[BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)'

autonotify at us.ibm.com autonotify at us.ibm.com
Sat Aug 13 02:32:11 PDT 2011


Fixlet Site - 'Patches for Windows (Japanese)'
Current Version: 433	Published: Fri, 12 Aug 2011 22:59:33  GMT

New Fixlets:
============

***************************************************************
Title: MS11-025: Vulnerability in Microsoft Foundation Class (MFC) Library Could Allow Remote Code Execution - Microsoft Visual Studio 2010 SP1 (Japanese)
Severity: Important
Fixlet ID: 1102535
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-025.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in certain applications built using the Microsoft Foundation Class (MFC) Library. The vulnerability could allow remote code execution if a user opens a legitimate file associated with such an affected application, and the file is located in the same network folder as a specially crafted library file. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by the affected application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-025: Vulnerability in Microsoft Foundation Class (MFC) Library Could Allow Remote Code Execution - Microsoft Visual C++ 2010 Redistributable Package SP1 (Japanese)
Severity: Important
Fixlet ID: 1102537
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-025.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in certain applications built using the Microsoft Foundation Class (MFC) Library. The vulnerability could allow remote code execution if a user opens a legitimate file associated with such an affected application, and the file is located in the same network folder as a specially crafted library file. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by the affected application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-025: Vulnerability in Microsoft Foundation Class (MFC) Library Could Allow Remote Code Execution - Microsoft Visual C++ 2010 Redistributable Package SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1102539
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-025.mspx

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in certain applications built using the Microsoft Foundation Class (MFC) Library. The vulnerability could allow remote code execution if a user opens a legitimate file associated with such an affected application, and the file is located in the same network folder as a specially crafted library file. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by the affected application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-043: Vulnerability in SMB Client Could Allow Remote Code Execution - Windows XP SP3 (v2, republished 8/9/2011) (Japanese)
Severity: Critical
Fixlet ID: 1104323
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-043.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker sent a specially crafted SMB response to a client-initiated SMB request. To exploit the vulnerability, an attacker must convince the user to initiate an SMB connection to a specially crafted SMB server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-043: Vulnerability in SMB Client Could Allow Remote Code Execution - Windows XP SP3 (v2, republished 8/9/2011) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1104324
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-043.mspx

***************************************************************
Title: MS11-043: Vulnerability in SMB Client Could Allow Remote Code Execution - Windows Server 2003 SP2 (v2, republished 8/9/2011) (Japanese)
Severity: Critical
Fixlet ID: 1104325
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-043.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker sent a specially crafted SMB response to a client-initiated SMB request. To exploit the vulnerability, an attacker must convince the user to initiate an SMB connection to a specially crafted SMB server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-043: Vulnerability in SMB Client Could Allow Remote Code Execution - Windows Server 2003 SP2 (v2, republished 8/9/2011) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1104326
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-043.mspx

***************************************************************
Title: MS11-043: Vulnerability in SMB Client Could Allow Remote Code Execution - Windows Vista SP1/SP2 (v2, republished 8/9/2011) (Japanese)
Severity: Critical
Fixlet ID: 1104327
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-043.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker sent a specially crafted SMB response to a client-initiated SMB request. To exploit the vulnerability, an attacker must convince the user to initiate an SMB connection to a specially crafted SMB server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-043: Vulnerability in SMB Client Could Allow Remote Code Execution - Windows Server 2008 Gold/SP2 (v2, republished 8/9/2011) (Japanese)
Severity: Critical
Fixlet ID: 1104329
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-043.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker sent a specially crafted SMB response to a client-initiated SMB request. To exploit the vulnerability, an attacker must convince the user to initiate an SMB connection to a specially crafted SMB server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-043: Vulnerability in SMB Client Could Allow Remote Code Execution - Windows 7 Gold/SP1 (v2, republished 8/9/2011) (Japanese)
Severity: Critical
Fixlet ID: 1104331
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-043.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker sent a specially crafted SMB response to a client-initiated SMB request. To exploit the vulnerability, an attacker must convince the user to initiate an SMB connection to a specially crafted SMB server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-043: Vulnerability in SMB Client Could Allow Remote Code Execution - Windows XP SP2 (x64) (v2, republished 8/9/2011) (Japanese)
Severity: Critical
Fixlet ID: 1104333
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-043.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker sent a specially crafted SMB response to a client-initiated SMB request. To exploit the vulnerability, an attacker must convince the user to initiate an SMB connection to a specially crafted SMB server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-043: Vulnerability in SMB Client Could Allow Remote Code Execution - Windows XP SP2 (x64) (v2, republished 8/9/2011) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1104334
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-043.mspx

