[BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)'

autonotify at us.ibm.com autonotify at us.ibm.com
Thu Jul 14 02:32:13 PDT 2011


Fixlet Site - 'Patches for Windows (Japanese)'
Current Version: 427	Published: Thu, 14 Jul 2011 00:39:32  GMT

New Fixlets:
============

***************************************************************
Title: MS11-053: Vulnerability in Bluetooth Stack Could Allow Remote Code Execution - Windows Vista SP1 (Japanese)
Severity: Critical
Fixlet ID: 1105301
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-053.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows Bluetooth Stack. The vulnerability could allow remote code execution if an attacker sent a series of specially crafted Bluetooth packets to an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability only affects systems with Bluetooth capability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

Important Note: Windows Vista Feature Pack for Wireless (KB942567) must be installed before this Fixlet will become relevant.

Important Note: Microsoft will offer this update via Windows Update regardless of whether or not vulnerable files exist on the system as long as you previously have not installed this update. BigFix will only offer this update only if it detects vulnerable files exist on the system.

***************************************************************
Title: MS11-053: Vulnerability in Bluetooth Stack Could Allow Remote Code Execution - Windows Vista SP2 (Japanese)
Severity: Critical
Fixlet ID: 1105303
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-053.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows Bluetooth Stack. The vulnerability could allow remote code execution if an attacker sent a series of specially crafted Bluetooth packets to an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability only affects systems with Bluetooth capability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

Important Note: Microsoft will offer this update via Windows Update regardless of whether or not vulnerable files exist on the system as long as you previously have not installed this update. BigFix will only offer this update only if it detects vulnerable files exist on the system.

***************************************************************
Title: MS11-053: Vulnerability in Bluetooth Stack Could Allow Remote Code Execution - Windows Vista SP1 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1105305
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-053.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows Bluetooth Stack. The vulnerability could allow remote code execution if an attacker sent a series of specially crafted Bluetooth packets to an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability only affects systems with Bluetooth capability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

Important Note: Windows Vista Feature Pack for Wireless (KB942567) must be installed before this Fixlet will become relevant.

Important Note: Microsoft will offer this update via Windows Update regardless of whether or not vulnerable files exist on the system as long as you previously have not installed this update. BigFix will only offer this update only if it detects vulnerable files exist on the system.

***************************************************************
Title: MS11-053: Vulnerability in Bluetooth Stack Could Allow Remote Code Execution - Windows Vista SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1105307
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-053.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows Bluetooth Stack. The vulnerability could allow remote code execution if an attacker sent a series of specially crafted Bluetooth packets to an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability only affects systems with Bluetooth capability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

Important Note: Microsoft will offer this update via Windows Update regardless of whether or not vulnerable files exist on the system as long as you previously have not installed this update. BigFix will only offer this update only if it detects vulnerable files exist on the system.

***************************************************************
Title: MS11-053: Vulnerability in Bluetooth Stack Could Allow Remote Code Execution - Windows 7 Gold/SP1 (Japanese)
Severity: Critical
Fixlet ID: 1105309
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-053.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows Bluetooth Stack. The vulnerability could allow remote code execution if an attacker sent a series of specially crafted Bluetooth packets to an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability only affects systems with Bluetooth capability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

Important Note: Microsoft will offer this update via Windows Update regardless of whether or not vulnerable files exist on the system as long as you previously have not installed this update. BigFix will only offer this update only if it detects vulnerable files exist on the system.

***************************************************************
Title: MS11-053: Vulnerability in Bluetooth Stack Could Allow Remote Code Execution - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1105311
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-053.mspx

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows Bluetooth Stack. The vulnerability could allow remote code execution if an attacker sent a series of specially crafted Bluetooth packets to an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability only affects systems with Bluetooth capability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

Important Note: Microsoft will offer this update via Windows Update regardless of whether or not vulnerable files exist on the system as long as you previously have not installed this update. BigFix will only offer this update only if it detects vulnerable files exist on the system.

***************************************************************
Title: MS11-054: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows XP SP3 (Japanese)
Severity: Important
Fixlet ID: 1105401
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-054.mspx

Fixlet Description: Microsoft has released a security update that resolves 15 privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-054: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1105402
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-054.mspx

***************************************************************
Title: MS11-054: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1105403
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-054.mspx

Fixlet Description: Microsoft has released a security update that resolves 15 privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-054: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1105404
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-054.mspx

***************************************************************
Title: MS11-054: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1105405
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-054.mspx

Fixlet Description: Microsoft has released a security update that resolves 15 privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-054: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1105406
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-054.mspx

***************************************************************
Title: MS11-054: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1105407
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-054.mspx

Fixlet Description: Microsoft has released a security update that resolves 15 privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-054: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1105408
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-054.mspx

