[BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)'

autonotify at us.ibm.com autonotify at us.ibm.com
Thu Dec 15 02:30:58 PST 2011


Fixlet Site - 'Patches for Windows (Japanese)'
Current Version: 452	Published: Thu, 15 Dec 2011 04:42:26  GMT

New Fixlets:
============

***************************************************************
Title: MS11-087: Vulnerability in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1108701
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-087

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted document or visits a malicious Web page that embeds TrueType font files. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-087: Vulnerability in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1108702
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-087

***************************************************************
Title: MS11-087: Vulnerability in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1108703
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-087

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted document or visits a malicious Web page that embeds TrueType font files. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-087: Vulnerability in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1108704
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-087

***************************************************************
Title: MS11-087: Vulnerability in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1108705
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-087

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted document or visits a malicious Web page that embeds TrueType font files. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-087: Vulnerability in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1108706
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-087

***************************************************************
Title: MS11-087: Vulnerability in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1108707
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-087

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted document or visits a malicious Web page that embeds TrueType font files. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-087: Vulnerability in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1108708
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-087

***************************************************************
Title: MS11-087: Vulnerability in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows Vista SP2 (Japanese)
Severity: Critical
Fixlet ID: 1108709
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-087

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted document or visits a malicious Web page that embeds TrueType font files. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-087: Vulnerability in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows Vista SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1108711
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-087

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted document or visits a malicious Web page that embeds TrueType font files. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-087: Vulnerability in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows Server 2008 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1108713
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-087

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted document or visits a malicious Web page that embeds TrueType font files. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-087: Vulnerability in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1108715
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-087

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted document or visits a malicious Web page that embeds TrueType font files. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-087: Vulnerability in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows 7 Gold/SP1 (Japanese)
Severity: Critical
Fixlet ID: 1108717
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-087

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted document or visits a malicious Web page that embeds TrueType font files. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-087: Vulnerability in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1108719
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-087

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted document or visits a malicious Web page that embeds TrueType font files. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-087: Vulnerability in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1108721
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-087

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted document or visits a malicious Web page that embeds TrueType font files. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-088: Vulnerability in Microsoft Office IME (Chinese) Could Allow Elevation of Privilege - Microsoft Pinyin IME 2010 - Office 2010 Gold/SP1 (Japanese)
Severity: Important
Fixlet ID: 1108801
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-088
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Office IME (Chinese). The vulnerability could allow elevation of privilege if a logged-on user performed specific actions on a system where an affected version of the Microsoft Pinyin (MSPY) Input Method Editor (IME) for Simplified Chinese is installed. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. Only implementations of Microsoft Pinyin IME 2010 are affected by this vulnerability. Other versions of Simplified Chinese IME and other implementations of IME are not affected. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS11-088: Vulnerability in Microsoft Office IME (Chinese) Could Allow Elevation of Privilege - Microsoft Pinyin IME 2010 - Office 2010 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1108806
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-088
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Office IME (Chinese). The vulnerability could allow elevation of privilege if a logged-on user performed specific actions on a system where an affected version of the Microsoft Pinyin (MSPY) Input Method Editor (IME) for Simplified Chinese is installed. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. Only implementations of Microsoft Pinyin IME 2010 are affected by this vulnerability. Other versions of Simplified Chinese IME and other implementations of IME are not affected. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS11-089: Vulnerability in Microsoft Office Could Allow Remote Code Execution - Office 2007 SP2/SP3 (Japanese)
Severity: Important
Fixlet ID: 1108901
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-089
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Word file. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS11-089: Vulnerability in Microsoft Office Could Allow Remote Code Execution - Office 2010 Gold/SP1 (Japanese)
Severity: Important
Fixlet ID: 1108906
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-089
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Word file. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS11-089: Vulnerability in Microsoft Office Could Allow Remote Code Execution - Office 2010 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1108911
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-089
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Word file. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS11-090: Cumulative Security Update of ActiveX Kill Bits - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1109001
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-090

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft software. The vulnerability could allow remote code execution if a user views a specially crafted Web page that uses a specific binary behavior in Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. This update also includes kill bits for four third-party ActiveX controls. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-090: Cumulative Security Update of ActiveX Kill Bits - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1109003
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-090

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft software. The vulnerability could allow remote code execution if a user views a specially crafted Web page that uses a specific binary behavior in Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. This update also includes kill bits for four third-party ActiveX controls. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-090: Cumulative Security Update of ActiveX Kill Bits - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1109005
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-090

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft software. The vulnerability could allow remote code execution if a user views a specially crafted Web page that uses a specific binary behavior in Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. This update also includes kill bits for four third-party ActiveX controls. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-090: Cumulative Security Update of ActiveX Kill Bits - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1109007
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-090

