[BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)'

autonotify at us.ibm.com autonotify at us.ibm.com
Thu Apr 12 02:33:42 PDT 2012


Fixlet Site - 'Patches for Windows (Japanese)'
Current Version: 467	Published: Wed, 11 Apr 2012 11:27:06  GMT

New Fixlets:
============

***************************************************************
Title: MS12-023: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1202301
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-023

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-023: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1202302
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-023

***************************************************************
Title: MS12-023: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1202303
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-023

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-023: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1202304
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-023

***************************************************************
Title: MS12-023: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1202305
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-023

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-023: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1202306
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-023

***************************************************************
Title: MS12-023: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1202307
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-023

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-023: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1202308
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-023

***************************************************************
Title: MS12-023: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1202309
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-023

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-023: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1202310
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-023

***************************************************************
Title: MS12-023: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1202311
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-023

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-023: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1202312
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-023

***************************************************************
Title: MS12-023: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1202313
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-023

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-023: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1202314
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-023

***************************************************************
Title: MS12-023: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1202315
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-023

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-023: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1202316
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-023

***************************************************************
Title: MS12-023: Cumulative Security Update for Internet Explorer - IE 7 - Windows Vista SP2 (Japanese)
Severity: Critical
Fixlet ID: 1202317
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-023

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-023: Cumulative Security Update for Internet Explorer - IE 7 - Windows Vista SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1202319
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-023

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-023: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2008 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1202321
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-023

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-023: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1202323
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-023

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-023: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1202325
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-023

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-023: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1202326
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-023

***************************************************************
Title: MS12-023: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1202327
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-023

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-023: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1202328
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-023

***************************************************************
Title: MS12-023: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1202329
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-023

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-023: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1202330
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-023

***************************************************************
Title: MS12-023: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1202331
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-023

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-023: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1202332
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-023

***************************************************************
Title: MS12-023: Cumulative Security Update for Internet Explorer - IE 8 - Windows Vista SP2 (Japanese)
Severity: Critical
Fixlet ID: 1202333
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-023

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-023: Cumulative Security Update for Internet Explorer - IE 8 - Windows Vista SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1202335
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-023

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-023: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2008 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1202337
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-023

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-023: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1202339
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-023

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-023: Cumulative Security Update for Internet Explorer - IE 8 - Windows 7 Gold/SP1 (Japanese)
Severity: Critical
Fixlet ID: 1202341
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-023

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-023: Cumulative Security Update for Internet Explorer - IE 8 - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1202343
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-023

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-023: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1202345
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-023

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-023: Cumulative Security Update for Internet Explorer - IE 9 - Windows Vista SP2 (Japanese)
Severity: Critical
Fixlet ID: 1202347
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-023

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-023: Cumulative Security Update for Internet Explorer - IE 9 - Windows Vista SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1202349
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-023

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-023: Cumulative Security Update for Internet Explorer - IE 9 - Windows Server 2008 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1202351
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-023

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-023: Cumulative Security Update for Internet Explorer - IE 9 - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1202353
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-023

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-023: Cumulative Security Update for Internet Explorer - IE 9 - Windows 7 Gold/SP1 (Japanese)
Severity: Critical
Fixlet ID: 1202355
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-023

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-023: Cumulative Security Update for Internet Explorer - IE 9 - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1202357
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-023

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-023: Cumulative Security Update for Internet Explorer - IE 9 - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1202359
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-023

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-024: Vulnerability in Windows Could Allow Remote Code Execution - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1202401
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-024

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user or application runs or installs a specially crafted, signed portable executable (PE) file on an affected system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

Microsoft has announced that this update may be included in a future service pack or update rollup.

***************************************************************
Title: MS12-024: Vulnerability in Windows Could Allow Remote Code Execution - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1202402
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-024

***************************************************************
Title: MS12-024: Vulnerability in Windows Could Allow Remote Code Execution - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1202403
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-024

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user or application runs or installs a specially crafted, signed portable executable (PE) file on an affected system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-024: Vulnerability in Windows Could Allow Remote Code Execution - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1202404
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-024

***************************************************************
Title: MS12-024: Vulnerability in Windows Could Allow Remote Code Execution - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1202405
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-024

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user or application runs or installs a specially crafted, signed portable executable (PE) file on an affected system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-024: Vulnerability in Windows Could Allow Remote Code Execution - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1202406
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-024

***************************************************************
Title: MS12-024: Vulnerability in Windows Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1202407
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-024

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user or application runs or installs a specially crafted, signed portable executable (PE) file on an affected system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

If this Fixlet doesn't have a default action, insert an appropriate note from the wiki.

