[BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)'

autonotify at us.ibm.com autonotify at us.ibm.com
Thu Aug 16 02:33:28 PDT 2012


Fixlet Site - 'Patches for Windows (Japanese)'
Current Version: 488	Published: Wed, 15 Aug 2012 09:42:48  GMT

New Fixlets:
============

***************************************************************
Title: UPDATE: SQL Server 2005 Express Service Pack 4 Available (Japanese)
Severity: <Unspecified>
Fixlet ID: 20343
Fixlet Link: http://support.microsoft.com/kb/913089

Fixlet Description: Important Note: Due to the complexity of this Service Pack, installation of SQL Server 2005 Express SP4 cannot be performed without user interaction and must be installed manually.

Microsoft has released Service Pack 4 for SQL Server 2005 Express. This Service Pack includes various updates and bug fixes to the data engine, database client utilities, and database client connectivity components. Additional information can be found here. 

Important Note: Back up your SQL Server 2005 Express databases - Before you install SQL Server 2005 Express SP4, back up the master, msdb, and model databases. Installing SQL Server 2005 Express SP4 modifies these databases, making them incompatible with pre-SP4 versions of SQL Server 2005 Express. Backups of these databases are required if you decide to reinstall SQL Server 2005 Express without SP4.

Important Note: There are known issues associated with the installation of this patch. See the knowledge base article and release notes for additional information.

***************************************************************
Title: UPDATE: Excel Viewer 2007 SP2 Available (Japanese)
Severity: <Unspecified>
Fixlet ID: 67101
Fixlet Link: http://support.microsoft.com/?kbid=953336

Fixlet Description: Excel Viewer 2007 Service Pack 2 (SP2) provides customers with the latest updates to Excel Viewer 2007. This download includes two types of fixes:  Previously unreleased fixes that were made specifically for this service pack.  In addition to general product fixes, this includes improvements in stability, performance, and security. You can find out more information in Knowledge Base Article 953336, where product-specific changes are described. All of the Public Updates, Security Updates, Cumulative Updates, and Hotfixes released through February 2009. Before installing this service pack, you are strongly encouraged to read 953336, which describes some big improvements introduced by SP2, and also calls out some important information that you should be aware of before installing.

***************************************************************
Title: UPDATE: PowerPoint Viewer 2007 SP2 Available (Japanese)
Severity: <Unspecified>
Fixlet ID: 67201
Fixlet Link: http://support.microsoft.com/?kbid=953332

Fixlet Description: PowerPoint Viewer 2007 Service Pack 2 (SP2) provides customers with the latest updates to PowerPoint Viewer 2007. This download includes two types of fixes:  Previously unreleased fixes that were made specifically for this service pack.  In addition to general product fixes, this includes improvements in stability, performance, and security. You can find out more information in Knowledge Base Article 953332, where product-specific changes are described. All of the Public Updates, Security Updates, Cumulative Updates, and Hotfixes released through February 2009. Before installing this service pack, you are strongly encouraged to read 953332, which describes some big improvements introduced by SP2, and also calls out some important information that you should be aware of before installing.

***************************************************************
Title: UPDATE: Visio Viewer 2007 SP2 Available (Japanese)
Severity: <Unspecified>
Fixlet ID: 67301
Fixlet Link: http://support.microsoft.com/?kbid=953335

Fixlet Description: Visio Viewer 2007 Service Pack 2 (SP2) provides customers with the latest updates to Visio Viewer 2007. This download includes two types of fixes:  Previously unreleased fixes that were made specifically for this service pack.  In addition to general product fixes, this includes improvements in stability, performance, and security. You can find out more information in Knowledge Base Article 953335, where product-specific changes are described. All of the Public Updates, Security Updates, Cumulative Updates, and Hotfixes released through February 2009. Before installing this service pack, you are strongly encouraged to read 953335, which describes some big improvements introduced by SP2, and also calls out some important information that you should be aware of before installing.