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft software. The vulnerability could allow remote code execution if a user views a specially crafted Web page that uses a specific binary behavior in Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. This update also includes kill bits for four third-party ActiveX controls. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-090: Cumulative Security Update of ActiveX Kill Bits - Windows Vista SP2 (Japanese)
Severity: <Unspecified>
Fixlet ID: 1109009
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-090

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft software. The vulnerability could allow remote code execution if a user views a specially crafted Web page that uses a specific binary behavior in Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. This update also includes kill bits for four third-party ActiveX controls. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-090: Cumulative Security Update of ActiveX Kill Bits - Windows Vista SP2 (x64) (Japanese)
Severity: <Unspecified>
Fixlet ID: 1109011
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-090

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft software. The vulnerability could allow remote code execution if a user views a specially crafted Web page that uses a specific binary behavior in Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. This update also includes kill bits for four third-party ActiveX controls. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-090: Cumulative Security Update of ActiveX Kill Bits - Windows Server 2008 SP2 (Japanese)
Severity: <Unspecified>
Fixlet ID: 1109013
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-090

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft software. The vulnerability could allow remote code execution if a user views a specially crafted Web page that uses a specific binary behavior in Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. This update also includes kill bits for four third-party ActiveX controls. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-090: Cumulative Security Update of ActiveX Kill Bits - Windows Server 2008 SP2 (x64) (Japanese)
Severity: <Unspecified>
Fixlet ID: 1109015
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-090

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft software. The vulnerability could allow remote code execution if a user views a specially crafted Web page that uses a specific binary behavior in Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. This update also includes kill bits for four third-party ActiveX controls. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-090: Cumulative Security Update of ActiveX Kill Bits - Windows 7 Gold/SP1 (Japanese)
Severity: <Unspecified>
Fixlet ID: 1109017
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-090

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft software. The vulnerability could allow remote code execution if a user views a specially crafted Web page that uses a specific binary behavior in Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. This update also includes kill bits for four third-party ActiveX controls. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-090: Cumulative Security Update of ActiveX Kill Bits - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: <Unspecified>
Fixlet ID: 1109019
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-090

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft software. The vulnerability could allow remote code execution if a user views a specially crafted Web page that uses a specific binary behavior in Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. This update also includes kill bits for four third-party ActiveX controls. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-090: Cumulative Security Update of ActiveX Kill Bits - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: <Unspecified>
Fixlet ID: 1109021
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-090

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft software. The vulnerability could allow remote code execution if a user views a specially crafted Web page that uses a specific binary behavior in Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. This update also includes kill bits for four third-party ActiveX controls. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-091: Vulnerabilities in Microsoft Publisher Could Allow Remote Code Execution - Publisher 2003 SP3 (Local/Network Installation) (Japanese)
Severity: Important
Fixlet ID: 1109101
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-091
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and three privately reported vulnerabilities in Microsoft Office. The most severe vulnerabilities could allow remote code execution if a user opens a specially crafted Publisher file. An attacker who successfully exploited any of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS11-091: Vulnerabilities in Microsoft Publisher Could Allow Remote Code Execution - Publisher 2003 SP3 - (Administrative Installation) (Japanese)
Severity: Important
Fixlet ID: 1109103
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-091
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and three privately reported vulnerabilities in Microsoft Office. The most severe vulnerabilities could allow remote code execution if a user opens a specially crafted Publisher file. An attacker who successfully exploited any of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS11-091: Vulnerabilities in Microsoft Publisher Could Allow Remote Code Execution - Microsoft Publisher 2007 SP2/SP3 - Office 2007 SP2/SP3 (Japanese)
Severity: Important
Fixlet ID: 1109106
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-091
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and three privately reported vulnerabilities in Microsoft Office. The most severe vulnerabilities could allow remote code execution if a user opens a specially crafted Publisher file. An attacker who successfully exploited any of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS11-092: Vulnerability in Windows Media Could Allow Remote Code Execution - Windows XP Media Center Edition 2005 SP3 (Japanese)
Severity: Critical
Fixlet ID: 1109201
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-092

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Windows Media Player and Windows Media Center. The vulnerability could allow remote code execution if a user opens a specially crafted Microsoft Digital Video Recording (.dvr-ms) file. In all cases, a user cannot be forced to open the file; for an attack to be successful, a user must be convinced to do so. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-092: Vulnerability in Windows Media Could Allow Remote Code Execution - Windows XP Media Center Edition 2005 SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1109202
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-092

***************************************************************
Title: MS11-092: Vulnerability in Windows Media Could Allow Remote Code Execution - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1109203
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-092

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Windows Media Player and Windows Media Center. The vulnerability could allow remote code execution if a user opens a specially crafted Microsoft Digital Video Recording (.dvr-ms) file. In all cases, a user cannot be forced to open the file; for an attack to be successful, a user must be convinced to do so. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-092: Vulnerability in Windows Media Could Allow Remote Code Execution - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1109204
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-092

