[BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)'

autonotify at bigfix.com autonotify at bigfix.com
Thu May 13 02:30:32 PDT 2010


Fixlet Site - 'Patches for Windows (Japanese)'
Current Version: 357	Published: Thu, 13 May 2010 01:09:54  GMT

New Fixlets:
============

***************************************************************
Title: MS10-030: Vulnerability in Outlook Express and Windows Mail Could Allow Remote Code Execution - OE 5.5 SP2 - Windows 2000 SP4 (Japanese)
Severity: Critical
Fixlet ID: 1003001
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-030.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Outlook Express, Windows Mail, and Windows Live Mail. The vulnerability could allow remote code execution if a user visits a malicious e-mail server. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-030: Vulnerability in Outlook Express and Windows Mail Could Allow Remote Code Execution - OE 5.5 SP2 - Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1003002
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-030.mspx

***************************************************************
Title: MS10-030: Vulnerability in Outlook Express and Windows Mail Could Allow Remote Code Execution - OE 6 SP1 - Windows 2000 SP4 (Japanese)
Severity: Critical
Fixlet ID: 1003003
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-030.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Outlook Express, Windows Mail, and Windows Live Mail. The vulnerability could allow remote code execution if a user visits a malicious e-mail server. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-030: Vulnerability in Outlook Express and Windows Mail Could Allow Remote Code Execution - OE 6 SP1 - Windows 2000 SP4 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1003004
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-030.mspx

***************************************************************
Title: MS10-030: Vulnerability in Outlook Express and Windows Mail Could Allow Remote Code Execution - OE 6 - Windows Live Mail - Windows XP SP2/SP3 (Japanese)
Severity: Important
Fixlet ID: 1003005
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-030.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Outlook Express, Windows Mail, and Windows Live Mail. The vulnerability could allow remote code execution if a user visits a malicious e-mail server. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-030: Vulnerability in Outlook Express and Windows Mail Could Allow Remote Code Execution - OE 6 - Windows Live Mail - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1003006
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-030.mspx

***************************************************************
Title: MS10-030: Vulnerability in Outlook Express and Windows Mail Could Allow Remote Code Execution - OE 6 - Windows Live Mail - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1003007
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-030.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Outlook Express, Windows Mail, and Windows Live Mail. The vulnerability could allow remote code execution if a user visits a malicious e-mail server. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-030: Vulnerability in Outlook Express and Windows Mail Could Allow Remote Code Execution - OE 6 - Windows Live Mail - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1003008
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-030.mspx

***************************************************************
Title: MS10-030: Vulnerability in Outlook Express and Windows Mail Could Allow Remote Code Execution - OE 6 - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1003009
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-030.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Outlook Express, Windows Mail, and Windows Live Mail. The vulnerability could allow remote code execution if a user visits a malicious e-mail server. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-030: Vulnerability in Outlook Express and Windows Mail Could Allow Remote Code Execution - OE 6 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1003010
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-030.mspx

***************************************************************
Title: MS10-030: Vulnerability in Outlook Express and Windows Mail Could Allow Remote Code Execution - OE 6 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1003011
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-030.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Outlook Express, Windows Mail, and Windows Live Mail. The vulnerability could allow remote code execution if a user visits a malicious e-mail server. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-030: Vulnerability in Outlook Express and Windows Mail Could Allow Remote Code Execution - OE 6 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1003012
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-030.mspx