***************************************************************
Title: MS12-052: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1205201
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-052

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-052: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1205203
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-052

***************************************************************
Title: MS12-052: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1205204
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-052

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-052: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1205205
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-052

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-052: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1205207
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-052

***************************************************************
Title: MS12-052: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1205208
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-052

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-052: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1205209
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-052

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-052: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1205211
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-052

***************************************************************
Title: MS12-052: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1205212
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-052

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-052: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1205213
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-052

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-052: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1205215
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-052

***************************************************************
Title: MS12-052: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1205216
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-052

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-052: Cumulative Security Update for Internet Explorer - IE 7 - Windows Vista SP2 (Japanese)
Severity: Critical
Fixlet ID: 1205217
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-052

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-052: Cumulative Security Update for Internet Explorer - IE 7 - Windows Vista SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1205219
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-052

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-052: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1205220
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-052

***************************************************************
Title: MS12-052: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2008 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1205221
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-052

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-052: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1205223
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-052

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-052: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1205224
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-052

***************************************************************
Title: MS12-052: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1205225
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-052

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-052: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1205227
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-052

***************************************************************
Title: MS12-052: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1205228
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-052

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-052: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1205229
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-052

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-052: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1205231
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-052

***************************************************************
Title: MS12-052: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1205232
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-052

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-052: Cumulative Security Update for Internet Explorer - IE 8 - Windows Vista SP2 (Japanese)
Severity: Critical
Fixlet ID: 1205233
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-052

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-052: Cumulative Security Update for Internet Explorer - IE 8 - Windows Vista SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1205235
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-052

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-052: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1205236
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-052

***************************************************************
Title: MS12-052: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2008 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1205237
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-052

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-052: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1205239
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-052

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-052: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1205240
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-052

***************************************************************
Title: MS12-052: Cumulative Security Update for Internet Explorer - IE 8 - Windows 7 Gold/SP1 (Japanese)
Severity: Critical
Fixlet ID: 1205241
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-052

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-052: Cumulative Security Update for Internet Explorer - IE 8 - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1205243
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-052

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-052: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1205244
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-052

***************************************************************
Title: MS12-052: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1205245
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-052

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-052: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1205246
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-052

***************************************************************
Title: MS12-052: Cumulative Security Update for Internet Explorer - IE 9 - Windows Vista SP2 (Japanese)
Severity: Critical
Fixlet ID: 1205247
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-052

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-052: Cumulative Security Update for Internet Explorer - IE 9 - Windows Vista SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1205249
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-052

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-052: Cumulative Security Update for Internet Explorer - IE 9 - Windows Server 2008 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1205251
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-052

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-052: Cumulative Security Update for Internet Explorer - IE 9 - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1205253
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-052

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-052: Cumulative Security Update for Internet Explorer - IE 9 - Windows 7 Gold/SP1 (Japanese)
Severity: Critical
Fixlet ID: 1205255
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-052

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-052: Cumulative Security Update for Internet Explorer - IE 9 - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1205257
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-052

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-052: Cumulative Security Update for Internet Explorer - IE 9 - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1205259
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-052

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-053: Vulnerability in Remote Desktop Could Allow Remote Code Execution - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1205301
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-053

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Remote Desktop Protocol. The vulnerability could allow remote code execution if an attacker sends a sequence of specially crafted RDP packets to an affected system. By default, the Remote Desktop Protocol (RDP) is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-053: Vulnerability in Remote Desktop Could Allow Remote Code Execution - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1205303
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-053

***************************************************************
Title: MS12-054: Vulnerabilities in Windows Networking Components Could Allow Remote Code Execution - Windows XP SP3 - KB2705219 (Japanese)
Severity: Critical
Fixlet ID: 1205401
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-054

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker sends a specially crafted response to a Windows print spooler request. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems connected directly to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-054: Vulnerabilities in Windows Networking Components Could Allow Remote Code Execution - Windows XP SP3 - KB2712808 (Japanese)
Severity: Critical
Fixlet ID: 1205403
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-054

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker sends a specially crafted response to a Windows print spooler request. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems connected directly to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-054: Vulnerabilities in Windows Networking Components Could Allow Remote Code Execution - Windows XP SP3 - KB2705219 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1205405
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-054

***************************************************************
Title: MS12-054: Vulnerabilities in Windows Networking Components Could Allow Remote Code Execution - Windows XP SP3 - KB2712808 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1205406
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-054

***************************************************************
Title: MS12-054: Vulnerabilities in Windows Networking Components Could Allow Remote Code Execution - Windows XP SP2 (x64) - KB2705219 (Japanese)
Severity: Critical
Fixlet ID: 1205407
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-054

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker sends a specially crafted response to a Windows print spooler request. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems connected directly to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-054: Vulnerabilities in Windows Networking Components Could Allow Remote Code Execution - Windows XP SP2 (x64) - KB2712808 (Japanese)
Severity: Critical
Fixlet ID: 1205408
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-054

