[BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)'

autonotify at bigfix.com autonotify at bigfix.com
Fri Sep 17 02:30:30 PDT 2010


Fixlet Site - 'Patches for Windows (Japanese)'
Current Version: 379	Published: Thu, 16 Sep 2010 18:23:06  GMT

New Fixlets:
============

***************************************************************
Title: MS10-061: Vulnerability in Print Spooler Service Could Allow Remote Code Execution - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1006101
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-061.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in the Print Spooler service. The vulnerability could allow remote code execution if an attacker sends a specially crafted print request to a vulnerable system that has a print spooler interface exposed over RPC. By default, printers are not shared on any currently supported Windows operating system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-061: Vulnerability in Print Spooler Service Could Allow Remote Code Execution - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1006102
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-061.mspx

***************************************************************
Title: MS10-061: Vulnerability in Print Spooler Service Could Allow Remote Code Execution - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1006103
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-061.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in the Print Spooler service. The vulnerability could allow remote code execution if an attacker sends a specially crafted print request to a vulnerable system that has a print spooler interface exposed over RPC. By default, printers are not shared on any currently supported Windows operating system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-061: Vulnerability in Print Spooler Service Could Allow Remote Code Execution - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1006104
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-061.mspx

***************************************************************
Title: MS10-061: Vulnerability in Print Spooler Service Could Allow Remote Code Execution - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1006105
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-061.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in the Print Spooler service. The vulnerability could allow remote code execution if an attacker sends a specially crafted print request to a vulnerable system that has a print spooler interface exposed over RPC. By default, printers are not shared on any currently supported Windows operating system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-061: Vulnerability in Print Spooler Service Could Allow Remote Code Execution - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1006106
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-061.mspx

***************************************************************
Title: MS10-061: Vulnerability in Print Spooler Service Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1006107
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-061.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in the Print Spooler service. The vulnerability could allow remote code execution if an attacker sends a specially crafted print request to a vulnerable system that has a print spooler interface exposed over RPC. By default, printers are not shared on any currently supported Windows operating system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-061: Vulnerability in Print Spooler Service Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1006108
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-061.mspx

***************************************************************
Title: MS10-061: Vulnerability in Print Spooler Service Could Allow Remote Code Execution - Windows Vista SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 1006109
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-061.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in the Print Spooler service. The vulnerability could allow remote code execution if an attacker sends a specially crafted print request to a vulnerable system that has a print spooler interface exposed over RPC. By default, printers are not shared on any currently supported Windows operating system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-061: Vulnerability in Print Spooler Service Could Allow Remote Code Execution - Windows Vista SP1/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1006111
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-061.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in the Print Spooler service. The vulnerability could allow remote code execution if an attacker sends a specially crafted print request to a vulnerable system that has a print spooler interface exposed over RPC. By default, printers are not shared on any currently supported Windows operating system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-061: Vulnerability in Print Spooler Service Could Allow Remote Code Execution - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Important
Fixlet ID: 1006113
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-061.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in the Print Spooler service. The vulnerability could allow remote code execution if an attacker sends a specially crafted print request to a vulnerable system that has a print spooler interface exposed over RPC. By default, printers are not shared on any currently supported Windows operating system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-061: Vulnerability in Print Spooler Service Could Allow Remote Code Execution - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1006115
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-061.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in the Print Spooler service. The vulnerability could allow remote code execution if an attacker sends a specially crafted print request to a vulnerable system that has a print spooler interface exposed over RPC. By default, printers are not shared on any currently supported Windows operating system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-061: Vulnerability in Print Spooler Service Could Allow Remote Code Execution - Windows 7 Gold (Japanese)
Severity: Important
Fixlet ID: 1006117
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-061.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in the Print Spooler service. The vulnerability could allow remote code execution if an attacker sends a specially crafted print request to a vulnerable system that has a print spooler interface exposed over RPC. By default, printers are not shared on any currently supported Windows operating system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-061: Vulnerability in Print Spooler Service Could Allow Remote Code Execution - Windows 7 Gold (x64) (Japanese)
Severity: Important
Fixlet ID: 1006119
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-061.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in the Print Spooler service. The vulnerability could allow remote code execution if an attacker sends a specially crafted print request to a vulnerable system that has a print spooler interface exposed over RPC. By default, printers are not shared on any currently supported Windows operating system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-061: Vulnerability in Print Spooler Service Could Allow Remote Code Execution - Windows Server 2008 R2 Gold (x64) (Japanese)
Severity: Important
Fixlet ID: 1006121
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-061.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in the Print Spooler service. The vulnerability could allow remote code execution if an attacker sends a specially crafted print request to a vulnerable system that has a print spooler interface exposed over RPC. By default, printers are not shared on any currently supported Windows operating system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-062: Vulnerability in MPEG-4 Codec Could Allow Remote Code Execution - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1006201
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-062.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in MPEG-4 codec. The vulnerability could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-062: Vulnerability in MPEG-4 Codec Could Allow Remote Code Execution - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1006202
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-062.mspx