***************************************************************
Title: MS11-092: Vulnerability in Windows Media Could Allow Remote Code Execution - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1109205
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-092

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Windows Media Player and Windows Media Center. The vulnerability could allow remote code execution if a user opens a specially crafted Microsoft Digital Video Recording (.dvr-ms) file. In all cases, a user cannot be forced to open the file; for an attack to be successful, a user must be convinced to do so. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-092: Vulnerability in Windows Media Could Allow Remote Code Execution - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1109206
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-092

***************************************************************
Title: MS11-092: Vulnerability in Windows Media Could Allow Remote Code Execution - Windows Vista SP2 (Japanese)
Severity: Critical
Fixlet ID: 1109207
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-092

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Windows Media Player and Windows Media Center. The vulnerability could allow remote code execution if a user opens a specially crafted Microsoft Digital Video Recording (.dvr-ms) file. In all cases, a user cannot be forced to open the file; for an attack to be successful, a user must be convinced to do so. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-092: Vulnerability in Windows Media Could Allow Remote Code Execution - Windows Vista SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1109209
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-092

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Windows Media Player and Windows Media Center. The vulnerability could allow remote code execution if a user opens a specially crafted Microsoft Digital Video Recording (.dvr-ms) file. In all cases, a user cannot be forced to open the file; for an attack to be successful, a user must be convinced to do so. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-092: Vulnerability in Windows Media Could Allow Remote Code Execution - Windows 7 Gold/SP1 (Japanese)
Severity: Critical
Fixlet ID: 1109211
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-092

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Windows Media Player and Windows Media Center. The vulnerability could allow remote code execution if a user opens a specially crafted Microsoft Digital Video Recording (.dvr-ms) file. In all cases, a user cannot be forced to open the file; for an attack to be successful, a user must be convinced to do so. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-092: Vulnerability in Windows Media Could Allow Remote Code Execution - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1109213
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-092

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Windows Media Player and Windows Media Center. The vulnerability could allow remote code execution if a user opens a specially crafted Microsoft Digital Video Recording (.dvr-ms) file. In all cases, a user cannot be forced to open the file; for an attack to be successful, a user must be convinced to do so. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-093: Vulnerability in OLE Could Allow Remote Code Execution - Windows XP SP3 (Japanese)
Severity: Important
Fixlet ID: 1109301
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-093

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in all supported editions of Windows XP and Windows Server 2003. This security update is rated Important for all supported editions of Windows XP and Windows Server 2003. Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-093: Vulnerability in OLE Could Allow Remote Code Execution - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1109302
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-093

***************************************************************
Title: MS11-093: Vulnerability in OLE Could Allow Remote Code Execution - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1109303
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-093

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in all supported editions of Windows XP and Windows Server 2003. This security update is rated Important for all supported editions of Windows XP and Windows Server 2003. Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-093: Vulnerability in OLE Could Allow Remote Code Execution - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1109304
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-093

***************************************************************
Title: MS11-093: Vulnerability in OLE Could Allow Remote Code Execution - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1109305
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-093

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in all supported editions of Windows XP and Windows Server 2003. This security update is rated Important for all supported editions of Windows XP and Windows Server 2003. Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-093: Vulnerability in OLE Could Allow Remote Code Execution - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1109306
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-093

***************************************************************
Title: MS11-093: Vulnerability in OLE Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1109307
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-093

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in all supported editions of Windows XP and Windows Server 2003. This security update is rated Important for all supported editions of Windows XP and Windows Server 2003. Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-093: Vulnerability in OLE Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1109308
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-093

***************************************************************
Title: MS11-094: Vulnerabilities in Microsoft PowerPoint Could Allow Remote Code Execution - Microsoft PowerPoint 2007 SP2 - Office 2007 SP2 (Japanese)
Severity: Important
Fixlet ID: 1109401
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-094
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a specially crafted PowerPoint file. An attacker who successfully exploited either of the vulnerabilities could take complete control of an affected system. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS11-094: Vulnerabilities in Microsoft PowerPoint Could Allow Remote Code Execution - Microsoft PowerPoint 2010  - Office 2010 Gold/SP1 (Japanese)
Severity: Important
Fixlet ID: 1109406
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-094
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a specially crafted PowerPoint file. An attacker who successfully exploited either of the vulnerabilities could take complete control of an affected system. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS11-094: Vulnerabilities in Microsoft PowerPoint Could Allow Remote Code Execution - Microsoft PowerPoint 2010 - Office 2010 Gold/SP1 (Japanese)
Severity: Important
Fixlet ID: 1109411
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-094
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a specially crafted PowerPoint file. An attacker who successfully exploited either of the vulnerabilities could take complete control of an affected system. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS11-094: Vulnerabilities in Microsoft PowerPoint Could Allow Remote Code Execution - Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2 (Japanese)
Severity: Important
Fixlet ID: 1109416
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-094
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a specially crafted PowerPoint file. An attacker who successfully exploited either of the vulnerabilities could take complete control of an affected system. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS11-094: Vulnerabilities in Microsoft PowerPoint Could Allow Remote Code Execution - PowerPoint Viewer 2007 SP2 (Japanese)
Severity: Important
Fixlet ID: 1109421
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-094