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker sends a specially crafted response to a Windows print spooler request. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems connected directly to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-054: Vulnerabilities in Windows Networking Components Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB2705219 (Japanese)
Severity: Important
Fixlet ID: 1205409
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-054

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker sends a specially crafted response to a Windows print spooler request. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems connected directly to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-054: Vulnerabilities in Windows Networking Components Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB2712808 (Japanese)
Severity: Critical
Fixlet ID: 1205411
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-054

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker sends a specially crafted response to a Windows print spooler request. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems connected directly to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-054: Vulnerabilities in Windows Networking Components Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB2705219 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1205413
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-054

***************************************************************
Title: MS12-054: Vulnerabilities in Windows Networking Components Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB2712808 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1205414
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-054

***************************************************************
Title: MS12-054: Vulnerabilities in Windows Networking Components Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - KB2705219 (Japanese)
Severity: Important
Fixlet ID: 1205415
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-054

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker sends a specially crafted response to a Windows print spooler request. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems connected directly to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-054: Vulnerabilities in Windows Networking Components Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - KB2712808 (Japanese)
Severity: Critical
Fixlet ID: 1205416
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-054

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker sends a specially crafted response to a Windows print spooler request. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems connected directly to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-054: Vulnerabilities in Windows Networking Components Could Allow Remote Code Execution - Windows Vista SP2 - KB2705219 (Japanese)
Severity: Moderate
Fixlet ID: 1205417
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-054

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker sends a specially crafted response to a Windows print spooler request. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems connected directly to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-054: Vulnerabilities in Windows Networking Components Could Allow Remote Code Execution - Windows Vista SP2 - KB2712808 (Japanese)
Severity: Important
Fixlet ID: 1205419
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-054

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker sends a specially crafted response to a Windows print spooler request. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems connected directly to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-054: Vulnerabilities in Windows Networking Components Could Allow Remote Code Execution - Windows Vista SP2 (x64) - KB2705219 (Japanese)
Severity: Moderate
Fixlet ID: 1205421
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-054

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker sends a specially crafted response to a Windows print spooler request. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems connected directly to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-054: Vulnerabilities in Windows Networking Components Could Allow Remote Code Execution - Windows XP SP2 (x64) - KB2705219 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1205422
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-054

***************************************************************
Title: MS12-054: Vulnerabilities in Windows Networking Components Could Allow Remote Code Execution - Windows Vista SP2 (x64) - KB2712808 (Japanese)
Severity: Important
Fixlet ID: 1205423
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-054

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker sends a specially crafted response to a Windows print spooler request. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems connected directly to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-054: Vulnerabilities in Windows Networking Components Could Allow Remote Code Execution - Windows XP SP2 (x64) - KB2712808 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1205424
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-054

***************************************************************
Title: MS12-054: Vulnerabilities in Windows Networking Components Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB2705219 (Japanese)
Severity: Moderate
Fixlet ID: 1205425
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-054

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker sends a specially crafted response to a Windows print spooler request. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems connected directly to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-054: Vulnerabilities in Windows Networking Components Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB2712808 (Japanese)
Severity: Moderate
Fixlet ID: 1205427
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-054

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker sends a specially crafted response to a Windows print spooler request. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems connected directly to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-054: Vulnerabilities in Windows Networking Components Could Allow Remote Code Execution - Windows Server 2008 SP2 (x64) - KB2705219 (Japanese)
Severity: Moderate
Fixlet ID: 1205429
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-054

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker sends a specially crafted response to a Windows print spooler request. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems connected directly to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-054: Vulnerabilities in Windows Networking Components Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - KB2705219 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1205430
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-054

***************************************************************
Title: MS12-054: Vulnerabilities in Windows Networking Components Could Allow Remote Code Execution - Windows Server 2008 SP2 (x64) - KB2712808 (Japanese)
Severity: Moderate
Fixlet ID: 1205431
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-054

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker sends a specially crafted response to a Windows print spooler request. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems connected directly to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-054: Vulnerabilities in Windows Networking Components Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - KB2712808 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1205432
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-054

***************************************************************
Title: MS12-054: Vulnerabilities in Windows Networking Components Could Allow Remote Code Execution - Windows 7 Gold/SP1 - KB2705219 (Japanese)
Severity: Moderate
Fixlet ID: 1205433
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-054