***************************************************************
Title: MS10-062: Vulnerability in MPEG-4 Codec Could Allow Remote Code Execution - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1006203
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-062.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in MPEG-4 codec. The vulnerability could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-062: Vulnerability in MPEG-4 Codec Could Allow Remote Code Execution - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1006204
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-062.mspx

***************************************************************
Title: MS10-062: Vulnerability in MPEG-4 Codec Could Allow Remote Code Execution - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1006205
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-062.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in MPEG-4 codec. The vulnerability could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-062: Vulnerability in MPEG-4 Codec Could Allow Remote Code Execution - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1006206
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-062.mspx

***************************************************************
Title: MS10-062: Vulnerability in MPEG-4 Codec Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1006207
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-062.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in MPEG-4 codec. The vulnerability could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-062: Vulnerability in MPEG-4 Codec Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1006208
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-062.mspx

***************************************************************
Title: MS10-062: Vulnerability in MPEG-4 Codec Could Allow Remote Code Execution - Windows Vista SP1/SP2 (Japanese)
Severity: Critical
Fixlet ID: 1006209
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-062.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in MPEG-4 codec. The vulnerability could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-062: Vulnerability in MPEG-4 Codec Could Allow Remote Code Execution - Windows Vista SP1/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1006211
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-062.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in MPEG-4 codec. The vulnerability could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-062: Vulnerability in MPEG-4 Codec Could Allow Remote Code Execution - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Critical
Fixlet ID: 1006213
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-062.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in MPEG-4 codec. The vulnerability could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-062: Vulnerability in MPEG-4 Codec Could Allow Remote Code Execution - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1006215
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-062.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in MPEG-4 codec. The vulnerability could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-063: Vulnerability in Unicode Scripts Processor Could Allow Remote Code Execution - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1006301
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-063.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Unicode Scripts Processor. The vulnerability could allow remote code execution if a user viewed a specially crafted document or Web page with an application that supports embedded OpenType fonts. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-063: Vulnerability in Unicode Scripts Processor Could Allow Remote Code Execution - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1006302
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-063.mspx

***************************************************************
Title: MS10-063: Vulnerability in Unicode Scripts Processor Could Allow Remote Code Execution - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1006303
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-063.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Unicode Scripts Processor. The vulnerability could allow remote code execution if a user viewed a specially crafted document or Web page with an application that supports embedded OpenType fonts. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-063: Vulnerability in Unicode Scripts Processor Could Allow Remote Code Execution - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1006304
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-063.mspx