***************************************************************
Title: MS11-043: Vulnerability in SMB Client Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (v2, republished 8/9/2011) (Japanese)
Severity: Critical
Fixlet ID: 1104335
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-043.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker sent a specially crafted SMB response to a client-initiated SMB request. To exploit the vulnerability, an attacker must convince the user to initiate an SMB connection to a specially crafted SMB server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-043: Vulnerability in SMB Client Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (v2, republished 8/9/2011) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1104336
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-043.mspx

***************************************************************
Title: MS11-043: Vulnerability in SMB Client Could Allow Remote Code Execution - Windows Vista SP1/SP2 (x64) (v2, republished 8/9/2011) (Japanese)
Severity: Critical
Fixlet ID: 1104337
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-043.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker sent a specially crafted SMB response to a client-initiated SMB request. To exploit the vulnerability, an attacker must convince the user to initiate an SMB connection to a specially crafted SMB server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-043: Vulnerability in SMB Client Could Allow Remote Code Execution - Windows Server 2008 Gold/SP2 (x64) (v2, republished 8/9/2011) (Japanese)
Severity: Critical
Fixlet ID: 1104339
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-043.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker sent a specially crafted SMB response to a client-initiated SMB request. To exploit the vulnerability, an attacker must convince the user to initiate an SMB connection to a specially crafted SMB server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-043: Vulnerability in SMB Client Could Allow Remote Code Execution - Windows 7 Gold/SP1 (x64) (v2, republished 8/9/2011) (Japanese)
Severity: Critical
Fixlet ID: 1104341
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-043.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker sent a specially crafted SMB response to a client-initiated SMB request. To exploit the vulnerability, an attacker must convince the user to initiate an SMB connection to a specially crafted SMB server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-043: Vulnerability in SMB Client Could Allow Remote Code Execution - Windows Server 2008 R2 Gold/SP1 (x64) (v2, republished 8/9/2011) (Japanese)
Severity: Critical
Fixlet ID: 1104343
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-043.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker sent a specially crafted SMB response to a client-initiated SMB request. To exploit the vulnerability, an attacker must convince the user to initiate an SMB connection to a specially crafted SMB server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-057: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1105701
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-057.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and two publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-057: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1105702
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-057.mspx

***************************************************************
Title: MS11-057: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1105703
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-057.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and two publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-057: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1105704
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-057.mspx

***************************************************************
Title: MS11-057: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1105705
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-057.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and two publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-057: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1105706
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-057.mspx

***************************************************************
Title: MS11-057: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1105707
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-057.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and two publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-057: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1105708
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-057.mspx

***************************************************************
Title: MS11-057: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1105709
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-057.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and two publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-057: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1105710
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-057.mspx

***************************************************************
Title: MS11-057: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1105711
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-057.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and two publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-057: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1105712
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-057.mspx

***************************************************************
Title: MS11-057: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1105713
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-057.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and two publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-057: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1105714
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-057.mspx

***************************************************************
Title: MS11-057: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1105715
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-057.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and two publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-057: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1105716
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-057.mspx

***************************************************************
Title: MS11-057: Cumulative Security Update for Internet Explorer - IE 7 - Windows Vista SP2 (Japanese)
Severity: Critical
Fixlet ID: 1105717
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-057.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and two publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-057: Cumulative Security Update for Internet Explorer - IE 7 - Windows Vista SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1105719
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-057.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and two publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-057: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2008 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1105721
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-057.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and two publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-057: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1105723
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-057.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and two publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-057: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1105725
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-057.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and two publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-057: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1105726
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-057.mspx