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a specially crafted PowerPoint file. An attacker who successfully exploited either of the vulnerabilities could take complete control of an affected system. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-095: Vulnerability in Active Directory Could Allow Remote Code Execution - ADAM - Windows XP SP3 (Japanese)
Severity: Important
Fixlet ID: 1109501
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-095

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Active Directory, Active Directory Application Mode (ADAM), and Active Directory Lightweight Directory Service (AD LDS). The vulnerability could allow remote code execution if an attacker logs on to an Active Directory domain and runs a specially crafted application. To exploit this vulnerability, an attacker would first need to acquire credentials to log on to an Active Directory domain. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-095: Vulnerability in Active Directory Could Allow Remote Code Execution - ADAM - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1109502
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-095

***************************************************************
Title: MS11-095: Vulnerability in Active Directory Could Allow Remote Code Execution - ADAM - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1109503
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-095

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Active Directory, Active Directory Application Mode (ADAM), and Active Directory Lightweight Directory Service (AD LDS). The vulnerability could allow remote code execution if an attacker logs on to an Active Directory domain and runs a specially crafted application. To exploit this vulnerability, an attacker would first need to acquire credentials to log on to an Active Directory domain. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-095: Vulnerability in Active Directory Could Allow Remote Code Execution - ADAM - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1109504
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-095

***************************************************************
Title: MS11-095: Vulnerability in Active Directory Could Allow Remote Code Execution - Active Directory - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1109505
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-095

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Active Directory, Active Directory Application Mode (ADAM), and Active Directory Lightweight Directory Service (AD LDS). The vulnerability could allow remote code execution if an attacker logs on to an Active Directory domain and runs a specially crafted application. To exploit this vulnerability, an attacker would first need to acquire credentials to log on to an Active Directory domain. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-095: Vulnerability in Active Directory Could Allow Remote Code Execution - Active Directory - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1109506
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-095

***************************************************************
Title: MS11-095: Vulnerability in Active Directory Could Allow Remote Code Execution - ADAM - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1109507
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-095

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Active Directory, Active Directory Application Mode (ADAM), and Active Directory Lightweight Directory Service (AD LDS). The vulnerability could allow remote code execution if an attacker logs on to an Active Directory domain and runs a specially crafted application. To exploit this vulnerability, an attacker would first need to acquire credentials to log on to an Active Directory domain. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-095: Vulnerability in Active Directory Could Allow Remote Code Execution - ADAM - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1109508
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-095

***************************************************************
Title: MS11-095: Vulnerability in Active Directory Could Allow Remote Code Execution - Active Directory - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1109509
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-095

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Active Directory, Active Directory Application Mode (ADAM), and Active Directory Lightweight Directory Service (AD LDS). The vulnerability could allow remote code execution if an attacker logs on to an Active Directory domain and runs a specially crafted application. To exploit this vulnerability, an attacker would first need to acquire credentials to log on to an Active Directory domain. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-095: Vulnerability in Active Directory Could Allow Remote Code Execution - Active Directory - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1109510
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-095

***************************************************************
Title: MS11-095: Vulnerability in Active Directory Could Allow Remote Code Execution - ADAM - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1109511
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-095

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Active Directory, Active Directory Application Mode (ADAM), and Active Directory Lightweight Directory Service (AD LDS). The vulnerability could allow remote code execution if an attacker logs on to an Active Directory domain and runs a specially crafted application. To exploit this vulnerability, an attacker would first need to acquire credentials to log on to an Active Directory domain. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-095: Vulnerability in Active Directory Could Allow Remote Code Execution - ADAM - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1109512
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-095

***************************************************************
Title: MS11-095: Vulnerability in Active Directory Could Allow Remote Code Execution - AD LDS - Windows Vista SP2 (Japanese)
Severity: Important
Fixlet ID: 1109513
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-095

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Active Directory, Active Directory Application Mode (ADAM), and Active Directory Lightweight Directory Service (AD LDS). The vulnerability could allow remote code execution if an attacker logs on to an Active Directory domain and runs a specially crafted application. To exploit this vulnerability, an attacker would first need to acquire credentials to log on to an Active Directory domain. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-095: Vulnerability in Active Directory Could Allow Remote Code Execution - AD LDS - Windows Vista SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1109515
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-095