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker sends a specially crafted response to a Windows print spooler request. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems connected directly to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-054: Vulnerabilities in Windows Networking Components Could Allow Remote Code Execution - Windows 7 Gold/SP1 - KB2712808 (Japanese)
Severity: Moderate
Fixlet ID: 1205435
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-054

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker sends a specially crafted response to a Windows print spooler request. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems connected directly to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-054: Vulnerabilities in Windows Networking Components Could Allow Remote Code Execution - Windows 7 Gold/SP1 (x64) - KB2705219 (Japanese)
Severity: Moderate
Fixlet ID: 1205437
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-054

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker sends a specially crafted response to a Windows print spooler request. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems connected directly to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-054: Vulnerabilities in Windows Networking Components Could Allow Remote Code Execution - Windows 7 Gold/SP1 (x64) - KB2712808 (Japanese)
Severity: Moderate
Fixlet ID: 1205439
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-054

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker sends a specially crafted response to a Windows print spooler request. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems connected directly to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-054: Vulnerabilities in Windows Networking Components Could Allow Remote Code Execution - Windows Server 2008 R2 Gold/SP1 (x64) - KB2705219 (Japanese)
Severity: Moderate
Fixlet ID: 1205441
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-054

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker sends a specially crafted response to a Windows print spooler request. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems connected directly to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-054: Vulnerabilities in Windows Networking Components Could Allow Remote Code Execution - Windows Server 2008 R2 Gold/SP1 (x64) - KB2712808 (Japanese)
Severity: Moderate
Fixlet ID: 1205443
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-054

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker sends a specially crafted response to a Windows print spooler request. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems connected directly to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-055: Vulnerability in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows XP SP3 (Japanese)
Severity: Important
Fixlet ID: 1205501
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-055

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-055: Vulnerability in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1205503
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-055

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-055: Vulnerability in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1205504
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-055

***************************************************************
Title: MS12-055: Vulnerability in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1205505
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-055

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-055: Vulnerability in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1205507
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-055

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-055: Vulnerability in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1205508
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-055

***************************************************************
Title: MS12-055: Vulnerability in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Vista SP2 (Japanese)
Severity: Important
Fixlet ID: 1205509
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-055

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-055: Vulnerability in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1205512
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-055

***************************************************************
Title: MS12-055: Vulnerability in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Server 2008 SP2 (Japanese)
Severity: Important
Fixlet ID: 1205513
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-055

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-055: Vulnerability in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Vista SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1205515
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-055

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-055: Vulnerability in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1205516
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-055

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-055: Vulnerability in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows 7 Gold/SP1 (Japanese)
Severity: Important
Fixlet ID: 1205517
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-055

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-055: Vulnerability in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1205519
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-055

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-055: Vulnerability in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1205520
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-055

***************************************************************
Title: MS12-055: Vulnerability in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1205521
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-055

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-056: Vulnerability in JScript and VBScript Engines Could Allow Remote Code Execution - JScript 5.8 and VBScript 5.8 - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1205601
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-056

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the JScript and VBScript scripting engines on 64-bit versions of Microsoft Windows. The vulnerability could allow remote code execution if a user visited a specially crafted website. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-056: Vulnerability in JScript and VBScript Engines Could Allow Remote Code Execution - JScript 5.8 and VBScript 5.8 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1205602
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-056

***************************************************************
Title: MS12-056: Vulnerability in JScript and VBScript Engines Could Allow Remote Code Execution - JScript 5.8 and VBScript 5.8 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Low
Fixlet ID: 1205603
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-056

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the JScript and VBScript scripting engines on 64-bit versions of Microsoft Windows. The vulnerability could allow remote code execution if a user visited a specially crafted website. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-056: Vulnerability in JScript and VBScript Engines Could Allow Remote Code Execution - JScript 5.8 and VBScript 5.8 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Low
Fixlet ID: 1205604
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-056

***************************************************************
Title: MS12-056: Vulnerability in JScript and VBScript Engines Could Allow Remote Code Execution - JScript 5.8 and VBScript 5.8 - Windows Vista SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1205605
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-056

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the JScript and VBScript scripting engines on 64-bit versions of Microsoft Windows. The vulnerability could allow remote code execution if a user visited a specially crafted website. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-056: Vulnerability in JScript and VBScript Engines Could Allow Remote Code Execution - JScript 5.8 and VBScript 5.8 - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Low
Fixlet ID: 1205607
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-056