***************************************************************
Title: MS11-057: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1105727
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-057.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and two publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-057: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1105728
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-057.mspx

***************************************************************
Title: MS11-057: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1105729
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-057.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and two publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-057: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1105730
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-057.mspx

***************************************************************
Title: MS11-057: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1105731
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-057.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and two publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-057: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1105732
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-057.mspx

***************************************************************
Title: MS11-057: Cumulative Security Update for Internet Explorer - IE 8 - Windows Vista SP2 (Japanese)
Severity: Critical
Fixlet ID: 1105733
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-057.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and two publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-057: Cumulative Security Update for Internet Explorer - IE 8 - Windows Vista SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1105735
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-057.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and two publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-057: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2008 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1105737
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-057.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and two publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-057: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1105739
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-057.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and two publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-057: Cumulative Security Update for Internet Explorer - IE 8 - Windows 7 Gold/SP1 (Japanese)
Severity: Critical
Fixlet ID: 1105741
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-057.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and two publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-057: Cumulative Security Update for Internet Explorer - IE 8 - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1105743
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-057.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and two publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-057: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1105745
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-057.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and two publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-057: Cumulative Security Update for Internet Explorer - IE 9 - Windows Vista SP2 (Japanese)
Severity: Critical
Fixlet ID: 1105747
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-057.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and two publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-057: Cumulative Security Update for Internet Explorer - IE 9 - Windows Vista SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1105749
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-057.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and two publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-057: Cumulative Security Update for Internet Explorer - IE 9 - Windows Server 2008 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1105751
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-057.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and two publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-057: Cumulative Security Update for Internet Explorer - IE 9 - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1105753
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-057.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and two publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-057: Cumulative Security Update for Internet Explorer - IE 9 - Windows 7 Gold/SP1 (Japanese)
Severity: Critical
Fixlet ID: 1105755
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-057.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and two publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-057: Cumulative Security Update for Internet Explorer - IE 9 - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1105757
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-057.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and two publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-057: Cumulative Security Update for Internet Explorer - IE 9 - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1105759
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-057.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and two publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-058: Vulnerabilities in DNS Server Could Allow Remote Code Execution - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1105801
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-058.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows DNS server. The more severe of these vulnerabilities could allow remote code execution if an attacker registers a domain, creates an NAPTR DNS resource record, and then sends a specially crafted NAPTR query to the target DNS server. Servers that do not have the DNS role enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-058: Vulnerabilities in DNS Server Could Allow Remote Code Execution - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1105802
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-058.mspx

***************************************************************
Title: MS11-058: Vulnerabilities in DNS Server Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1105803
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-058.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows DNS server. The more severe of these vulnerabilities could allow remote code execution if an attacker registers a domain, creates an NAPTR DNS resource record, and then sends a specially crafted NAPTR query to the target DNS server. Servers that do not have the DNS role enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-058: Vulnerabilities in DNS Server Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1105804
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-058.mspx