***************************************************************
Title: MS10-063: Vulnerability in Unicode Scripts Processor Could Allow Remote Code Execution - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1006305
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-063.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Unicode Scripts Processor. The vulnerability could allow remote code execution if a user viewed a specially crafted document or Web page with an application that supports embedded OpenType fonts. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-063: Vulnerability in Unicode Scripts Processor Could Allow Remote Code Execution - Office XP SP3 (Local/Network Install) (Japanese)
Severity: Important
Fixlet ID: 1006306
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-063.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Unicode Scripts Processor. The vulnerability could allow remote code execution if a user viewed a specially crafted document or Web page with an application that supports embedded OpenType fonts. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-063: Vulnerability in Unicode Scripts Processor Could Allow Remote Code Execution - Office XP SP3 (Administrative Install) (Japanese)
Severity: Important
Fixlet ID: 1006308
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-063.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Unicode Scripts Processor. The vulnerability could allow remote code execution if a user viewed a specially crafted document or Web page with an application that supports embedded OpenType fonts. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-063: Vulnerability in Unicode Scripts Processor Could Allow Remote Code Execution - Windows Vista SP1/SP2 (Japanese)
Severity: Critical
Fixlet ID: 1006309
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-063.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Unicode Scripts Processor. The vulnerability could allow remote code execution if a user viewed a specially crafted document or Web page with an application that supports embedded OpenType fonts. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-063: Vulnerability in Unicode Scripts Processor Could Allow Remote Code Execution - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1006310
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-063.mspx

***************************************************************
Title: MS10-063: Vulnerability in Unicode Scripts Processor Could Allow Remote Code Execution - Windows Vista SP1/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1006311
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-063.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Unicode Scripts Processor. The vulnerability could allow remote code execution if a user viewed a specially crafted document or Web page with an application that supports embedded OpenType fonts. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-063: Vulnerability in Unicode Scripts Processor Could Allow Remote Code Execution - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Critical
Fixlet ID: 1006313
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-063.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Unicode Scripts Processor. The vulnerability could allow remote code execution if a user viewed a specially crafted document or Web page with an application that supports embedded OpenType fonts. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-063: Vulnerability in Unicode Scripts Processor Could Allow Remote Code Execution - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1006315
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-063.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Unicode Scripts Processor. The vulnerability could allow remote code execution if a user viewed a specially crafted document or Web page with an application that supports embedded OpenType fonts. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-063: Vulnerability in Unicode Scripts Processor Could Allow Remote Code Execution - Office 2003 SP3 (Local/Network Install) (Japanese)
Severity: Important
Fixlet ID: 1006316
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-063.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Unicode Scripts Processor. The vulnerability could allow remote code execution if a user viewed a specially crafted document or Web page with an application that supports embedded OpenType fonts. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-063: Vulnerability in Unicode Scripts Processor Could Allow Remote Code Execution - Office 2003 SP3 (Administrative Install) (Japanese)
Severity: Important
Fixlet ID: 1006318
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-063.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Unicode Scripts Processor. The vulnerability could allow remote code execution if a user viewed a specially crafted document or Web page with an application that supports embedded OpenType fonts. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-063: Vulnerability in Unicode Scripts Processor Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1006319
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-063.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Unicode Scripts Processor. The vulnerability could allow remote code execution if a user viewed a specially crafted document or Web page with an application that supports embedded OpenType fonts. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-063: Vulnerability in Unicode Scripts Processor Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1006320
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-063.mspx