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the JScript and VBScript scripting engines on 64-bit versions of Microsoft Windows. The vulnerability could allow remote code execution if a user visited a specially crafted website. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-056: Vulnerability in JScript and VBScript Engines Could Allow Remote Code Execution - JScript 5.8 and VBScript 5.8 - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1205609
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-056

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the JScript and VBScript scripting engines on 64-bit versions of Microsoft Windows. The vulnerability could allow remote code execution if a user visited a specially crafted website. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-056: Vulnerability in JScript and VBScript Engines Could Allow Remote Code Execution - JScript 5.8 and VBScript 5.8 - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Low
Fixlet ID: 1205611
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-056

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the JScript and VBScript scripting engines on 64-bit versions of Microsoft Windows. The vulnerability could allow remote code execution if a user visited a specially crafted website. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-057: Vulnerability in Microsoft Office Could Allow Remote Code Execution - Microsoft Office 2007 SP2 / SP3 (KB2596615) (Japanese)
Severity: Important
Fixlet ID: 1205701
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-057
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted file or embeds a specially crafted Computer Graphics Metafile (CGM) graphics file into an Office file. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS12-057: Vulnerability in Microsoft Office Could Allow Remote Code Execution - Microsoft Office 2007 SP2 / SP3 (KB2596754) (Japanese)
Severity: Important
Fixlet ID: 1205706
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-057
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted file or embeds a specially crafted Computer Graphics Metafile (CGM) graphics file into an Office file. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS12-057: Vulnerability in Microsoft Office Could Allow Remote Code Execution - Microsoft Office 2010 SP1 (KB2553260) (Japanese)
Severity: Important
Fixlet ID: 1205711
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-057
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted file or embeds a specially crafted Computer Graphics Metafile (CGM) graphics file into an Office file. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS12-057: Vulnerability in Microsoft Office Could Allow Remote Code Execution - Microsoft Office 2010 SP1 (KB2589322) (Japanese)
Severity: Important
Fixlet ID: 1205716
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-057
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted file or embeds a specially crafted Computer Graphics Metafile (CGM) graphics file into an Office file. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS12-057: Vulnerability in Microsoft Office Could Allow Remote Code Execution - Microsoft Office 2010 SP1 (KB2553260) (x64) (Japanese)
Severity: Important
Fixlet ID: 1205721
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-057
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted file or embeds a specially crafted Computer Graphics Metafile (CGM) graphics file into an Office file. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS12-057: Vulnerability in Microsoft Office Could Allow Remote Code Execution - Microsoft Office 2010 SP1 (KB2589322) (x64) (Japanese)
Severity: Important
Fixlet ID: 1205726
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-057
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted file or embeds a specially crafted Computer Graphics Metafile (CGM) graphics file into an Office file. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS12-058: Vulnerabilities in Microsoft Exchange Server WebReady Document Viewing Could Allow Remote Code Execution - Microsoft Exchange Server 2007 SP3 (KB2734323) (Japanese)
Severity: Critical
Fixlet ID: 1205807
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-058

Fixlet Description: Microsoft has released a security update that resolves publicly disclosed vulnerabilities in Microsoft Exchange Server WebReady Document Viewing. The vulnerabilities could allow remote code execution in the security context of the transcoding service on the Exchange server if a user previews a specially crafted file using Outlook Web App (OWA). The transcoding service in Exchange that is used for WebReady Document Viewing is running in the LocalService account. The LocalService account has minimum privileges on the local computer and presents anonymous credentials on the network. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are important information associated with the installation of this update.

***************************************************************
Title: MS12-058: Vulnerabilities in Microsoft Exchange Server WebReady Document Viewing Could Allow Remote Code Execution - Microsoft Exchange Server 2010 SP1 (KB2743248) (x64) (Japanese)
Severity: Critical
Fixlet ID: 1205809
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-058

Fixlet Description: Microsoft has released a security update that resolves publicly disclosed vulnerabilities in Microsoft Exchange Server WebReady Document Viewing. The vulnerabilities could allow remote code execution in the security context of the transcoding service on the Exchange server if a user previews a specially crafted file using Outlook Web App (OWA). The transcoding service in Exchange that is used for WebReady Document Viewing is running in the LocalService account. The LocalService account has minimum privileges on the local computer and presents anonymous credentials on the network. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are important information associated with the installation of this update.