***************************************************************
Title: MS11-058: Vulnerabilities in DNS Server Could Allow Remote Code Execution - Windows Server 2008 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1105805
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-058.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows DNS server. The more severe of these vulnerabilities could allow remote code execution if an attacker registers a domain, creates an NAPTR DNS resource record, and then sends a specially crafted NAPTR query to the target DNS server. Servers that do not have the DNS role enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-058: Vulnerabilities in DNS Server Could Allow Remote Code Execution - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1105807
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-058.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows DNS server. The more severe of these vulnerabilities could allow remote code execution if an attacker registers a domain, creates an NAPTR DNS resource record, and then sends a specially crafted NAPTR query to the target DNS server. Servers that do not have the DNS role enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-058: Vulnerabilities in DNS Server Could Allow Remote Code Execution - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1105809
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-058.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows DNS server. The more severe of these vulnerabilities could allow remote code execution if an attacker registers a domain, creates an NAPTR DNS resource record, and then sends a specially crafted NAPTR query to the target DNS server. Servers that do not have the DNS role enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-059: Vulnerability in Data Access Components Could Allow Remote Code Execution - Windows 7 Gold/SP1 (Japanese)
Severity: Important
Fixlet ID: 1105901
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-059.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a legitimate Excel file (such as a .xlsx file) that is located in the same network directory as a specially crafted library file. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-059: Vulnerability in Data Access Components Could Allow Remote Code Execution - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1105903
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-059.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a legitimate Excel file (such as a .xlsx file) that is located in the same network directory as a specially crafted library file. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-059: Vulnerability in Data Access Components Could Allow Remote Code Execution - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1105905
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-059.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a legitimate Excel file (such as a .xlsx file) that is located in the same network directory as a specially crafted library file. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-060: Vulnerabilities in Microsoft Visio Could Allow Remote Code Execution - Visio 2003 SP3 (Local/Network Installation) (Japanese)
Severity: Important
Fixlet ID: 1106001
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-060.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Visio. The vulnerabilities could allow remote code execution if a user opens a specially crafted Visio file. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS11-060: Vulnerabilities in Microsoft Visio Could Allow Remote Code Execution - Visio 2003 SP3 (Administrative Installation) (Japanese)
Severity: Important
Fixlet ID: 1106003
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-060.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Visio. The vulnerabilities could allow remote code execution if a user opens a specially crafted Visio file. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS11-060: Vulnerabilities in Microsoft Visio Could Allow Remote Code Execution - Visio 2007 SP2 (Japanese)
Severity: Important
Fixlet ID: 1106006
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-060.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Visio. The vulnerabilities could allow remote code execution if a user opens a specially crafted Visio file. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS11-060: Vulnerabilities in Microsoft Visio Could Allow Remote Code Execution - Visio 2010 SP1 (Japanese)
Severity: Important
Fixlet ID: 1106011
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-060.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Visio. The vulnerabilities could allow remote code execution if a user opens a specially crafted Visio file. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS11-060: Vulnerabilities in Microsoft Visio Could Allow Remote Code Execution - Visio 2010 SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1106016
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-060.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Visio. The vulnerabilities could allow remote code execution if a user opens a specially crafted Visio file. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS11-061: Vulnerability in Remote Desktop Web Access Could Allow Elevation of Privilege - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1106102
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-061.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Remote Desktop Web Access. The vulnerability is a cross-site scripting (XSS) vulnerability that could allow elevation of privilege, enabling an attacker to execute arbitrary commands on the site in the context of the target user. The XSS Filter in Internet Explorer 8 and Internet Explorer 9 prevents this attack for its users when browsing to a Remote Desktop Web Access server in the Internet Zone. The XSS Filter in Internet Explorer 8 and Internet Explorer 9 is not enabled by default in the Intranet Zone. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-062: Vulnerability in Remote Access Service NDISTAPI Driver Could Allow Elevation of Privilege - Windows XP SP3 (Japanese)
Severity: Important
Fixlet ID: 1106201
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-062.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in all supported editions of Windows XP and Windows Server 2003. This security update is rated Important for all supported editions of Windows XP and Windows Server 2003. Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-062: Vulnerability in Remote Access Service NDISTAPI Driver Could Allow Elevation of Privilege - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1106202
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-062.mspx

***************************************************************
Title: MS11-062: Vulnerability in Remote Access Service NDISTAPI Driver Could Allow Elevation of Privilege - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1106203
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-062.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in all supported editions of Windows XP and Windows Server 2003. This security update is rated Important for all supported editions of Windows XP and Windows Server 2003. Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-062: Vulnerability in Remote Access Service NDISTAPI Driver Could Allow Elevation of Privilege - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1106204
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-062.mspx

***************************************************************
Title: MS11-062: Vulnerability in Remote Access Service NDISTAPI Driver Could Allow Elevation of Privilege - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1106205
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-062.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in all supported editions of Windows XP and Windows Server 2003. This security update is rated Important for all supported editions of Windows XP and Windows Server 2003. Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-062: Vulnerability in Remote Access Service NDISTAPI Driver Could Allow Elevation of Privilege - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1106206
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-062.mspx

***************************************************************
Title: MS11-062: Vulnerability in Remote Access Service NDISTAPI Driver Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1106207
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-062.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in all supported editions of Windows XP and Windows Server 2003. This security update is rated Important for all supported editions of Windows XP and Windows Server 2003. Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-062: Vulnerability in Remote Access Service NDISTAPI Driver Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1106208
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-062.mspx