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Active Directory, Active Directory Application Mode (ADAM), and Active Directory Lightweight Directory Service (AD LDS). The vulnerability could allow remote code execution if an attacker logs on to an Active Directory domain and runs a specially crafted application. To exploit this vulnerability, an attacker would first need to acquire credentials to log on to an Active Directory domain. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-095: Vulnerability in Active Directory Could Allow Remote Code Execution - AD LDS - Windows Server 2008 SP2 (Japanese)
Severity: Important
Fixlet ID: 1109517
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-095

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Active Directory, Active Directory Application Mode (ADAM), and Active Directory Lightweight Directory Service (AD LDS). The vulnerability could allow remote code execution if an attacker logs on to an Active Directory domain and runs a specially crafted application. To exploit this vulnerability, an attacker would first need to acquire credentials to log on to an Active Directory domain. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-095: Vulnerability in Active Directory Could Allow Remote Code Execution - AD LDS - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1109519
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-095

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Active Directory, Active Directory Application Mode (ADAM), and Active Directory Lightweight Directory Service (AD LDS). The vulnerability could allow remote code execution if an attacker logs on to an Active Directory domain and runs a specially crafted application. To exploit this vulnerability, an attacker would first need to acquire credentials to log on to an Active Directory domain. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-095: Vulnerability in Active Directory Could Allow Remote Code Execution - AD LDS - Windows 7 Gold/SP1 (Japanese)
Severity: Important
Fixlet ID: 1109521
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-095

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Active Directory, Active Directory Application Mode (ADAM), and Active Directory Lightweight Directory Service (AD LDS). The vulnerability could allow remote code execution if an attacker logs on to an Active Directory domain and runs a specially crafted application. To exploit this vulnerability, an attacker would first need to acquire credentials to log on to an Active Directory domain. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-095: Vulnerability in Active Directory Could Allow Remote Code Execution - AD LDS - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1109523
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-095

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Active Directory, Active Directory Application Mode (ADAM), and Active Directory Lightweight Directory Service (AD LDS). The vulnerability could allow remote code execution if an attacker logs on to an Active Directory domain and runs a specially crafted application. To exploit this vulnerability, an attacker would first need to acquire credentials to log on to an Active Directory domain. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-095: Vulnerability in Active Directory Could Allow Remote Code Execution - AD LDS - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1109525
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-095

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Active Directory, Active Directory Application Mode (ADAM), and Active Directory Lightweight Directory Service (AD LDS). The vulnerability could allow remote code execution if an attacker logs on to an Active Directory domain and runs a specially crafted application. To exploit this vulnerability, an attacker would first need to acquire credentials to log on to an Active Directory domain. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-096: Vulnerability in Microsoft Excel Could Allow Remote Code Execution - Excel 2003 SP3 (Local/Network Installation) (Japanese)
Severity: Important
Fixlet ID: 1109601
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-096
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Installing and configuring Office File Validation (OFV) to prevent the opening of suspicious files blocks the attack vectors for exploiting the vulnerabilities described in CVE-2011-3403. See the section, Frequently Asked Questions (FAQ) Related to This Security Update, for more information about how the Office File Validation feature can be configured to block the attack vectors. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS11-096: Vulnerability in Microsoft Excel Could Allow Remote Code Execution - Excel 2003 SP3 (Administrative Installation) (Japanese)
Severity: Important
Fixlet ID: 1109603
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-096
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Installing and configuring Office File Validation (OFV) to prevent the opening of suspicious files blocks the attack vectors for exploiting the vulnerabilities described in CVE-2011-3403. See the section, Frequently Asked Questions (FAQ) Related to This Security Update, for more information about how the Office File Validation feature can be configured to block the attack vectors. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS11-097: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows XP SP3 (Japanese)
Severity: Important
Fixlet ID: 1109701
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-097

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application designed to send a device event message to a higher-integrity process. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-097: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1109702
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-097

***************************************************************
Title: MS11-097: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1109703
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-097

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application designed to send a device event message to a higher-integrity process. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-097: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1109704
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-097

***************************************************************
Title: MS11-097: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1109705
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-097

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application designed to send a device event message to a higher-integrity process. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-097: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1109706
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-097

***************************************************************
Title: MS11-097: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Vista SP2 (Japanese)
Severity: Important
Fixlet ID: 1109707
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-097

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application designed to send a device event message to a higher-integrity process. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-097: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Server 2008 SP2 (Japanese)
Severity: Important
Fixlet ID: 1109709
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-097

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application designed to send a device event message to a higher-integrity process. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-097: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1109711
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-097

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application designed to send a device event message to a higher-integrity process. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-097: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows 7 Gold/SP1 (Japanese)
Severity: Important
Fixlet ID: 1109713
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-097

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application designed to send a device event message to a higher-integrity process. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-097: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1109715
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-097

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application designed to send a device event message to a higher-integrity process. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-097: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1109717
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-097

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application designed to send a device event message to a higher-integrity process. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-097: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1109718
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-097

***************************************************************
Title: MS11-097: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Vista SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1109719
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-097