***************************************************************
Title: MS12-058: Vulnerabilities in Microsoft Exchange Server WebReady Document Viewing Could Allow Remote Code Execution - Microsoft Exchange Server 2010 SP2 (KB2706690) (x64) (Japanese)
Severity: Critical
Fixlet ID: 1205811
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-058

Fixlet Description: Microsoft has released a security update that resolves publicly disclosed vulnerabilities in Microsoft Exchange Server WebReady Document Viewing. The vulnerabilities could allow remote code execution in the security context of the transcoding service on the Exchange server if a user previews a specially crafted file using Outlook Web App (OWA). The transcoding service in Exchange that is used for WebReady Document Viewing is running in the LocalService account. The LocalService account has minimum privileges on the local computer and presents anonymous credentials on the network. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are important information associated with the installation of this update.

***************************************************************
Title: MS12-059: Vulnerability in Microsoft Visio Could Allow Remote Code Execution - Microsoft Visio 2010 SP1 (KB2597171) (Japanese)
Severity: Important
Fixlet ID: 1205901
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-059
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Visio file. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS12-059: Vulnerability in Microsoft Visio Could Allow Remote Code Execution - Microsoft Visio 2010 SP1 (KB2597171) (x64) (Japanese)
Severity: Important
Fixlet ID: 1205906
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-059
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Visio file. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS12-059: Vulnerability in Microsoft Visio Could Allow Remote Code Execution - Microsoft Visio Viewer 2010 SP1 (KB2598287) (Japanese)
Severity: Important
Fixlet ID: 1205911
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-059
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Visio file. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS12-059: Vulnerability in Microsoft Visio Could Allow Remote Code Execution - Microsoft Visio Viewer 2010 SP1 (KB2598287) (x64) (Japanese)
Severity: Important
Fixlet ID: 1205916
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-059
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Visio file. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS12-060: Vulnerability in Windows Common Controls Could Allow Remote Code Execution - Office 2003 SP3 / Office 2003 Web Components SP3 / SQL Server 2005 Express Edition with Advanced Services SP4 / SQL Server 2005 SP4 (Japanese)
Severity: Critical
Fixlet ID: 1206001
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-060

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Windows common controls. The vulnerability could allow remote code execution if a user visits a website containing specially crafted content designed to exploit the vulnerability. In all cases, however, an attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. The malicious file could be sent as an email attachment as well, but the attacker would have to convince the user to open the attachment in order to exploit the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-060: Vulnerability in Windows Common Controls Could Allow Remote Code Execution - Office 2007 SP2 / Office 2007 SP3 / SQL Server 2008 SP2 / SQL Server 2008 SP3 / SQL Server 2008 R2 (Japanese)
Severity: Critical
Fixlet ID: 1206003
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-060

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Windows common controls. The vulnerability could allow remote code execution if a user visits a website containing specially crafted content designed to exploit the vulnerability. In all cases, however, an attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. The malicious file could be sent as an email attachment as well, but the attacker would have to convince the user to open the attachment in order to exploit the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-060: Vulnerability in Windows Common Controls Could Allow Remote Code Execution - Office 2010 SP1 (Japanese)
Severity: Critical
Fixlet ID: 1206005
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-060

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Windows common controls. The vulnerability could allow remote code execution if a user visits a website containing specially crafted content designed to exploit the vulnerability. In all cases, however, an attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. The malicious file could be sent as an email attachment as well, but the attacker would have to convince the user to open the attachment in order to exploit the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-060: Vulnerability in Windows Common Controls Could Allow Remote Code Execution - SQL Server 2000 SP4 - GDR Branch (Japanese)
Severity: Critical
Fixlet ID: 1206009
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-060

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Windows common controls. The vulnerability could allow remote code execution if a user visits a website containing specially crafted content designed to exploit the vulnerability. In all cases, however, an attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. The malicious file could be sent as an email attachment as well, but the attacker would have to convince the user to open the attachment in order to exploit the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-060: Vulnerability in Windows Common Controls Could Allow Remote Code Execution - SQL Server 2000 Analysis Services Service SP4 - QFE Branch (Japanese)
Severity: Critical
Fixlet ID: 1206011
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-060