***************************************************************
Title: MS11-063: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows XP SP3 (Japanese)
Severity: Important
Fixlet ID: 1106301
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-063.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application designed to send a device event message to a higher-integrity process. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-063: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1106302
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-063.mspx

***************************************************************
Title: MS11-063: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1106303
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-063.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application designed to send a device event message to a higher-integrity process. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-063: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1106304
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-063.mspx

***************************************************************
Title: MS11-063: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1106305
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-063.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application designed to send a device event message to a higher-integrity process. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-063: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1106306
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-063.mspx

***************************************************************
Title: MS11-063: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1106307
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-063.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application designed to send a device event message to a higher-integrity process. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-063: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1106308
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-063.mspx

***************************************************************
Title: MS11-063: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Vista SP2 (Japanese)
Severity: Important
Fixlet ID: 1106309
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-063.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application designed to send a device event message to a higher-integrity process. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-063: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Vista SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1106311
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-063.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application designed to send a device event message to a higher-integrity process. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-063: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Server 2008 SP2 (Japanese)
Severity: Important
Fixlet ID: 1106313
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-063.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application designed to send a device event message to a higher-integrity process. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-063: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1106315
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-063.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application designed to send a device event message to a higher-integrity process. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-063: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows 7 Gold/SP1 (Japanese)
Severity: Important
Fixlet ID: 1106317
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-063.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application designed to send a device event message to a higher-integrity process. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-063: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1106319
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-063.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application designed to send a device event message to a higher-integrity process. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-063: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1106321
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-063.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application designed to send a device event message to a higher-integrity process. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-064: Vulnerabilities in TCP/IP Stack Could Allow Denial of Service - Windows Vista SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1106401
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-064.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow denial of service if an attacker sends a sequence of specially crafted Internet Control Message Protocol (ICMP) messages to a target system or sends a specially crafted URL request to a server that is serving Web content and has the URL-based Quality of Service (QoS) feature enabled After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-064: Vulnerabilities in TCP/IP Stack Could Allow Denial of Service - Windows Vista SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1106403
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-064.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow denial of service if an attacker sends a sequence of specially crafted Internet Control Message Protocol (ICMP) messages to a target system or sends a specially crafted URL request to a server that is serving Web content and has the URL-based Quality of Service (QoS) feature enabled After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-064: Vulnerabilities in TCP/IP Stack Could Allow Denial of Service - Windows Server 2008 SP2 (Japanese)
Severity: Important
Fixlet ID: 1106405
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-064.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow denial of service if an attacker sends a sequence of specially crafted Internet Control Message Protocol (ICMP) messages to a target system or sends a specially crafted URL request to a server that is serving Web content and has the URL-based Quality of Service (QoS) feature enabled After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-064: Vulnerabilities in TCP/IP Stack Could Allow Denial of Service - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1106407
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-064.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow denial of service if an attacker sends a sequence of specially crafted Internet Control Message Protocol (ICMP) messages to a target system or sends a specially crafted URL request to a server that is serving Web content and has the URL-based Quality of Service (QoS) feature enabled After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-064: Vulnerabilities in TCP/IP Stack Could Allow Denial of Service - Windows 7 Gold/SP1 (Japanese)
Severity: Moderate
Fixlet ID: 1106409
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-064.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow denial of service if an attacker sends a sequence of specially crafted Internet Control Message Protocol (ICMP) messages to a target system or sends a specially crafted URL request to a server that is serving Web content and has the URL-based Quality of Service (QoS) feature enabled After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-064: Vulnerabilities in TCP/IP Stack Could Allow Denial of Service - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1106411
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-064.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow denial of service if an attacker sends a sequence of specially crafted Internet Control Message Protocol (ICMP) messages to a target system or sends a specially crafted URL request to a server that is serving Web content and has the URL-based Quality of Service (QoS) feature enabled After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-064: Vulnerabilities in TCP/IP Stack Could Allow Denial of Service - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1106413
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-064.mspx