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application designed to send a device event message to a higher-integrity process. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-097: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1109721
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-097

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application designed to send a device event message to a higher-integrity process. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-098: Vulnerability in Windows Kernel Could Allow Elevation of Privilege - Windows XP SP3 (Japanese)
Severity: Important
Fixlet ID: 1109801
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-098

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application designed to exploit the vulnerability. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-098: Vulnerability in Windows Kernel Could Allow Elevation of Privilege - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1109802
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-098

***************************************************************
Title: MS11-098: Vulnerability in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1109803
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-098

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application designed to exploit the vulnerability. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-098: Vulnerability in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1109804
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-098

***************************************************************
Title: MS11-098: Vulnerability in Windows Kernel Could Allow Elevation of Privilege - Windows Vista SP2 (Japanese)
Severity: Important
Fixlet ID: 1109805
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-098

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application designed to exploit the vulnerability. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-098: Vulnerability in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2008 SP2 (Japanese)
Severity: Important
Fixlet ID: 1109807
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-098

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application designed to exploit the vulnerability. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-098: Vulnerability in Windows Kernel Could Allow Elevation of Privilege - Windows 7 Gold/SP1 (Japanese)
Severity: Important
Fixlet ID: 1109809
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-098

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application designed to exploit the vulnerability. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS11-099: Cumulative Security Update for Internet Explorer - Internet Explorer 6 - Windows XP SP3 (Japanese)
Severity: Moderate
Fixlet ID: 1109901
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-099

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Internet Explorer. The most severe vulnerability could allow remote code execution if a user opens a legitimate HyperText Markup Language (HTML) file that is located in the same directory as a specially crafted dynamic link library (DLL) file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-099: Cumulative Security Update for Internet Explorer - Internet Explorer 6 - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1109902
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-099

***************************************************************
Title: MS11-099: Cumulative Security Update for Internet Explorer - Internet Explorer 6 - Windows XP SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1109903
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-099

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Internet Explorer. The most severe vulnerability could allow remote code execution if a user opens a legitimate HyperText Markup Language (HTML) file that is located in the same directory as a specially crafted dynamic link library (DLL) file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-099: Cumulative Security Update for Internet Explorer - Internet Explorer 6 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1109904
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-099

***************************************************************
Title: MS11-099: Cumulative Security Update for Internet Explorer - Internet Explorer 6 - Windows Server 2003 SP2 (Japanese)
Severity: <Unspecified>
Fixlet ID: 1109905
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-099

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Internet Explorer. The most severe vulnerability could allow remote code execution if a user opens a legitimate HyperText Markup Language (HTML) file that is located in the same directory as a specially crafted dynamic link library (DLL) file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-099: Cumulative Security Update for Internet Explorer - Internet Explorer 6 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: <Unspecified>
Fixlet ID: 1109906
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-099

***************************************************************
Title: MS11-099: Cumulative Security Update for Internet Explorer - Internet Explorer 6 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: <Unspecified>
Fixlet ID: 1109907
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-099

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Internet Explorer. The most severe vulnerability could allow remote code execution if a user opens a legitimate HyperText Markup Language (HTML) file that is located in the same directory as a specially crafted dynamic link library (DLL) file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-099: Cumulative Security Update for Internet Explorer - Internet Explorer 6 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: <Unspecified>
Fixlet ID: 1109908
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-099

***************************************************************
Title: MS11-099: Cumulative Security Update for Internet Explorer - Internet Explorer 7 - Windows XP SP3 (Japanese)
Severity: Moderate
Fixlet ID: 1109909
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-099

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Internet Explorer. The most severe vulnerability could allow remote code execution if a user opens a legitimate HyperText Markup Language (HTML) file that is located in the same directory as a specially crafted dynamic link library (DLL) file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-099: Cumulative Security Update for Internet Explorer - Internet Explorer 7 - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1109910
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-099

***************************************************************
Title: MS11-099: Cumulative Security Update for Internet Explorer - Internet Explorer 7 - Windows XP SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1109911
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-099

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Internet Explorer. The most severe vulnerability could allow remote code execution if a user opens a legitimate HyperText Markup Language (HTML) file that is located in the same directory as a specially crafted dynamic link library (DLL) file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-099: Cumulative Security Update for Internet Explorer - Internet Explorer 7 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1109912
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-099

***************************************************************
Title: MS11-099: Cumulative Security Update for Internet Explorer - Internet Explorer 7 - Windows Server 2003 SP2 (Japanese)
Severity: <Unspecified>
Fixlet ID: 1109913
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-099

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Internet Explorer. The most severe vulnerability could allow remote code execution if a user opens a legitimate HyperText Markup Language (HTML) file that is located in the same directory as a specially crafted dynamic link library (DLL) file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-099: Cumulative Security Update for Internet Explorer - Internet Explorer 7 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: <Unspecified>
Fixlet ID: 1109914
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-099

