[BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)'

autonotify at us.ibm.com autonotify at us.ibm.com
Thu Feb 16 02:58:12 PST 2012


Fixlet Site - 'Patches for Windows (Japanese)'
Current Version: 458	Published:  GMT

New Fixlets:
============

***************************************************************
Title: MS12-008: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows XP SP3 (Japanese)
Severity: Remote Code Execution
Fixlet ID: 1200801
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-008

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability and a publicly disclosed vulnerability in Microsoft Windows. The more severe of these vulnerabilities could allow remote code execution if a user visits a website containing specially crafted content or if a specially crafted application is run locally. An attacker would have no way to force users to visit a malicious website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-008: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Remote Code Execution
Fixlet ID: 1200802
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-008

***************************************************************
Title: MS12-008: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows XP SP2 (x64) (Japanese)
Severity: Remote Code Execution
Fixlet ID: 1200803
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-008

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability and a publicly disclosed vulnerability in Microsoft Windows. The more severe of these vulnerabilities could allow remote code execution if a user visits a website containing specially crafted content or if a specially crafted application is run locally. An attacker would have no way to force users to visit a malicious website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-008: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Remote Code Execution
Fixlet ID: 1200804
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-008

***************************************************************
Title: MS12-008: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows Server 2003 SP2 (Japanese)
Severity: Remote Code Execution
Fixlet ID: 1200805
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-008

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability and a publicly disclosed vulnerability in Microsoft Windows. The more severe of these vulnerabilities could allow remote code execution if a user visits a website containing specially crafted content or if a specially crafted application is run locally. An attacker would have no way to force users to visit a malicious website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-008: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Remote Code Execution
Fixlet ID: 1200806
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-008

***************************************************************
Title: MS12-008: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Remote Code Execution
Fixlet ID: 1200807
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-008

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability and a publicly disclosed vulnerability in Microsoft Windows. The more severe of these vulnerabilities could allow remote code execution if a user visits a website containing specially crafted content or if a specially crafted application is run locally. An attacker would have no way to force users to visit a malicious website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-008: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Remote Code Execution
Fixlet ID: 1200808
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-008

***************************************************************
Title: MS12-008: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows Vista SP2 (Japanese)
Severity: Remote Code Execution
Fixlet ID: 1200809
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-008

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability and a publicly disclosed vulnerability in Microsoft Windows. The more severe of these vulnerabilities could allow remote code execution if a user visits a website containing specially crafted content or if a specially crafted application is run locally. An attacker would have no way to force users to visit a malicious website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-008: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows Vista SP2 (x64) (Japanese)
Severity: Remote Code Execution
Fixlet ID: 1200811
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-008

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability and a publicly disclosed vulnerability in Microsoft Windows. The more severe of these vulnerabilities could allow remote code execution if a user visits a website containing specially crafted content or if a specially crafted application is run locally. An attacker would have no way to force users to visit a malicious website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-008: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows Server 2008 SP2 (Japanese)
Severity: Remote Code Execution
Fixlet ID: 1200813
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-008

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability and a publicly disclosed vulnerability in Microsoft Windows. The more severe of these vulnerabilities could allow remote code execution if a user visits a website containing specially crafted content or if a specially crafted application is run locally. An attacker would have no way to force users to visit a malicious website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-008: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Remote Code Execution
Fixlet ID: 1200815
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-008

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability and a publicly disclosed vulnerability in Microsoft Windows. The more severe of these vulnerabilities could allow remote code execution if a user visits a website containing specially crafted content or if a specially crafted application is run locally. An attacker would have no way to force users to visit a malicious website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-008: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows 7 Gold/SP1 (Japanese)
Severity: Remote Code Execution
Fixlet ID: 1200817
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-008

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability and a publicly disclosed vulnerability in Microsoft Windows. The more severe of these vulnerabilities could allow remote code execution if a user visits a website containing specially crafted content or if a specially crafted application is run locally. An attacker would have no way to force users to visit a malicious website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-008: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: Remote Code Execution
Fixlet ID: 1200819
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-008

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability and a publicly disclosed vulnerability in Microsoft Windows. The more severe of these vulnerabilities could allow remote code execution if a user visits a website containing specially crafted content or if a specially crafted application is run locally. An attacker would have no way to force users to visit a malicious website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-008: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Remote Code Execution
Fixlet ID: 1200821
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-008