***************************************************************
Title: MS10-063: Vulnerability in Unicode Scripts Processor Could Allow Remote Code Execution - Office 2007 SP2 (Japanese)
Severity: Important
Fixlet ID: 1006321
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-063.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Unicode Scripts Processor. The vulnerability could allow remote code execution if a user viewed a specially crafted document or Web page with an application that supports embedded OpenType fonts. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-064: Vulnerability in Microsoft Outlook Could Allow Remote Code Execution - Outlook 2002 SP3 (Local/Network Install) (Japanese)
Severity: Critical
Fixlet ID: 1006401
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-064.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability. The vulnerability could allow remote code execution if a user opened or previewed a specially crafted e-mail message using an affected version of Microsoft Outlook that is connected to an Exchange server with Online Mode. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-064: Vulnerability in Microsoft Outlook Could Allow Remote Code Execution - Outlook 2002 SP3 (Administrative Install) (Japanese)
Severity: Critical
Fixlet ID: 1006403
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-064.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability. The vulnerability could allow remote code execution if a user opened or previewed a specially crafted e-mail message using an affected version of Microsoft Outlook that is connected to an Exchange server with Online Mode. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-064: Vulnerability in Microsoft Outlook Could Allow Remote Code Execution - Outlook 2003 SP3 (Local/Network Install) (Japanese)
Severity: Important
Fixlet ID: 1006406
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-064.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability. The vulnerability could allow remote code execution if a user opened or previewed a specially crafted e-mail message using an affected version of Microsoft Outlook that is connected to an Exchange server with Online Mode. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-064: Vulnerability in Microsoft Outlook Could Allow Remote Code Execution - Outlook 2003 SP3 (Administrative Install) (Japanese)
Severity: Important
Fixlet ID: 1006408
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-064.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability. The vulnerability could allow remote code execution if a user opened or previewed a specially crafted e-mail message using an affected version of Microsoft Outlook that is connected to an Exchange server with Online Mode. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-064: Vulnerability in Microsoft Outlook Could Allow Remote Code Execution - Outlook 2007 SP2 (Japanese)
Severity: Important
Fixlet ID: 1006411
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-064.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability. The vulnerability could allow remote code execution if a user opened or previewed a specially crafted e-mail message using an affected version of Microsoft Outlook that is connected to an Exchange server with Online Mode. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS10-065: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Remote Code Execution - ASP - Windows XP SP3 (Japanese)
Severity: Important
Fixlet ID: 1006501
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-065.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Information Services (IIS). The most severe of these vulnerabilities could allow remote code execution if a client sends a specially crafted HTTP request to the server. An attacker who successfully exploited this vulnerability could take complete control of an affected system. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-065: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Remote Code Execution - ASP - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1006502
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-065.mspx

***************************************************************
Title: MS10-065: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Remote Code Execution - ASP - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1006503
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-065.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Information Services (IIS). The most severe of these vulnerabilities could allow remote code execution if a client sends a specially crafted HTTP request to the server. An attacker who successfully exploited this vulnerability could take complete control of an affected system. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-065: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Remote Code Execution - ASP - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1006504
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-065.mspx

***************************************************************
Title: MS10-065: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Remote Code Execution - ASP - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1006505
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-065.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Information Services (IIS). The most severe of these vulnerabilities could allow remote code execution if a client sends a specially crafted HTTP request to the server. An attacker who successfully exploited this vulnerability could take complete control of an affected system. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-065: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Remote Code Execution - ASP - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1006506
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-065.mspx

***************************************************************
Title: MS10-065: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Remote Code Execution - ASP - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1006507
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-065.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Information Services (IIS). The most severe of these vulnerabilities could allow remote code execution if a client sends a specially crafted HTTP request to the server. An attacker who successfully exploited this vulnerability could take complete control of an affected system. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-065: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Remote Code Execution - ASP - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1006508
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-065.mspx

