - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1001316
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-013.mspx

***************************************************************
Title: MS10-013: Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution - Quartz - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1001317
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-013.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft DirectShow. The vulnerability could allow remote code execution if a user opened a specially crafted AVI file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-013: Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution - Quartz - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1001318
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-013.mspx

***************************************************************
Title: MS10-013: Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution - AVI Filter - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1001319
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-013.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft DirectShow. The vulnerability could allow remote code execution if a user opened a specially crafted AVI file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-013: Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution - AVI Filter - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1001320
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-013.mspx

***************************************************************
Title: MS10-013: Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution - Quartz - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1001321
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-013.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft DirectShow. The vulnerability could allow remote code execution if a user opened a specially crafted AVI file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-013: Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution - Quartz - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1001322
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-013.mspx

***************************************************************
Title: MS10-013: Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution - Quartz - Windows Vista Gold/SP1/SP2 (Japanese)
Severity: Critical
Fixlet ID: 1001323
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-013.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft DirectShow. The vulnerability could allow remote code execution if a user opened a specially crafted AVI file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-013: Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution - Quartz - Windows Vista Gold/SP1/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1001325
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-013.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft DirectShow. The vulnerability could allow remote code execution if a user opened a specially crafted AVI file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-013: Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution - Quartz - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Critical
Fixlet ID: 1001327
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-013.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft DirectShow. The vulnerability could allow remote code execution if a user opened a specially crafted AVI file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-013: Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution - Quartz - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1001329
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-013.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft DirectShow. The vulnerability could allow remote code execution if a user opened a specially crafted AVI file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-013: Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution - Quartz - Windows 7 (Japanese)
Severity: Critical
Fixlet ID: 1001331
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-013.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft DirectShow. The vulnerability could allow remote code execution if a user opened a specially crafted AVI file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-013: Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution - Quartz - Windows 7 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1001333
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-013.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft DirectShow. The vulnerability could allow remote code execution if a user opened a specially crafted AVI file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-013: Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution - Quartz - Windows Server 2008 R2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1001335
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-013.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft DirectShow. The vulnerability could allow remote code execution if a user opened a specially crafted AVI file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-014: Vulnerability in Kerberos Could Allow Denial of Service - Windows 2000 Server SP4 (Japanese)
Severity: Important
Fixlet ID: 1001401
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-014.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if a specially crafted ticket renewal request is sent to the Windows Kerberos domain from an authenticated user on a trusted non-Windows Kerberos realm. The denial of service could persist until the domain controller is restarted. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-014: Vulnerability in Kerberos Could Allow Denial of Service - Windows 2000 Server SP4 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1001402
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-014.mspx

***************************************************************
Title: MS10-014: Vulnerability in Kerberos Could Allow Denial of Service - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1001403
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-014.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if a specially crafted ticket renewal request is sent to the Windows Kerberos domain from an authenticated user on a trusted non-Windows Kerberos realm. The denial of service could persist until the domain controller is restarted. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-014: Vulnerability in Kerberos Could Allow Denial of Service - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1001404
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-014.mspx

***************************************************************
Title: MS10-014: Vulnerability in Kerberos Could Allow Denial of Service - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1001405
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-014.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if a specially crafted ticket renewal request is sent to the Windows Kerberos domain from an authenticated user on a trusted non-Windows Kerberos realm. The denial of service could persist until the domain controller is restarted. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-014: Vulnerability in Kerberos Could Allow Denial of Service - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1001406
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-014.mspx

***************************************************************
Title: MS10-014: Vulnerability in Kerberos Could Allow Denial of Service - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Important
Fixlet ID: 1001407
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-014.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if a specially crafted ticket renewal request is sent to the Windows Kerberos domain from an authenticated user on a trusted non-Windows Kerberos realm. The denial of service could persist until the domain controller is restarted. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-014: Vulnerability in Kerberos Could Allow Denial of Service - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1001409
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-014.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if a specially crafted ticket renewal request is sent to the Windows Kerberos domain from an authenticated user on a trusted non-Windows Kerberos realm. The denial of service could persist until the domain controller is restarted. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-015: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows 2000 SP4 (Japanese)
Severity: Important
Fixlet ID: 1001501
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-015.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed and one privately reported vulnerability in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logged on to the system and then ran a specially crafted application. To exploit either vulnerability, an attacker must have valid logon credentials and be able to log on locally. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-015: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1001502
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-015.mspx

***************************************************************
Title: MS10-015: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows XP SP2/SP3 (Japanese)
Severity: Important
Fixlet ID: 1001503
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-015.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed and one privately reported vulnerability in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logged on to the system and then ran a specially crafted application. To exploit either vulnerability, an attacker must have valid logon credentials and be able to log on locally. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-015: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1001504
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-015.mspx

***************************************************************
Title: MS10-015: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1001505
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-015.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed and one privately reported vulnerability in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logged on to the system and then ran a specially crafted application. To exploit either vulnerability, an attacker must have valid logon credentials and be able to log on locally. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-015: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1001506
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-015.mspx

***************************************************************
Title: MS10-015: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1001507
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-015.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed and one privately reported vulnerability in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logged on to the system and then ran a specially crafted application. To exploit either vulnerability, an attacker must have valid logon credentials and be able to log on locally. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-015: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1001508
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-015.mspx

***************************************************************
Title: MS10-015: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1001509
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-015.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed and one privately reported vulnerability in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logged on to the system and then ran a specially crafted application. To exploit either vulnerability, an attacker must have valid logon credentials and be able to log on locally. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-015: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1001510
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-015.mspx

***************************************************************
Title: MS10-015: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Vista Gold/SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 1001511
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-015.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed and one privately reported vulnerability in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logged on to the system and then ran a specially crafted application. To exploit either vulnerability, an attacker must have valid logon credentials and be able to log on locally. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-015: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Vista Gold/SP1/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1001513
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-015.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed and one privately reported vulnerability in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logged on to the system and then ran a specially crafted application. To exploit either vulnerability, an attacker must have valid logon credentials and be able to log on locally. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-015: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Important
Fixlet ID: 1001515
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-015.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed and one privately reported vulnerability in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logged on to the system and then ran a specially crafted application. To exploit either vulnerability, an attacker must have valid logon credentials and be able to log on locally. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-015: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1001517
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-015.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed and one privately reported vulnerability in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logged on to the system and then ran a specially crafted application. To exploit either vulnerability, an attacker must have valid logon credentials and be able to log on locally. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-015: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows 7 (Japanese)
Severity: Important
Fixlet ID: 1001519
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-015.mspx

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed and one privately reported vulnerability in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logged on to the system and then ran a specially crafted application. To exploit either vulnerability, an attacker must have valid logon credentials and be able to log on locally. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.



More information about the BigFix-Announcements-Japan mailing list