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability and a publicly disclosed vulnerability in Microsoft Windows. The more severe of these vulnerabilities could allow remote code execution if a user visits a website containing specially crafted content or if a specially crafted application is run locally. An attacker would have no way to force users to visit a malicious website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-009: Vulnerabilities in Ancillary Function Driver Could Allow Elevation of Privilege - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1200901
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-009

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to a user's system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-009: Vulnerabilities in Ancillary Function Driver Could Allow Elevation of Privilege - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1200902
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-009

***************************************************************
Title: MS12-009: Vulnerabilities in Ancillary Function Driver Could Allow Elevation of Privilege - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1200903
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-009

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to a user's system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-009: Vulnerabilities in Ancillary Function Driver Could Allow Elevation of Privilege - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1200904
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-009

***************************************************************
Title: MS12-009: Vulnerabilities in Ancillary Function Driver Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1200905
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-009

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to a user's system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-009: Vulnerabilities in Ancillary Function Driver Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1200906
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-009

***************************************************************
Title: MS12-009: Vulnerabilities in Ancillary Function Driver Could Allow Elevation of Privilege - Windows Vista SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1200907
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-009

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to a user's system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-009: Vulnerabilities in Ancillary Function Driver Could Allow Elevation of Privilege - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1200909
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-009

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to a user's system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-009: Vulnerabilities in Ancillary Function Driver Could Allow Elevation of Privilege - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1200911
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-009

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to a user's system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-009: Vulnerabilities in Ancillary Function Driver Could Allow Elevation of Privilege - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1200913
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-009

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to a user's system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-010: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP3 (Japanese)
Severity: Moderate
Fixlet ID: 1201001
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-010

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-010: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1201002
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-010

***************************************************************
Title: MS12-010: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1201003
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-010

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-010: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1201004
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-010

***************************************************************
Title: MS12-010: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (Japanese)
Severity: None
Fixlet ID: 1201005
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-010

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-010: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: None
Fixlet ID: 1201006
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-010

***************************************************************
Title: MS12-010: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: No severity rating[1]
Fixlet ID: 1201007
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-010

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-010: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: No severity rating[1]
Fixlet ID: 1201008
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-010

***************************************************************
Title: MS12-010: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1201009
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-010

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-010: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1201010
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-010

***************************************************************
Title: MS12-010: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1201011
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-010

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-010: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1201012
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-010

***************************************************************
Title: MS12-010: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1201013
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-010

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-010: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1201014
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-010

***************************************************************
Title: MS12-010: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1201015
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-010

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-010: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1201016
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-010

***************************************************************
Title: MS12-010: Cumulative Security Update for Internet Explorer - IE 7 - Windows Vista SP2 (Japanese)
Severity: Critical
Fixlet ID: 1201017
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-010

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-010: Cumulative Security Update for Internet Explorer - IE 7 - Windows Vista SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1201019
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-010

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-010: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2008 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1201021
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-010

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-010: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1201023
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-010

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-010: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1201025
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-010

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-010: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1201026
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-010

***************************************************************
Title: MS12-010: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1201027
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-010

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-010: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1201028
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-010

***************************************************************
Title: MS12-010: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1201029
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-010

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-010: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1201030
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-010

***************************************************************
Title: MS12-010: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1201031
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-010

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-010: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1201032
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-010

***************************************************************
Title: MS12-010: Cumulative Security Update for Internet Explorer - IE 8 - Windows Vista SP2 (Japanese)
Severity: Critical
Fixlet ID: 1201033
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-010

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-010: Cumulative Security Update for Internet Explorer - IE 8 - Windows Vista SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1201035
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-010

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-010: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2008 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1201037
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-010

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-010: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1201039
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-010

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-010: Cumulative Security Update for Internet Explorer - IE 8 - Windows 7 Gold/SP1 (Japanese)
Severity: Critical
Fixlet ID: 1201041
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-010

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-010: Cumulative Security Update for Internet Explorer - IE 8 - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1201043
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-010

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-010: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1201045
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-010

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-010: Cumulative Security Update for Internet Explorer - IE 9 - Windows Vista SP2 (Japanese)
Severity: Critical
Fixlet ID: 1201047
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-010

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-010: Cumulative Security Update for Internet Explorer - IE 9 - Windows Vista SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1201049
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-010

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-010: Cumulative Security Update for Internet Explorer - IE 9 - Windows Server 2008 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1201051
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-010

