[BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)'

autonotify at us.ibm.com autonotify at us.ibm.com
Sat Aug 18 02:41:12 PDT 2012


Fixlet Site - 'Patches for Windows (Japanese)'
Current Version: 489	Published: Fri, 17 Aug 2012 09:11:54  GMT

New Fixlets:
============

***************************************************************
Title: MS12-043: Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution - XML Core Services 5.0 - Office 2003 SP3 (V2.0) (Japanese)
Severity: Critical
Fixlet ID: 1204331
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-043

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft XML Core Services. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes the user to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-043: Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution - XML Core Services 5.0 - Office 2007 SP2/SP3 / Word Viewer / Office Compatibility Pack SP2/SP3 / Expression Web (V2.0) (Japanese)
Severity: Critical
Fixlet ID: 1204333
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-043

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft XML Core Services. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes the user to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-043: Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution - XML Core Services 5.0 - Groove 2007 SP2/SP3 / Office SharePoint Server 2007 SP2/SP3 (V2.0) (Japanese)
Severity: Critical
Fixlet ID: 1204335
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-043

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft XML Core Services. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes the user to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-043: Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution - XML Core Services 5.0 - Office SharePoint Server 2007 SP2/SP3 / Groove Server 2007 SP2/SP3 (x64) (V2.0) (Japanese)
Severity: Critical
Fixlet ID: 1204337
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-043

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft XML Core Services. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes the user to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.



More information about the BigFix-Announcements-Japan mailing list