***************************************************************
Title: MS11-099: Cumulative Security Update for Internet Explorer - Internet Explorer 7 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: <Unspecified>
Fixlet ID: 1109915
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-099

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Internet Explorer. The most severe vulnerability could allow remote code execution if a user opens a legitimate HyperText Markup Language (HTML) file that is located in the same directory as a specially crafted dynamic link library (DLL) file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-099: Cumulative Security Update for Internet Explorer - Internet Explorer 7 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: <Unspecified>
Fixlet ID: 1109916
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-099

***************************************************************
Title: MS11-099: Cumulative Security Update for Internet Explorer - Internet Explorer 7 - Windows Vista SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1109917
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-099

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Internet Explorer. The most severe vulnerability could allow remote code execution if a user opens a legitimate HyperText Markup Language (HTML) file that is located in the same directory as a specially crafted dynamic link library (DLL) file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-099: Cumulative Security Update for Internet Explorer - Internet Explorer 7 - Windows Vista SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1109918
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-099

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Internet Explorer. The most severe vulnerability could allow remote code execution if a user opens a legitimate HyperText Markup Language (HTML) file that is located in the same directory as a specially crafted dynamic link library (DLL) file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-099: Cumulative Security Update for Internet Explorer - Internet Explorer 7 - Windows Server 2008 SP2 (Japanese)
Severity: <Unspecified>
Fixlet ID: 1109919
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-099

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Internet Explorer. The most severe vulnerability could allow remote code execution if a user opens a legitimate HyperText Markup Language (HTML) file that is located in the same directory as a specially crafted dynamic link library (DLL) file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-099: Cumulative Security Update for Internet Explorer - Internet Explorer 7 - Windows Server 2008 SP2 (x64) (Japanese)
Severity: <Unspecified>
Fixlet ID: 1109921
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-099

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Internet Explorer. The most severe vulnerability could allow remote code execution if a user opens a legitimate HyperText Markup Language (HTML) file that is located in the same directory as a specially crafted dynamic link library (DLL) file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-099: Cumulative Security Update for Internet Explorer - Internet Explorer 8 - Windows XP SP3 (Japanese)
Severity: Important
Fixlet ID: 1109923
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-099

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Internet Explorer. The most severe vulnerability could allow remote code execution if a user opens a legitimate HyperText Markup Language (HTML) file that is located in the same directory as a specially crafted dynamic link library (DLL) file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-099: Cumulative Security Update for Internet Explorer - Internet Explorer 8 - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1109924
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-099

***************************************************************
Title: MS11-099: Cumulative Security Update for Internet Explorer - Internet Explorer 8 - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1109925
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-099

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Internet Explorer. The most severe vulnerability could allow remote code execution if a user opens a legitimate HyperText Markup Language (HTML) file that is located in the same directory as a specially crafted dynamic link library (DLL) file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-099: Cumulative Security Update for Internet Explorer - Internet Explorer 8 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1109926
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-099

***************************************************************
Title: MS11-099: Cumulative Security Update for Internet Explorer - Internet Explorer 8 - Windows Server 2003 SP2 (Japanese)
Severity: Low
Fixlet ID: 1109927
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-099

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Internet Explorer. The most severe vulnerability could allow remote code execution if a user opens a legitimate HyperText Markup Language (HTML) file that is located in the same directory as a specially crafted dynamic link library (DLL) file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-099: Cumulative Security Update for Internet Explorer - Internet Explorer 8 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Low
Fixlet ID: 1109928
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-099

***************************************************************
Title: MS11-099: Cumulative Security Update for Internet Explorer - Internet Explorer 8 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Low
Fixlet ID: 1109929
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-099

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Internet Explorer. The most severe vulnerability could allow remote code execution if a user opens a legitimate HyperText Markup Language (HTML) file that is located in the same directory as a specially crafted dynamic link library (DLL) file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-099: Cumulative Security Update for Internet Explorer - Internet Explorer 8 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Low
Fixlet ID: 1109930
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-099

***************************************************************
Title: MS11-099: Cumulative Security Update for Internet Explorer - Internet Explorer 8 - Windows Vista SP2 (Japanese)
Severity: Important
Fixlet ID: 1109931
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-099

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Internet Explorer. The most severe vulnerability could allow remote code execution if a user opens a legitimate HyperText Markup Language (HTML) file that is located in the same directory as a specially crafted dynamic link library (DLL) file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-099: Cumulative Security Update for Internet Explorer - Internet Explorer 8 - Windows Vista SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1109933
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-099

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Internet Explorer. The most severe vulnerability could allow remote code execution if a user opens a legitimate HyperText Markup Language (HTML) file that is located in the same directory as a specially crafted dynamic link library (DLL) file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-099: Cumulative Security Update for Internet Explorer - Internet Explorer 8 - Windows Server 2008 SP2 (Japanese)
Severity: Low
Fixlet ID: 1109935
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-099