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-010: Cumulative Security Update for Internet Explorer - IE 9 - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1201053
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-010

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-010: Cumulative Security Update for Internet Explorer - IE 9 - Windows 7 Gold/SP1 (Japanese)
Severity: Critical
Fixlet ID: 1201055
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-010

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-010: Cumulative Security Update for Internet Explorer - IE 9 - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1201057
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-010

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-010: Cumulative Security Update for Internet Explorer - IE 9 - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1201059
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-010

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-011: Vulnerabilities in Microsoft SharePoint Could Allow Elevation of Privilege - Sharepoint Server 2010 Gold/Sp1 (moss) (x64) (Japanese)
Severity: Important
Fixlet ID: 1201101
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-011

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft SharePoint and Microsoft SharePoint Foundation. These vulnerabilities could allow elevation of privilege or information disclosure if a user clicked a specially crafted URL. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-011: Vulnerabilities in Microsoft SharePoint Could Allow Elevation of Privilege - SharePoint Foundation 2010 Gold/Sp1 (sts) (x64) (Japanese)
Severity: Important
Fixlet ID: 1201103
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-011

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft SharePoint and Microsoft SharePoint Foundation. These vulnerabilities could allow elevation of privilege or information disclosure if a user clicked a specially crafted URL. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-012: Vulnerability in Color Control Panel Could Allow Remote Code Execution - Windows Server 2008 SP2 (Japanese)
Severity: Important
Fixlet ID: 1201201
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-012

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a legitimate file (such as an .icm or .icc file) that is located in the same directory as a specially crafted dynamic link library (DLL) file. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-012: Vulnerability in Color Control Panel Could Allow Remote Code Execution - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1201203
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-012

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a legitimate file (such as an .icm or .icc file) that is located in the same directory as a specially crafted dynamic link library (DLL) file. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-012: Vulnerability in Color Control Panel Could Allow Remote Code Execution - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1201205
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-012

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a legitimate file (such as an .icm or .icc file) that is located in the same directory as a specially crafted dynamic link library (DLL) file. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-013: Vulnerability in C Run-Time Library Could Allow Remote Code Execution - Windows Vista SP2 (Japanese)
Severity: Remote Code Execution
Fixlet ID: 1201301
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-013

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted media file that is hosted on a website or sent as an email attachment. An attacker who successfully exploited the vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-013: Vulnerability in C Run-Time Library Could Allow Remote Code Execution - Windows Vista SP2 (x64) (Japanese)
Severity: Remote Code Execution
Fixlet ID: 1201303
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-013

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted media file that is hosted on a website or sent as an email attachment. An attacker who successfully exploited the vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-013: Vulnerability in C Run-Time Library Could Allow Remote Code Execution - Windows Server 2008 SP2 (Japanese)
Severity: Remote Code Execution
Fixlet ID: 1201305
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-013

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted media file that is hosted on a website or sent as an email attachment. An attacker who successfully exploited the vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-013: Vulnerability in C Run-Time Library Could Allow Remote Code Execution - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Remote Code Execution
Fixlet ID: 1201307
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-013

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted media file that is hosted on a website or sent as an email attachment. An attacker who successfully exploited the vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-013: Vulnerability in C Run-Time Library Could Allow Remote Code Execution - Windows 7 Gold/SP1 (Japanese)
Severity: Remote Code Execution
Fixlet ID: 1201309
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-013

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted media file that is hosted on a website or sent as an email attachment. An attacker who successfully exploited the vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-013: Vulnerability in C Run-Time Library Could Allow Remote Code Execution - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: Remote Code Execution
Fixlet ID: 1201311
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-013

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted media file that is hosted on a website or sent as an email attachment. An attacker who successfully exploited the vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-013: Vulnerability in C Run-Time Library Could Allow Remote Code Execution - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Remote Code Execution
Fixlet ID: 1201313
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-013

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted media file that is hosted on a website or sent as an email attachment. An attacker who successfully exploited the vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-014: Vulnerability in Indeo Codec Could Allow Remote Code Execution - Windows XP SP3 (Japanese)
Severity: Important
Fixlet ID: 1201401
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-014