***************************************************************
Title: MS11-054: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Vista SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 1105409
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-054.mspx

Fixlet Description: Microsoft has released a security update that resolves 15 privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-054: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Vista SP1/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1105411
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-054.mspx

Fixlet Description: Microsoft has released a security update that resolves 15 privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-054: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Important
Fixlet ID: 1105413
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-054.mspx

Fixlet Description: Microsoft has released a security update that resolves 15 privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-054: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1105415
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-054.mspx

Fixlet Description: Microsoft has released a security update that resolves 15 privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-054: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows 7 Gold/SP1 (Japanese)
Severity: Important
Fixlet ID: 1105417
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-054.mspx

Fixlet Description: Microsoft has released a security update that resolves 15 privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-054: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1105419
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-054.mspx

Fixlet Description: Microsoft has released a security update that resolves 15 privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-054: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1105421
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-054.mspx

Fixlet Description: Microsoft has released a security update that resolves 15 privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-055: Vulnerability in Microsoft Visio Could Allow Remote Code Execution - Visio 2003 SP3 (Local/Network Installation) (Japanese)
Severity: Important
Fixlet ID: 1105501
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-055.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Visio. The vulnerability could allow remote code execution if a user opens a legitimate Visio file that is located in the same network directory as a specially crafted library file. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS11-055: Vulnerability in Microsoft Visio Could Allow Remote Code Execution - Visio 2003 SP3 (Administrative Installation) (Japanese)
Severity: Important
Fixlet ID: 1105503
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-055.mspx
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Visio. The vulnerability could allow remote code execution if a user opens a legitimate Visio file that is located in the same network directory as a specially crafted library file. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS11-056: Vulnerabilities in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows XP SP3 (Japanese)
Severity: Important
Fixlet ID: 1105601
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-056.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the Microsoft Windows Client/Server Run-time Subsystem (CSRSS). The vulnerabilities could allow elevation of privilege if an attacker logs on to a user's system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-056: Vulnerabilities in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1105602
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-056.mspx

***************************************************************
Title: MS11-056: Vulnerabilities in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1105603
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-056.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the Microsoft Windows Client/Server Run-time Subsystem (CSRSS). The vulnerabilities could allow elevation of privilege if an attacker logs on to a user's system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-056: Vulnerabilities in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1105604
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-056.mspx

***************************************************************
Title: MS11-056: Vulnerabilities in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1105605
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-056.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the Microsoft Windows Client/Server Run-time Subsystem (CSRSS). The vulnerabilities could allow elevation of privilege if an attacker logs on to a user's system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-056: Vulnerabilities in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1105606
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-056.mspx

***************************************************************
Title: MS11-056: Vulnerabilities in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1105607
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-056.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the Microsoft Windows Client/Server Run-time Subsystem (CSRSS). The vulnerabilities could allow elevation of privilege if an attacker logs on to a user's system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-056: Vulnerabilities in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1105608
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-056.mspx

***************************************************************
Title: MS11-056: Vulnerabilities in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Vista SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 1105609
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-056.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the Microsoft Windows Client/Server Run-time Subsystem (CSRSS). The vulnerabilities could allow elevation of privilege if an attacker logs on to a user's system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-056: Vulnerabilities in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Vista SP1/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1105611
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-056.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the Microsoft Windows Client/Server Run-time Subsystem (CSRSS). The vulnerabilities could allow elevation of privilege if an attacker logs on to a user's system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-056: Vulnerabilities in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Server 2008 Gold/SP2 (Japanese)
Severity: Important
Fixlet ID: 1105613
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-056.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the Microsoft Windows Client/Server Run-time Subsystem (CSRSS). The vulnerabilities could allow elevation of privilege if an attacker logs on to a user's system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-056: Vulnerabilities in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Server 2008 Gold/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1105615
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-056.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the Microsoft Windows Client/Server Run-time Subsystem (CSRSS). The vulnerabilities could allow elevation of privilege if an attacker logs on to a user's system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-056: Vulnerabilities in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows 7 Gold/SP1 (Japanese)
Severity: Important
Fixlet ID: 1105617
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-056.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the Microsoft Windows Client/Server Run-time Subsystem (CSRSS). The vulnerabilities could allow elevation of privilege if an attacker logs on to a user's system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-056: Vulnerabilities in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1105619
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-056.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the Microsoft Windows Client/Server Run-time Subsystem (CSRSS). The vulnerabilities could allow elevation of privilege if an attacker logs on to a user's system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS11-056: Vulnerabilities in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1105621
Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS11-056.mspx

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the Microsoft Windows Client/Server Run-time Subsystem (CSRSS). The vulnerabilities could allow elevation of privilege if an attacker logs on to a user's system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.



More information about the BigFix-Announcements-Japan mailing list