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow denial of service if an attacker sends a sequence of specially crafted Internet Control Message Protocol (ICMP) messages to a target system or sends a specially crafted URL request to a server that is serving Web content and has the URL-based Quality of Service (QoS) feature enabled After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-065: Vulnerability in Remote Desktop Protocol Could Allow Denial of Service - Windows XP SP3 (Japanese)
Severity: Moderate
Fixlet ID: 1106501
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-065.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Remote Desktop Protocol. The vulnerability could allow denial of service if an affected system received a sequence of specially crafted RDP packets. Microsoft has also received reports of limited, targeted attacks attempting to exploit this vulnerability. By default, the Remote Desktop Protocol (RDP) is not enabled on any Windows operating system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-065: Vulnerability in Remote Desktop Protocol Could Allow Denial of Service - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1106502
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-065.mspx

***************************************************************
Title: MS11-065: Vulnerability in Remote Desktop Protocol Could Allow Denial of Service - Windows XP SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1106503
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-065.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Remote Desktop Protocol. The vulnerability could allow denial of service if an affected system received a sequence of specially crafted RDP packets. Microsoft has also received reports of limited, targeted attacks attempting to exploit this vulnerability. By default, the Remote Desktop Protocol (RDP) is not enabled on any Windows operating system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-065: Vulnerability in Remote Desktop Protocol Could Allow Denial of Service - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1106504
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-065.mspx

***************************************************************
Title: MS11-065: Vulnerability in Remote Desktop Protocol Could Allow Denial of Service - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1106505
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-065.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Remote Desktop Protocol. The vulnerability could allow denial of service if an affected system received a sequence of specially crafted RDP packets. Microsoft has also received reports of limited, targeted attacks attempting to exploit this vulnerability. By default, the Remote Desktop Protocol (RDP) is not enabled on any Windows operating system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-065: Vulnerability in Remote Desktop Protocol Could Allow Denial of Service - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1106506
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-065.mspx

***************************************************************
Title: MS11-065: Vulnerability in Remote Desktop Protocol Could Allow Denial of Service - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1106507
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-065.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Remote Desktop Protocol. The vulnerability could allow denial of service if an affected system received a sequence of specially crafted RDP packets. Microsoft has also received reports of limited, targeted attacks attempting to exploit this vulnerability. By default, the Remote Desktop Protocol (RDP) is not enabled on any Windows operating system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-065: Vulnerability in Remote Desktop Protocol Could Allow Denial of Service - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1106508
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-065.mspx

***************************************************************
Title: MS11-066: Vulnerability in Microsoft Chart Control Could Allow Information Disclosure - Microsoft .NET Framework 4 - Windows XP SP3 / 2003 SP2 / Vista SP2 / 2008 SP2 / 7 Gold/SP1 (Japanese)
Severity: Important
Fixlet ID: 1106601
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-066.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in ASP.NET Chart controls. The vulnerability could allow information disclosure if an attacker sent a specially crafted GET request to an affected server hosting the Chart controls. Note that this vulnerability would not allow an attacker to execute code or to elevate the attacker's user rights directly, but it could be used to retrieve information that could be used to further compromise the affected system. Only web applications using Microsoft Chart Control are affected by this issue. Default installations of the .NET Framework are not affected. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-066: Vulnerability in Microsoft Chart Control Could Allow Information Disclosure - Microsoft .NET Framework 4 - Windows XP SP2 / 2003 SP2 / Vista SP2 /2008 SP2 / 7 Gold/SP1 / 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1106603
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-066.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in ASP.NET Chart controls. The vulnerability could allow information disclosure if an attacker sent a specially crafted GET request to an affected server hosting the Chart controls. Note that this vulnerability would not allow an attacker to execute code or to elevate the attacker's user rights directly, but it could be used to retrieve information that could be used to further compromise the affected system. Only web applications using Microsoft Chart Control are affected by this issue. Default installations of the .NET Framework are not affected. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-066: Vulnerability in Microsoft Chart Control Could Allow Information Disclosure - Chart Control for Microsoft .NET Framework 3.5 SP1 (Japanese)
Severity: Important
Fixlet ID: 1106605
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-066.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in ASP.NET Chart controls. The vulnerability could allow information disclosure if an attacker sent a specially crafted GET request to an affected server hosting the Chart controls. Note that this vulnerability would not allow an attacker to execute code or to elevate the attacker's user rights directly, but it could be used to retrieve information that could be used to further compromise the affected system. Only web applications using Microsoft Chart Control are affected by this issue. Default installations of the .NET Framework are not affected. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-067: Vulnerability in Microsoft Report Viewer Could Allow Information Disclosure - Visual Studio 2005 Service Pack 1 (Japanese)
Severity: Important
Fixlet ID: 1106701
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-067.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Report Viewer. The vulnerability could allow information disclosure if a user views a specially crafted Web page. In all cases, however, an attacker would have no way to force a user to visit the Web site. Instead, an attacker would have to persuade a user to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes the user to the vulnerable Web site. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-067: Vulnerability in Microsoft Report Viewer Could Allow Information Disclosure - Visual Studio 2005 Service Pack 1 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1106702
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-067.mspx