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Windows common controls. The vulnerability could allow remote code execution if a user visits a website containing specially crafted content designed to exploit the vulnerability. In all cases, however, an attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. The malicious file could be sent as an email attachment as well, but the attacker would have to convince the user to open the attachment in order to exploit the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-060: Vulnerability in Windows Common Controls Could Allow Remote Code Execution - Host Integration Server 2004 SP1 (Japanese)
Severity: Critical
Fixlet ID: 1206021
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-060

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Windows common controls. The vulnerability could allow remote code execution if a user visits a website containing specially crafted content designed to exploit the vulnerability. In all cases, however, an attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. The malicious file could be sent as an email attachment as well, but the attacker would have to convince the user to open the attachment in order to exploit the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-060: Vulnerability in Windows Common Controls Could Allow Remote Code Execution - Visual FoxPro 8.0 SP1 (Japanese)
Severity: Critical
Fixlet ID: 1206023
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-060

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Windows common controls. The vulnerability could allow remote code execution if a user visits a website containing specially crafted content designed to exploit the vulnerability. In all cases, however, an attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. The malicious file could be sent as an email attachment as well, but the attacker would have to convince the user to open the attachment in order to exploit the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-060: Vulnerability in Windows Common Controls Could Allow Remote Code Execution - Visual FoxPro 9.0 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1206025
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-060

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Windows common controls. The vulnerability could allow remote code execution if a user visits a website containing specially crafted content designed to exploit the vulnerability. In all cases, however, an attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. The malicious file could be sent as an email attachment as well, but the attacker would have to convince the user to open the attachment in order to exploit the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-060: Vulnerability in Windows Common Controls Could Allow Remote Code Execution - Visual Basic 6.0 SP6 (Japanese)
Severity: Critical
Fixlet ID: 1206027
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-060

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Windows common controls. The vulnerability could allow remote code execution if a user visits a website containing specially crafted content designed to exploit the vulnerability. In all cases, however, an attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. The malicious file could be sent as an email attachment as well, but the attacker would have to convince the user to open the attachment in order to exploit the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-060: Vulnerability in Windows Common Controls Could Allow Remote Code Execution - SQL Server 2000 SP4 - QFE Branch (Japanese)
Severity: Critical
Fixlet ID: 1206029
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-060

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Windows common controls. The vulnerability could allow remote code execution if a user visits a website containing specially crafted content designed to exploit the vulnerability. In all cases, however, an attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. The malicious file could be sent as an email attachment as well, but the attacker would have to convince the user to open the attachment in order to exploit the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: UPDATE: SQL Server 2008 Service Pack 2 Available (Japanese)
Severity: <Unspecified>
Fixlet ID: 228506801
Fixlet Link: http://social.technet.microsoft.com/wiki/contents/articles/microsoft-sql-server-2008-sp2-release-notes.aspx

Fixlet Description: Microsoft SQL Server 2008 Service Pack 2 (SP2) is now available for download. These packages may be used to upgrade any edition of SQL Server 2008. Service Pack 2 contains updates for SQL Server Utility, Data-Tier Application (DAC), as well as integration capability for Microsoft Reporting Services with the Microsoft SharePoint 2010 Technologies. Service Pack 2 introduces support for a maximum of 15,000 partitions in a database, and includes SQL Server 2008 SP1 Cumulative Update 1 to 8. 

Important Note: SQL Server instances operating in a non-Microsoft cluster environment should be upgraded using the CLUSTERPASSIVE option. Please use the second action below to upgrade in these environments.

***************************************************************
Title: UPDATE: SQL Server 2008 Service Pack 2 Available (x64) (Japanese)
Severity: <Unspecified>
Fixlet ID: 228506803
Fixlet Link: http://social.technet.microsoft.com/wiki/contents/articles/microsoft-sql-server-2008-sp2-release-notes.aspx

Fixlet Description: Microsoft SQL Server 2008 Service Pack 2 (SP2) is now available for download. These packages may be used to upgrade any edition of SQL Server 2008. Service Pack 2 contains updates for SQL Server Utility, Data-Tier Application (DAC), as well as integration capability for Microsoft Reporting Services with the Microsoft SharePoint 2010 Technologies. Service Pack 2 introduces support for a maximum of 15,000 partitions in a database, and includes SQL Server 2008 SP1 Cumulative Update 1 to 8. 

Important Note: SQL Server instances operating in a non-Microsoft cluster environment should be upgraded using the CLUSTERPASSIVE option. Please use the second action below to upgrade in these environments.



More information about the BigFix-Announcements-Japan mailing list