***************************************************************
Title: MS10-030: Vulnerability in Outlook Express and Windows Mail Could Allow Remote Code Execution - Windows Mail - Windows Live Mail - Windows Vista SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 1003013
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-030.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Outlook Express, Windows Mail, and Windows Live Mail. The vulnerability could allow remote code execution if a user visits a malicious e-mail server. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-030: Vulnerability in Outlook Express and Windows Mail Could Allow Remote Code Execution - Windows Mail - Windows Live Mail - Windows Vista SP1/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1003015
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-030.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Outlook Express, Windows Mail, and Windows Live Mail. The vulnerability could allow remote code execution if a user visits a malicious e-mail server. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-030: Vulnerability in Outlook Express and Windows Mail Could Allow Remote Code Execution - Windows Mail - Windows Live Mail - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Important
Fixlet ID: 1003017
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-030.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Outlook Express, Windows Mail, and Windows Live Mail. The vulnerability could allow remote code execution if a user visits a malicious e-mail server. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-030: Vulnerability in Outlook Express and Windows Mail Could Allow Remote Code Execution - Windows Mail - Windows Live Mail - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1003019
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-030.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Outlook Express, Windows Mail, and Windows Live Mail. The vulnerability could allow remote code execution if a user visits a malicious e-mail server. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-030: Vulnerability in Outlook Express and Windows Mail Could Allow Remote Code Execution - Windows Mail - Windows Live Mail - Windows 7 (Japanese)
Severity: Important
Fixlet ID: 1003021
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-030.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Outlook Express, Windows Mail, and Windows Live Mail. The vulnerability could allow remote code execution if a user visits a malicious e-mail server. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-030: Vulnerability in Outlook Express and Windows Mail Could Allow Remote Code Execution - Windows Mail - Windows Live Mail - Windows 7 (x64) (Japanese)
Severity: Important
Fixlet ID: 1003023
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-030.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Outlook Express, Windows Mail, and Windows Live Mail. The vulnerability could allow remote code execution if a user visits a malicious e-mail server. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-030: Vulnerability in Outlook Express and Windows Mail Could Allow Remote Code Execution - Windows Mail - Windows Live Mail - Windows Server 2008 R2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1003025
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-030.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Outlook Express, Windows Mail, and Windows Live Mail. The vulnerability could allow remote code execution if a user visits a malicious e-mail server. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-031: Vulnerability in Microsoft Visual Basic for Applications Could Allow Remote Code Execution - Office XP SP3 (Local/Network Install) (Japanese)
Severity: Important
Fixlet ID: 1003101
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-031.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Visual Basic for Applications. The vulnerability could allow remote code execution if a host application opens and passes a specially crafted file to the Visual Basic for Applications runtime. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-031: Vulnerability in Microsoft Visual Basic for Applications Could Allow Remote Code Execution - Office XP SP3 (Administrative Install) (Japanese)
Severity: Important
Fixlet ID: 1003103
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-031.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Visual Basic for Applications. The vulnerability could allow remote code execution if a host application opens and passes a specially crafted file to the Visual Basic for Applications runtime. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-031: Vulnerability in Microsoft Visual Basic for Applications Could Allow Remote Code Execution - Microsoft VBA (Japanese)
Severity: Critical
Fixlet ID: 1003105
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-031.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Visual Basic for Applications. The vulnerability could allow remote code execution if a host application opens and passes a specially crafted file to the Visual Basic for Applications runtime. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

Important Note: MS10-031 states this patch is applicable only to supported versions of the Microsoft Visual Basic for Applications runtime (Vbe6.dll) but Bigfix testing has confirmed that this patch applies to systems that may not have the runtime installed. The Fixlet looks for Vbe6.dll on the system before applying the patch.

***************************************************************
Title: MS10-031: Vulnerability in Microsoft Visual Basic for Applications Could Allow Remote Code Execution - Office 2003 SP3 (Local/Network Install) (Japanese)
Severity: Important
Fixlet ID: 1003106
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-031.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Visual Basic for Applications. The vulnerability could allow remote code execution if a host application opens and passes a specially crafted file to the Visual Basic for Applications runtime. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-031: Vulnerability in Microsoft Visual Basic for Applications Could Allow Remote Code Execution - Office 2003 SP3 (Administrative Install) (Japanese)
Severity: Important
Fixlet ID: 1003108
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-031.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Visual Basic for Applications. The vulnerability could allow remote code execution if a host application opens and passes a specially crafted file to the Visual Basic for Applications runtime. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-031: Vulnerability in Microsoft Visual Basic for Applications Could Allow Remote Code Execution - Office 2007 SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 1003111
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-031.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Visual Basic for Applications. The vulnerability could allow remote code execution if a host application opens and passes a specially crafted file to the Visual Basic for Applications runtime. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-031: Vulnerability in Microsoft Visual Basic for Applications Could Allow Remote Code Execution - Microsoft VBA SDK (Japanese)
Severity: Critical
Fixlet ID: 1003113
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-031.mspx
Fixlet Link: http://summsoft.com/media/p/2135.aspx
Fixlet Link: http://summsoft.com/media/p/2134.aspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Visual Basic for Applications. The vulnerability could allow remote code execution if a host application opens and passes a specially crafted file to the Visual Basic for Applications runtime. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.



More information about the BigFix-Announcements-Japan mailing list