***************************************************************
Title: MS11-067: Vulnerability in Microsoft Report Viewer Could Allow Information Disclosure - Report viewer 2005 SP1 Redistributable Package (Japanese)
Severity: Important
Fixlet ID: 1106703
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-067.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Report Viewer. The vulnerability could allow information disclosure if a user views a specially crafted Web page. In all cases, however, an attacker would have no way to force a user to visit the Web site. Instead, an attacker would have to persuade a user to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes the user to the vulnerable Web site. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-068: Vulnerability in Windows Kernel Could Allow Denial of Service - Windows Vista SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1106801
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-068.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if a user visits a network share (or visits a Web site that points to a network share) containing a specially crafted file. In all cases, however, an attacker would have no way to force a user to visit such a network share or Web site. Instead, an attacker would have to convince a user to do so, typically by getting the user to click a link in an e-mail message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-068: Vulnerability in Windows Kernel Could Allow Denial of Service - Windows Vista SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1106803
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-068.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if a user visits a network share (or visits a Web site that points to a network share) containing a specially crafted file. In all cases, however, an attacker would have no way to force a user to visit such a network share or Web site. Instead, an attacker would have to convince a user to do so, typically by getting the user to click a link in an e-mail message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-068: Vulnerability in Windows Kernel Could Allow Denial of Service - Windows Server 2008 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1106805
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-068.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if a user visits a network share (or visits a Web site that points to a network share) containing a specially crafted file. In all cases, however, an attacker would have no way to force a user to visit such a network share or Web site. Instead, an attacker would have to convince a user to do so, typically by getting the user to click a link in an e-mail message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-068: Vulnerability in Windows Kernel Could Allow Denial of Service - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1106807
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-068.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if a user visits a network share (or visits a Web site that points to a network share) containing a specially crafted file. In all cases, however, an attacker would have no way to force a user to visit such a network share or Web site. Instead, an attacker would have to convince a user to do so, typically by getting the user to click a link in an e-mail message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-068: Vulnerability in Windows Kernel Could Allow Denial of Service - Windows 7 Gold/SP1 (Japanese)
Severity: Moderate
Fixlet ID: 1106809
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-068.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if a user visits a network share (or visits a Web site that points to a network share) containing a specially crafted file. In all cases, however, an attacker would have no way to force a user to visit such a network share or Web site. Instead, an attacker would have to convince a user to do so, typically by getting the user to click a link in an e-mail message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-068: Vulnerability in Windows Kernel Could Allow Denial of Service - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1106811
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-068.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if a user visits a network share (or visits a Web site that points to a network share) containing a specially crafted file. In all cases, however, an attacker would have no way to force a user to visit such a network share or Web site. Instead, an attacker would have to convince a user to do so, typically by getting the user to click a link in an e-mail message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-068: Vulnerability in Windows Kernel Could Allow Denial of Service - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1106813
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-068.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if a user visits a network share (or visits a Web site that points to a network share) containing a specially crafted file. In all cases, however, an attacker would have no way to force a user to visit such a network share or Web site. Instead, an attacker would have to convince a user to do so, typically by getting the user to click a link in an e-mail message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-069: Vulnerability in .NET Framework Could Allow Information Disclosure - Microsoft .NET Framework 2.0 SP2 - Windows XP SP3 / Server 2003 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1106901
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-069.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow information disclosure if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs). In a Web-based attack scenario, an attacker could host a Web site that contains a Web page that is used to exploit this vulnerability. In addition, compromised Web sites and Web sites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker's Web site. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-069: Vulnerability in .NET Framework Could Allow Information Disclosure - Microsoft .NET Framework 4 - Windows XP SP3 / 2003 SP2 / Vista SP2 / 2008 SP2 / 7 Gold/SP1 (Japanese)