***************************************************************
Title: MS12-024: Vulnerability in Windows Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1202408
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-024

***************************************************************
Title: MS12-024: Vulnerability in Windows Could Allow Remote Code Execution - Windows Vista SP2 (Japanese)
Severity: Critical
Fixlet ID: 1202409
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-024

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user or application runs or installs a specially crafted, signed portable executable (PE) file on an affected system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-024: Vulnerability in Windows Could Allow Remote Code Execution - Windows Vista SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1202411
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-024

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user or application runs or installs a specially crafted, signed portable executable (PE) file on an affected system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-024: Vulnerability in Windows Could Allow Remote Code Execution - Windows Server 2008 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1202413
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-024

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user or application runs or installs a specially crafted, signed portable executable (PE) file on an affected system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-024: Vulnerability in Windows Could Allow Remote Code Execution - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1202415
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-024

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user or application runs or installs a specially crafted, signed portable executable (PE) file on an affected system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-024: Vulnerability in Windows Could Allow Remote Code Execution - Windows 7 Gold/SP1 (Japanese)
Severity: Critical
Fixlet ID: 1202417
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-024

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user or application runs or installs a specially crafted, signed portable executable (PE) file on an affected system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-024: Vulnerability in Windows Could Allow Remote Code Execution - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1202419
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-024

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user or application runs or installs a specially crafted, signed portable executable (PE) file on an affected system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-024: Vulnerability in Windows Could Allow Remote Code Execution - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1202421
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-024

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user or application runs or installs a specially crafted, signed portable executable (PE) file on an affected system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-025: Vulnerability in .NET Framework Could Allow Remote Code Execution - Microsoft .NET Framework 1.1 SP1 - Windows XP SP3 / Vista SP2 / 2008 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1202503
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-025

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow remote code execution on a client system if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and then executes the page, as could be the case in a web hosting scenario. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. In a web browsing attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these websites. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-025: Vulnerability in .NET Framework Could Allow Remote Code Execution - Microsoft .NET Framework 2.0 SP2 - Windows XP SP3 / 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1202505
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-025

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow remote code execution on a client system if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and then executes the page, as could be the case in a web hosting scenario. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. In a web browsing attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these websites. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-025: Vulnerability in .NET Framework Could Allow Remote Code Execution - Microsoft .NET Framework 4 - Windows XP SP3 / 2003 SP2 / Vista SP2 / 2008 SP2 / 7 Gold/SP1 (Japanese)
Severity: Critical
Fixlet ID: 1202507
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-025

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow remote code execution on a client system if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and then executes the page, as could be the case in a web hosting scenario. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. In a web browsing attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these websites. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-025: Vulnerability in .NET Framework Could Allow Remote Code Execution - Microsoft .NET Framework 2.0 SP2 - Windows XP SP2 / 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1202509
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-025

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow remote code execution on a client system if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and then executes the page, as could be the case in a web hosting scenario. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. In a web browsing attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these websites. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-025: Vulnerability in .NET Framework Could Allow Remote Code Execution - Microsoft .NET Framework 4 - Windows XP SP2 / 2003 SP2 / Vista SP2 / 2008 SP2 / 7 Gold/SP1 / 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1202511
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-025

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow remote code execution on a client system if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and then executes the page, as could be the case in a web hosting scenario. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. In a web browsing attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these websites. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-025: Vulnerability in .NET Framework Could Allow Remote Code Execution - Microsoft .NET Framework 1.1 SP1 - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1202513
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-025

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow remote code execution on a client system if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and then executes the page, as could be the case in a web hosting scenario. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. In a web browsing attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these websites. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-025: Vulnerability in .NET Framework Could Allow Remote Code Execution - Microsoft .NET Framework 2.0 SP2 - Windows Vista SP2 / 2008 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1202515
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-025