***************************************************************
Title: MS10-065: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Remote Code Execution - ASP - Windows Vista SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 1006509
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-065.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Information Services (IIS). The most severe of these vulnerabilities could allow remote code execution if a client sends a specially crafted HTTP request to the server. An attacker who successfully exploited this vulnerability could take complete control of an affected system. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-065: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Remote Code Execution - ASP - Windows Vista SP1/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1006511
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-065.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Information Services (IIS). The most severe of these vulnerabilities could allow remote code execution if a client sends a specially crafted HTTP request to the server. An attacker who successfully exploited this vulnerability could take complete control of an affected system. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-065: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Remote Code Execution - ASP - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Important
Fixlet ID: 1006513
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-065.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Information Services (IIS). The most severe of these vulnerabilities could allow remote code execution if a client sends a specially crafted HTTP request to the server. An attacker who successfully exploited this vulnerability could take complete control of an affected system. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-065: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Remote Code Execution - ASP - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1006515
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-065.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Information Services (IIS). The most severe of these vulnerabilities could allow remote code execution if a client sends a specially crafted HTTP request to the server. An attacker who successfully exploited this vulnerability could take complete control of an affected system. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-065: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Remote Code Execution - ASP - Windows 7 (Japanese)
Severity: Important
Fixlet ID: 1006517
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-065.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Information Services (IIS). The most severe of these vulnerabilities could allow remote code execution if a client sends a specially crafted HTTP request to the server. An attacker who successfully exploited this vulnerability could take complete control of an affected system. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-065: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Remote Code Execution - ASP - Windows 7 (x64) (Japanese)
Severity: Important
Fixlet ID: 1006519
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-065.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Information Services (IIS). The most severe of these vulnerabilities could allow remote code execution if a client sends a specially crafted HTTP request to the server. An attacker who successfully exploited this vulnerability could take complete control of an affected system. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-065: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Remote Code Execution - ASP - Windows Server 2008 R2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1006521
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-065.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Information Services (IIS). The most severe of these vulnerabilities could allow remote code execution if a client sends a specially crafted HTTP request to the server. An attacker who successfully exploited this vulnerability could take complete control of an affected system. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-065: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Remote Code Execution - FastCGI - Windows 7 (Japanese)
Severity: Important
Fixlet ID: 1006523
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-065.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Information Services (IIS). The most severe of these vulnerabilities could allow remote code execution if a client sends a specially crafted HTTP request to the server. An attacker who successfully exploited this vulnerability could take complete control of an affected system. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-065: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Remote Code Execution - FastCGI - Windows 7 (x64) (Japanese)
Severity: Important
Fixlet ID: 1006525
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-065.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Information Services (IIS). The most severe of these vulnerabilities could allow remote code execution if a client sends a specially crafted HTTP request to the server. An attacker who successfully exploited this vulnerability could take complete control of an affected system. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-065: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Remote Code Execution - FastCGI - Windows Server 2008 R2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1006527
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-065.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Information Services (IIS). The most severe of these vulnerabilities could allow remote code execution if a client sends a specially crafted HTTP request to the server. An attacker who successfully exploited this vulnerability could take complete control of an affected system. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-065: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Remote Code Execution - Authentication - Windows XP SP3 (Japanese)
Severity: Important
Fixlet ID: 1006529
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-065.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Information Services (IIS). The most severe of these vulnerabilities could allow remote code execution if a client sends a specially crafted HTTP request to the server. An attacker who successfully exploited this vulnerability could take complete control of an affected system. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS10-065: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Remote Code Execution - Authentication - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1006530
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-065.mspx

***************************************************************
Title: MS10-066: Vulnerability in Remote Procedure Call Could Allow Remote Code Execution - Windows XP SP3 (Japanese)
Severity: Important
Fixlet ID: 1006601
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-066.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. This security update is rated Important for all supported editions of Windows XP and Windows Server 2003. All supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-066: Vulnerability in Remote Procedure Call Could Allow Remote Code Execution - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1006602
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-066.mspx

***************************************************************
Title: MS10-066: Vulnerability in Remote Procedure Call Could Allow Remote Code Execution - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1006603
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-066.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. This security update is rated Important for all supported editions of Windows XP and Windows Server 2003. All supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-066: Vulnerability in Remote Procedure Call Could Allow Remote Code Execution - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1006604
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-066.mspx

***************************************************************
Title: MS10-066: Vulnerability in Remote Procedure Call Could Allow Remote Code Execution - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1006605
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-066.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. This security update is rated Important for all supported editions of Windows XP and Windows Server 2003. All supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-066: Vulnerability in Remote Procedure Call Could Allow Remote Code Execution - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1006606
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-066.mspx

***************************************************************
Title: MS10-066: Vulnerability in Remote Procedure Call Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1006607
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-066.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. This security update is rated Important for all supported editions of Windows XP and Windows Server 2003. All supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-066: Vulnerability in Remote Procedure Call Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1006608
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-066.mspx