Severity: Moderate
Fixlet ID: 1106903
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-069.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow information disclosure if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs). In a Web-based attack scenario, an attacker could host a Web site that contains a Web page that is used to exploit this vulnerability. In addition, compromised Web sites and Web sites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker's Web site. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-069: Vulnerability in .NET Framework Could Allow Information Disclosure - Microsoft .NET Framework 2.0 SP2 - Windows XP SP2 / Windows Server 2003 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1106905
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-069.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow information disclosure if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs). In a Web-based attack scenario, an attacker could host a Web site that contains a Web page that is used to exploit this vulnerability. In addition, compromised Web sites and Web sites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker's Web site. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-069: Vulnerability in .NET Framework Could Allow Information Disclosure - Microsoft .NET Framework 4 - Windows XP SP2 / 2003 SP2 / Vista SP2 / 2008 SP2 / 7 Gold/SP1 / 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1106907
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-069.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow information disclosure if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs). In a Web-based attack scenario, an attacker could host a Web site that contains a Web page that is used to exploit this vulnerability. In addition, compromised Web sites and Web sites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker's Web site. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-069: Vulnerability in .NET Framework Could Allow Information Disclosure - Microsoft .NET Framework 2.0 SP2 - Windows Vista SP2 / 2008 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1106909
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-069.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow information disclosure if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs). In a Web-based attack scenario, an attacker could host a Web site that contains a Web page that is used to exploit this vulnerability. In addition, compromised Web sites and Web sites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker's Web site. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-069: Vulnerability in .NET Framework Could Allow Information Disclosure - Microsoft .NET Framework 2.0 SP2 - Windows Vista SP2 / 2008 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1106911
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-069.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow information disclosure if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs). In a Web-based attack scenario, an attacker could host a Web site that contains a Web page that is used to exploit this vulnerability. In addition, compromised Web sites and Web sites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker's Web site. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-069: Vulnerability in .NET Framework Could Allow Information Disclosure - Microsoft .NET Framework 3.5.1 - Windows 7 Gold (Japanese)
Severity: Moderate
Fixlet ID: 1106913
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-069.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow information disclosure if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs). In a Web-based attack scenario, an attacker could host a Web site that contains a Web page that is used to exploit this vulnerability. In addition, compromised Web sites and Web sites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker's Web site. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-069: Vulnerability in .NET Framework Could Allow Information Disclosure - Microsoft .NET Framework 3.5.1 - Windows 7 SP1 (Japanese)
Severity: Moderate
Fixlet ID: 1106915
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-069.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow information disclosure if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs). In a Web-based attack scenario, an attacker could host a Web site that contains a Web page that is used to exploit this vulnerability. In addition, compromised Web sites and Web sites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker's Web site. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-069: Vulnerability in .NET Framework Could Allow Information Disclosure - Microsoft .NET Framework 3.5.1 - Windows 7 / 2008 R2 Gold (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1106917
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-069.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow information disclosure if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs). In a Web-based attack scenario, an attacker could host a Web site that contains a Web page that is used to exploit this vulnerability. In addition, compromised Web sites and Web sites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker's Web site. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-069: Vulnerability in .NET Framework Could Allow Information Disclosure - Microsoft .NET Framework 3.5.1 - Windows 7 SP1 / 2008 R2 SP1 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1106919
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-069.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow information disclosure if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs). In a Web-based attack scenario, an attacker could host a Web site that contains a Web page that is used to exploit this vulnerability. In addition, compromised Web sites and Web sites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker's Web site. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.



More information about the BigFix-Announcements-Japan mailing list