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a legitimate file (such as an .avi file) that is located in the same directory as a specially crafted dynamic link library (DLL) file. An attacker who successfully exploited this vulnerability could run arbitrary code as the logged-on user. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. If a user is logged on with administrative user rights, an attacker could take complete control of the affected system. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-015: Vulnerabilities in Microsoft Visio Viewer 2010 Could Allow Remote Code Execution - Visio Viewer 2010 (Japanese)
Severity: Important
Fixlet ID: 1201501
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-015

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a specially crafted Visio file. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-015: Vulnerabilities in Microsoft Visio Viewer 2010 Could Allow Remote Code Execution - Visio Viewer 2010 (x64) (Japanese)
Severity: Important
Fixlet ID: 1201503
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-015

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a specially crafted Visio file. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-016: Vulnerabilities in .NET Framework and Microsoft Silverlight Could Allow Remote Code Execution - Microsoft .NET Framework 2.0 SP2 - Windows XP SP3 / 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1201601
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-016

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted web page using a web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-016: Vulnerabilities in .NET Framework and Microsoft Silverlight Could Allow Remote Code Execution - Microsoft .NET Framework 2.0 SP2 - Windows XP SP3 / 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1201602
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-016

***************************************************************
Title: MS12-016: Vulnerabilities in .NET Framework and Microsoft Silverlight Could Allow Remote Code Execution - Microsoft .NET Framework 4 - Windows XP SP3 / 2003 SP2 / Vista SP2 / 2008 SP2 / 7 Gold/SP1 (Japanese)
Severity: Critical
Fixlet ID: 1201603
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-016

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted web page using a web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-016: Vulnerabilities in .NET Framework and Microsoft Silverlight Could Allow Remote Code Execution - Microsoft .NET Framework 2.0 SP2 - Windows XP SP2 / 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1201605
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-016

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted web page using a web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-016: Vulnerabilities in .NET Framework and Microsoft Silverlight Could Allow Remote Code Execution - Microsoft .NET Framework 2.0 SP2 - Windows XP SP2 / 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1201606
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-016

***************************************************************
Title: MS12-016: Vulnerabilities in .NET Framework and Microsoft Silverlight Could Allow Remote Code Execution - Microsoft .NET Framework 4 - Windows XP SP2 / 2003 SP2 / Vista SP2 / 2008 SP2 / 7 Gold/SP1 / 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1201607
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-016

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted web page using a web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-016: Vulnerabilities in .NET Framework and Microsoft Silverlight Could Allow Remote Code Execution - Microsoft .NET Framework 2.0 SP2 - Windows Vista SP2 / 2008 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1201609
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-016

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted web page using a web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-016: Vulnerabilities in .NET Framework and Microsoft Silverlight Could Allow Remote Code Execution - Microsoft .NET Framework 2.0 SP2 - Windows Vista SP2 / 2008 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1201611
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-016

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted web page using a web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-016: Vulnerabilities in .NET Framework and Microsoft Silverlight Could Allow Remote Code Execution - Microsoft .NET Framework 3.5.1 - Windows 7 Gold (Japanese)
Severity: Critical
Fixlet ID: 1201613
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-016

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted web page using a web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-016: Vulnerabilities in .NET Framework and Microsoft Silverlight Could Allow Remote Code Execution - Microsoft .NET Framework 3.5.1 - Windows 7 SP1 (Japanese)
Severity: Critical
Fixlet ID: 1201615
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-016

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted web page using a web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-016: Vulnerabilities in .NET Framework and Microsoft Silverlight Could Allow Remote Code Execution - Microsoft .NET Framework 3.5.1 - Windows 7 / 2008 R2 Gold (x64) (Japanese)
Severity: Critical
Fixlet ID: 1201617
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-016

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted web page using a web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-016: Vulnerabilities in .NET Framework and Microsoft Silverlight Could Allow Remote Code Execution - Microsoft .NET Framework 3.5.1 - Windows 7 SP1 / 2008 R2 SP1 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1201619
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-016

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted web page using a web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-016: Vulnerabilities in .NET Framework and Microsoft Silverlight Could Allow Remote Code Execution - Microsoft Silverlight 4 (Japanese)
Severity: Critical
Fixlet ID: 1201621
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-016

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted web page using a web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-016: Vulnerabilities in .NET Framework and Microsoft Silverlight Could Allow Remote Code Execution - Microsoft Silverlight 4 for Developer (Japanese)
Severity: Critical
Fixlet ID: 1201622
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-016

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted web page using a web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.



More information about the BigFix-Announcements-Japan mailing list