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow remote code execution on a client system if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and then executes the page, as could be the case in a web hosting scenario. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. In a web browsing attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these websites. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-025: Vulnerability in .NET Framework Could Allow Remote Code Execution - Microsoft .NET Framework 2.0 SP2 - Windows Vista SP2 / 2008 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1202517
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-025

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow remote code execution on a client system if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and then executes the page, as could be the case in a web hosting scenario. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. In a web browsing attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these websites. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-025: Vulnerability in .NET Framework Could Allow Remote Code Execution - Microsoft .NET Framework 3.5.1 - Windows 7 Gold (Japanese)
Severity: Critical
Fixlet ID: 1202519
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-025

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow remote code execution on a client system if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and then executes the page, as could be the case in a web hosting scenario. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. In a web browsing attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these websites. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-025: Vulnerability in .NET Framework Could Allow Remote Code Execution - Microsoft .NET Framework 3.5.1 - Windows 7 SP1 (Japanese)
Severity: Critical
Fixlet ID: 1202521
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-025

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow remote code execution on a client system if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and then executes the page, as could be the case in a web hosting scenario. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. In a web browsing attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these websites. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-025: Vulnerability in .NET Framework Could Allow Remote Code Execution - Microsoft .NET Framework 3.5.1 - Windows 7 / 2008 R2 Gold (x64) (Japanese)
Severity: Critical
Fixlet ID: 1202523
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-025

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow remote code execution on a client system if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and then executes the page, as could be the case in a web hosting scenario. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. In a web browsing attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these websites. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-025: Vulnerability in .NET Framework Could Allow Remote Code Execution - Microsoft .NET Framework 3.5.1 - Windows 7 SP1 / 2008 R2 SP1 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1202525
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-025

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow remote code execution on a client system if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and then executes the page, as could be the case in a web hosting scenario. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. In a web browsing attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these websites. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-025: Vulnerability in .NET Framework Could Allow Remote Code Execution - Microsoft .NET Framework 1.1 SP1 - Windows XP SP2 / 2003 SP2 / Vista SP2 / 2008 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1202527
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-025

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow remote code execution on a client system if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and then executes the page, as could be the case in a web hosting scenario. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. In a web browsing attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these websites. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-027: Vulnerability in Windows Common Controls Could Allow Remote Code Execution - Office 2003 SP3 / Office 2003 Web Components SP3 / SQL Server 2005 Express Edition with Advanced Services SP4 / SQL Server 2005 SP4 / SQL Server 2005 SP4 (x64) (Japanes
Severity: Critical
Fixlet ID: 1202701
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-027

Fixlet Description: Microsoft has released a security update that resolves a privately disclosed vulnerability in Windows common controls. The vulnerability could allow remote code execution if a user visits a website containing specially crafted content designed to exploit the vulnerability. In all cases, however, an attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. The malicious file could be sent as an email attachment as well, but the attacker would have to convince the user to open the attachment in order to exploit the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-027: Vulnerability in Windows Common Controls Could Allow Remote Code Execution -  Office 2007 SP2 / Office 2007 SP3 / SQL Server 2008 SP2 / SQL Server 2008 SP2 (x64) / SQL Server 2008 SP3 / SQL Server 2008 SP3 (x64) / SQL Server 2008 R2 / SQL Server
Severity: Critical
Fixlet ID: 1202703
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-027

Fixlet Description: Microsoft has released a security update that resolves a privately disclosed vulnerability in Windows common controls. The vulnerability could allow remote code execution if a user visits a website containing specially crafted content designed to exploit the vulnerability. In all cases, however, an attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. The malicious file could be sent as an email attachment as well, but the attacker would have to convince the user to open the attachment in order to exploit the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-027: Vulnerability in Windows Common Controls Could Allow Remote Code Execution -  Office 2010 Gold/SP1 (Japanese)
Severity: Critical
Fixlet ID: 1202705
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-027

Fixlet Description: Microsoft has released a security update that resolves a privately disclosed vulnerability in Windows common controls. The vulnerability could allow remote code execution if a user visits a website containing specially crafted content designed to exploit the vulnerability. In all cases, however, an attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. The malicious file could be sent as an email attachment as well, but the attacker would have to convince the user to open the attachment in order to exploit the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-027: Vulnerability in Windows Common Controls Could Allow Remote Code Execution - SQL Server 2000 Analysis Services Service SP4 - QFE Branch (Japanese)
Severity: Critical
Fixlet ID: 1202707
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-027