***************************************************************
Title: MS10-067: Vulnerability in WordPad Text Converters Could Allow Remote Code Execution - Windows XP SP3 (Japanese)
Severity: Important
Fixlet ID: 1006701
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-067.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. This security update is rated Important for all supported editions of Windows XP and Windows Server 2003. All supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-067: Vulnerability in WordPad Text Converters Could Allow Remote Code Execution - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1006702
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-067.mspx

***************************************************************
Title: MS10-067: Vulnerability in WordPad Text Converters Could Allow Remote Code Execution - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1006703
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-067.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. This security update is rated Important for all supported editions of Windows XP and Windows Server 2003. All supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-067: Vulnerability in WordPad Text Converters Could Allow Remote Code Execution - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1006704
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-067.mspx

***************************************************************
Title: MS10-067: Vulnerability in WordPad Text Converters Could Allow Remote Code Execution - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1006705
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-067.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. This security update is rated Important for all supported editions of Windows XP and Windows Server 2003. All supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-067: Vulnerability in WordPad Text Converters Could Allow Remote Code Execution - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1006706
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-067.mspx

***************************************************************
Title: MS10-067: Vulnerability in WordPad Text Converters Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1006707
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-067.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. This security update is rated Important for all supported editions of Windows XP and Windows Server 2003. All supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-067: Vulnerability in WordPad Text Converters Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1006708
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-067.mspx

***************************************************************
Title: MS10-068: Vulnerability in Local Security Authority Subsystem Service Could Allow Elevation of Privilege - ADAM - Windows XP SP3 (Japanese)
Severity: Important
Fixlet ID: 1006801
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-068.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Active Directory, Active Directory Application Mode (ADAM), and Active Directory Lightweight Directory Service (AD LDS). The vulnerability could allow elevation of privilege if an authenticated attacker sent specially crafted Lightweight Directory Access Protocol (LDAP) messages to a listening LSASS server. In order to successfully exploit this vulnerability, an attacker must have a member account within the target Windows domain. However, the attacker does not need to have a workstation joined to the Windows domain. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-068: Vulnerability in Local Security Authority Subsystem Service Could Allow Elevation of Privilege - ADAM - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1006802
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-068.mspx

***************************************************************
Title: MS10-068: Vulnerability in Local Security Authority Subsystem Service Could Allow Elevation of Privilege - ADAM - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1006803
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-068.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Active Directory, Active Directory Application Mode (ADAM), and Active Directory Lightweight Directory Service (AD LDS). The vulnerability could allow elevation of privilege if an authenticated attacker sent specially crafted Lightweight Directory Access Protocol (LDAP) messages to a listening LSASS server. In order to successfully exploit this vulnerability, an attacker must have a member account within the target Windows domain. However, the attacker does not need to have a workstation joined to the Windows domain. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-068: Vulnerability in Local Security Authority Subsystem Service Could Allow Elevation of Privilege - ADAM - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1006804
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-068.mspx

***************************************************************
Title: MS10-068: Vulnerability in Local Security Authority Subsystem Service Could Allow Elevation of Privilege - AD - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1006805
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-068.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Active Directory, Active Directory Application Mode (ADAM), and Active Directory Lightweight Directory Service (AD LDS). The vulnerability could allow elevation of privilege if an authenticated attacker sent specially crafted Lightweight Directory Access Protocol (LDAP) messages to a listening LSASS server. In order to successfully exploit this vulnerability, an attacker must have a member account within the target Windows domain. However, the attacker does not need to have a workstation joined to the Windows domain. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-068: Vulnerability in Local Security Authority Subsystem Service Could Allow Elevation of Privilege - AD - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1006806
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-068.mspx