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Internet Explorer. The most severe vulnerability could allow remote code execution if a user opens a legitimate HyperText Markup Language (HTML) file that is located in the same directory as a specially crafted dynamic link library (DLL) file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-099: Cumulative Security Update for Internet Explorer - Internet Explorer 8 - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Low
Fixlet ID: 1109937
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-099

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Internet Explorer. The most severe vulnerability could allow remote code execution if a user opens a legitimate HyperText Markup Language (HTML) file that is located in the same directory as a specially crafted dynamic link library (DLL) file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-099: Cumulative Security Update for Internet Explorer - Internet Explorer 8 - Windows 7 Gold/SP1 (Japanese)
Severity: Important
Fixlet ID: 1109939
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-099

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Internet Explorer. The most severe vulnerability could allow remote code execution if a user opens a legitimate HyperText Markup Language (HTML) file that is located in the same directory as a specially crafted dynamic link library (DLL) file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-099: Cumulative Security Update for Internet Explorer - Internet Explorer 8 - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1109941
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-099

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Internet Explorer. The most severe vulnerability could allow remote code execution if a user opens a legitimate HyperText Markup Language (HTML) file that is located in the same directory as a specially crafted dynamic link library (DLL) file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-099: Cumulative Security Update for Internet Explorer - Internet Explorer 8 - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Low
Fixlet ID: 1109943
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-099

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Internet Explorer. The most severe vulnerability could allow remote code execution if a user opens a legitimate HyperText Markup Language (HTML) file that is located in the same directory as a specially crafted dynamic link library (DLL) file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-099: Cumulative Security Update for Internet Explorer - Internet Explorer 9 - Windows Vista SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1109945
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-099

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Internet Explorer. The most severe vulnerability could allow remote code execution if a user opens a legitimate HyperText Markup Language (HTML) file that is located in the same directory as a specially crafted dynamic link library (DLL) file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-099: Cumulative Security Update for Internet Explorer - Internet Explorer 9 - Windows Vista SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1109947
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-099

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Internet Explorer. The most severe vulnerability could allow remote code execution if a user opens a legitimate HyperText Markup Language (HTML) file that is located in the same directory as a specially crafted dynamic link library (DLL) file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-099: Cumulative Security Update for Internet Explorer - Internet Explorer 9 - Windows Server 2008 SP2 (Japanese)
Severity: <Unspecified>
Fixlet ID: 1109949
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-099

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Internet Explorer. The most severe vulnerability could allow remote code execution if a user opens a legitimate HyperText Markup Language (HTML) file that is located in the same directory as a specially crafted dynamic link library (DLL) file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-099: Cumulative Security Update for Internet Explorer - Internet Explorer 9 - Windows Server 2008 SP2 (x64) (Japanese)
Severity: <Unspecified>
Fixlet ID: 1109951
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-099

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Internet Explorer. The most severe vulnerability could allow remote code execution if a user opens a legitimate HyperText Markup Language (HTML) file that is located in the same directory as a specially crafted dynamic link library (DLL) file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-099: Cumulative Security Update for Internet Explorer - Internet Explorer 9 - Windows 7 Gold/SP1 (Japanese)
Severity: Important
Fixlet ID: 1109953
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-099

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Internet Explorer. The most severe vulnerability could allow remote code execution if a user opens a legitimate HyperText Markup Language (HTML) file that is located in the same directory as a specially crafted dynamic link library (DLL) file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-099: Cumulative Security Update for Internet Explorer - Internet Explorer 9 - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1109955
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-099

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Internet Explorer. The most severe vulnerability could allow remote code execution if a user opens a legitimate HyperText Markup Language (HTML) file that is located in the same directory as a specially crafted dynamic link library (DLL) file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS11-099: Cumulative Security Update for Internet Explorer - Internet Explorer 9 - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1109957
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-099

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Internet Explorer. The most severe vulnerability could allow remote code execution if a user opens a legitimate HyperText Markup Language (HTML) file that is located in the same directory as a specially crafted dynamic link library (DLL) file. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: 931125: Update for Root Certificates (Oct 2011) (Japanese)
Severity: <Unspecified>
Fixlet ID: 93112507
Fixlet Link: http://support.microsoft.com/?kbid=931125

Fixlet Description: This item updates the list of root certificates on your computer to the list that is accepted by Microsoft as part of the Microsoft Root Certificate Program.

***************************************************************
Title: 931125: Update for Root Certificates (Nov 2011) (Japanese)
Severity: <Unspecified>
Fixlet ID: 93112509
Fixlet Link: http://support.microsoft.com/?kbid=931125

Fixlet Description: This item updates the list of root certificates on your computer to the list that is accepted by Microsoft as part of the Microsoft Root Certificate Program.



More information about the BigFix-Announcements-Japan mailing list