Fixlet Description: Microsoft has released a security update that resolves a privately disclosed vulnerability in Windows common controls. The vulnerability could allow remote code execution if a user visits a website containing specially crafted content designed to exploit the vulnerability. In all cases, however, an attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. The malicious file could be sent as an email attachment as well, but the attacker would have to convince the user to open the attachment in order to exploit the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-027: Vulnerability in Windows Common Controls Could Allow Remote Code Execution - SQL Server 2000 SP4 - QFE Branch (Japanese)
Severity: Critical
Fixlet ID: 1202709
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-027

Fixlet Description: Microsoft has released a security update that resolves a privately disclosed vulnerability in Windows common controls. The vulnerability could allow remote code execution if a user visits a website containing specially crafted content designed to exploit the vulnerability. In all cases, however, an attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. The malicious file could be sent as an email attachment as well, but the attacker would have to convince the user to open the attachment in order to exploit the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-027: Vulnerability in Windows Common Controls Could Allow Remote Code Execution - SQL Server 2000 SP4 - GDR Branch (Japanese)
Severity: Critical
Fixlet ID: 1202711
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-027

Fixlet Description: Microsoft has released a security update that resolves a privately disclosed vulnerability in Windows common controls. The vulnerability could allow remote code execution if a user visits a website containing specially crafted content designed to exploit the vulnerability. In all cases, however, an attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. The malicious file could be sent as an email attachment as well, but the attacker would have to convince the user to open the attachment in order to exploit the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-027: Vulnerability in Windows Common Controls Could Allow Remote Code Execution - BizTalk Server 2002 SP1 (Japanese)
Severity: Critical
Fixlet ID: 1202713
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-027

Fixlet Description: Microsoft has released a security update that resolves a privately disclosed vulnerability in Windows common controls. The vulnerability could allow remote code execution if a user visits a website containing specially crafted content designed to exploit the vulnerability. In all cases, however, an attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. The malicious file could be sent as an email attachment as well, but the attacker would have to convince the user to open the attachment in order to exploit the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-027: Vulnerability in Windows Common Controls Could Allow Remote Code Execution - Visual FoxPro 8.0  SP1 (Japanese)
Severity: Critical
Fixlet ID: 1202723
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-027

Fixlet Description: Microsoft has released a security update that resolves a privately disclosed vulnerability in Windows common controls. The vulnerability could allow remote code execution if a user visits a website containing specially crafted content designed to exploit the vulnerability. In all cases, however, an attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. The malicious file could be sent as an email attachment as well, but the attacker would have to convince the user to open the attachment in order to exploit the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-027: Vulnerability in Windows Common Controls Could Allow Remote Code Execution - Visual FoxPro 9.0 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1202725
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-027

Fixlet Description: Microsoft has released a security update that resolves a privately disclosed vulnerability in Windows common controls. The vulnerability could allow remote code execution if a user visits a website containing specially crafted content designed to exploit the vulnerability. In all cases, however, an attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. The malicious file could be sent as an email attachment as well, but the attacker would have to convince the user to open the attachment in order to exploit the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-027: Vulnerability in Windows Common Controls Could Allow Remote Code Execution - Visual Basic 6.0 (Japanese)
Severity: Critical
Fixlet ID: 1202727
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-027

Fixlet Description: Microsoft has released a security update that resolves a privately disclosed vulnerability in Windows common controls. The vulnerability could allow remote code execution if a user visits a website containing specially crafted content designed to exploit the vulnerability. In all cases, however, an attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. The malicious file could be sent as an email attachment as well, but the attacker would have to convince the user to open the attachment in order to exploit the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-028: Vulnerability in Microsoft Office Could Allow Remote Code Execution - Office 2007 SP2 (Japanese)
Severity: Important
Fixlet ID: 1202801
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-028

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Office and Microsoft Works. The vulnerability could allow remote code execution if a user opens a specially crafted Works file. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-028: Vulnerability in Microsoft Office Could Allow Remote Code Execution - Works 6-9 Converter (Japanese)
Severity: Important
Fixlet ID: 1202805
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-028

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Office and Microsoft Works. The vulnerability could allow remote code execution if a user opens a specially crafted Works file. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.



More information about the BigFix-Announcements-Japan mailing list