***************************************************************
Title: MS10-068: Vulnerability in Local Security Authority Subsystem Service Could Allow Elevation of Privilege - ADAM - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1006807
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-068.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Active Directory, Active Directory Application Mode (ADAM), and Active Directory Lightweight Directory Service (AD LDS). The vulnerability could allow elevation of privilege if an authenticated attacker sent specially crafted Lightweight Directory Access Protocol (LDAP) messages to a listening LSASS server. In order to successfully exploit this vulnerability, an attacker must have a member account within the target Windows domain. However, the attacker does not need to have a workstation joined to the Windows domain. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-068: Vulnerability in Local Security Authority Subsystem Service Could Allow Elevation of Privilege - ADAM - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1006808
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-068.mspx

***************************************************************
Title: MS10-068: Vulnerability in Local Security Authority Subsystem Service Could Allow Elevation of Privilege - AD- Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1006809
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-068.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Active Directory, Active Directory Application Mode (ADAM), and Active Directory Lightweight Directory Service (AD LDS). The vulnerability could allow elevation of privilege if an authenticated attacker sent specially crafted Lightweight Directory Access Protocol (LDAP) messages to a listening LSASS server. In order to successfully exploit this vulnerability, an attacker must have a member account within the target Windows domain. However, the attacker does not need to have a workstation joined to the Windows domain. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-068: Vulnerability in Local Security Authority Subsystem Service Could Allow Elevation of Privilege - AD- Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1006810
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-068.mspx

***************************************************************
Title: MS10-068: Vulnerability in Local Security Authority Subsystem Service Could Allow Elevation of Privilege - ADAM - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1006811
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-068.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Active Directory, Active Directory Application Mode (ADAM), and Active Directory Lightweight Directory Service (AD LDS). The vulnerability could allow elevation of privilege if an authenticated attacker sent specially crafted Lightweight Directory Access Protocol (LDAP) messages to a listening LSASS server. In order to successfully exploit this vulnerability, an attacker must have a member account within the target Windows domain. However, the attacker does not need to have a workstation joined to the Windows domain. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-068: Vulnerability in Local Security Authority Subsystem Service Could Allow Elevation of Privilege - ADAM - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1006812
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-068.mspx

***************************************************************
Title: MS10-068: Vulnerability in Local Security Authority Subsystem Service Could Allow Elevation of Privilege - AD LDS - Windows Vista SP2 (Japanese)
Severity: Important
Fixlet ID: 1006813
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-068.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Active Directory, Active Directory Application Mode (ADAM), and Active Directory Lightweight Directory Service (AD LDS). The vulnerability could allow elevation of privilege if an authenticated attacker sent specially crafted Lightweight Directory Access Protocol (LDAP) messages to a listening LSASS server. In order to successfully exploit this vulnerability, an attacker must have a member account within the target Windows domain. However, the attacker does not need to have a workstation joined to the Windows domain. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-068: Vulnerability in Local Security Authority Subsystem Service Could Allow Elevation of Privilege - AD LDS - Windows Vista SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1006815
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-068.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Active Directory, Active Directory Application Mode (ADAM), and Active Directory Lightweight Directory Service (AD LDS). The vulnerability could allow elevation of privilege if an authenticated attacker sent specially crafted Lightweight Directory Access Protocol (LDAP) messages to a listening LSASS server. In order to successfully exploit this vulnerability, an attacker must have a member account within the target Windows domain. However, the attacker does not need to have a workstation joined to the Windows domain. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-068: Vulnerability in Local Security Authority Subsystem Service Could Allow Elevation of Privilege - AD LDS - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Important
Fixlet ID: 1006817
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-068.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Active Directory, Active Directory Application Mode (ADAM), and Active Directory Lightweight Directory Service (AD LDS). The vulnerability could allow elevation of privilege if an authenticated attacker sent specially crafted Lightweight Directory Access Protocol (LDAP) messages to a listening LSASS server. In order to successfully exploit this vulnerability, an attacker must have a member account within the target Windows domain. However, the attacker does not need to have a workstation joined to the Windows domain. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-068: Vulnerability in Local Security Authority Subsystem Service Could Allow Elevation of Privilege - AD LDS - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1006819
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-068.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Active Directory, Active Directory Application Mode (ADAM), and Active Directory Lightweight Directory Service (AD LDS). The vulnerability could allow elevation of privilege if an authenticated attacker sent specially crafted Lightweight Directory Access Protocol (LDAP) messages to a listening LSASS server. In order to successfully exploit this vulnerability, an attacker must have a member account within the target Windows domain. However, the attacker does not need to have a workstation joined to the Windows domain. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-068: Vulnerability in Local Security Authority Subsystem Service Could Allow Elevation of Privilege - AD LDS - Windows 7 (Japanese)
Severity: Important
Fixlet ID: 1006821
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-068.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Active Directory, Active Directory Application Mode (ADAM), and Active Directory Lightweight Directory Service (AD LDS). The vulnerability could allow elevation of privilege if an authenticated attacker sent specially crafted Lightweight Directory Access Protocol (LDAP) messages to a listening LSASS server. In order to successfully exploit this vulnerability, an attacker must have a member account within the target Windows domain. However, the attacker does not need to have a workstation joined to the Windows domain. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-068: Vulnerability in Local Security Authority Subsystem Service Could Allow Elevation of Privilege - AD LDS - Windows 7 (x64) (Japanese)
Severity: Important
Fixlet ID: 1006823
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-068.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Active Directory, Active Directory Application Mode (ADAM), and Active Directory Lightweight Directory Service (AD LDS). The vulnerability could allow elevation of privilege if an authenticated attacker sent specially crafted Lightweight Directory Access Protocol (LDAP) messages to a listening LSASS server. In order to successfully exploit this vulnerability, an attacker must have a member account within the target Windows domain. However, the attacker does not need to have a workstation joined to the Windows domain. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-068: Vulnerability in Local Security Authority Subsystem Service Could Allow Elevation of Privilege - AD LDS - Windows Server 2008 R2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1006825
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-068.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Active Directory, Active Directory Application Mode (ADAM), and Active Directory Lightweight Directory Service (AD LDS). The vulnerability could allow elevation of privilege if an authenticated attacker sent specially crafted Lightweight Directory Access Protocol (LDAP) messages to a listening LSASS server. In order to successfully exploit this vulnerability, an attacker must have a member account within the target Windows domain. However, the attacker does not need to have a workstation joined to the Windows domain. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-069: Vulnerability in Windows Client/Server Runtime Subsystem Could Allow Elevation of Privilege - Windows XP SP3 (Japanese)
Severity: Important
Fixlet ID: 1006901
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-069.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. This security update is rated Important for all supported editions of Windows XP and Windows Server 2003. All supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-069: Vulnerability in Windows Client/Server Runtime Subsystem Could Allow Elevation of Privilege - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1006902
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-069.mspx

***************************************************************
Title: MS10-069: Vulnerability in Windows Client/Server Runtime Subsystem Could Allow Elevation of Privilege - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1006903
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-069.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. This security update is rated Important for all supported editions of Windows XP and Windows Server 2003. All supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-069: Vulnerability in Windows Client/Server Runtime Subsystem Could Allow Elevation of Privilege - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1006904
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-069.mspx

***************************************************************
Title: MS10-069: Vulnerability in Windows Client/Server Runtime Subsystem Could Allow Elevation of Privilege - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1006905
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-069.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. This security update is rated Important for all supported editions of Windows XP and Windows Server 2003. All supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-069: Vulnerability in Windows Client/Server Runtime Subsystem Could Allow Elevation of Privilege - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1006906
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-069.mspx

***************************************************************
Title: MS10-069: Vulnerability in Windows Client/Server Runtime Subsystem Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1006907
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-069.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. This security update is rated Important for all supported editions of Windows XP and Windows Server 2003. All supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS10-069: Vulnerability in Windows Client/Server Runtime Subsystem Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1006908
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS10-069.mspx



More information about the BigFix-Announcements-Japan mailing list