[BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)'

autonotify at us.ibm.com autonotify at us.ibm.com
Thu Jan 12 02:40:08 PST 2012


Fixlet Site - 'Patches for Windows (Japanese)'
Current Version: 455	Published: Wed, 11 Jan 2012 10:52:57  GMT

New Fixlets:
============

***************************************************************
Title: MS11-089: Vulnerability in Microsoft Office Could Allow Remote Code Execution - Visio Viewer 2010 (Japanese)
Severity: Important
Fixlet ID: 1108917
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-089
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Word file. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS11-089: Vulnerability in Microsoft Office Could Allow Remote Code Execution - Visio 2010 (Japanese)
Severity: Important
Fixlet ID: 1108921
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS11-089
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Word file. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS12-001: Vulnerability in Windows Kernel Could Allow Security Feature Bypass - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1200101
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-001

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow an attacker to bypass the SafeSEH security feature in a software application. An attacker could then use other vulnerabilities to leverage the structured exception handler to run arbitrary code. Only software applications that were compiled using Microsoft Visual C++ .NET 2003 can be used to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-001: Vulnerability in Windows Kernel Could Allow Security Feature Bypass - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1200102
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-001

***************************************************************
Title: MS12-001: Vulnerability in Windows Kernel Could Allow Security Feature Bypass - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1200103
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-001

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow an attacker to bypass the SafeSEH security feature in a software application. An attacker could then use other vulnerabilities to leverage the structured exception handler to run arbitrary code. Only software applications that were compiled using Microsoft Visual C++ .NET 2003 can be used to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-001: Vulnerability in Windows Kernel Could Allow Security Feature Bypass - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1200104
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-001

***************************************************************
Title: MS12-001: Vulnerability in Windows Kernel Could Allow Security Feature Bypass - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1200105
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-001

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow an attacker to bypass the SafeSEH security feature in a software application. An attacker could then use other vulnerabilities to leverage the structured exception handler to run arbitrary code. Only software applications that were compiled using Microsoft Visual C++ .NET 2003 can be used to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-001: Vulnerability in Windows Kernel Could Allow Security Feature Bypass - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1200106
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-001

***************************************************************
Title: MS12-001: Vulnerability in Windows Kernel Could Allow Security Feature Bypass - Windows Vista SP2 (Japanese)
Severity: Important
Fixlet ID: 1200107
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-001

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow an attacker to bypass the SafeSEH security feature in a software application. An attacker could then use other vulnerabilities to leverage the structured exception handler to run arbitrary code. Only software applications that were compiled using Microsoft Visual C++ .NET 2003 can be used to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-001: Vulnerability in Windows Kernel Could Allow Security Feature Bypass - Windows Vista SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1200109
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-001

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow an attacker to bypass the SafeSEH security feature in a software application. An attacker could then use other vulnerabilities to leverage the structured exception handler to run arbitrary code. Only software applications that were compiled using Microsoft Visual C++ .NET 2003 can be used to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-001: Vulnerability in Windows Kernel Could Allow Security Feature Bypass - Windows Server 2008 SP2 (Japanese)
Severity: Important
Fixlet ID: 1200111
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-001

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow an attacker to bypass the SafeSEH security feature in a software application. An attacker could then use other vulnerabilities to leverage the structured exception handler to run arbitrary code. Only software applications that were compiled using Microsoft Visual C++ .NET 2003 can be used to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-001: Vulnerability in Windows Kernel Could Allow Security Feature Bypass - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1200113
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-001

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow an attacker to bypass the SafeSEH security feature in a software application. An attacker could then use other vulnerabilities to leverage the structured exception handler to run arbitrary code. Only software applications that were compiled using Microsoft Visual C++ .NET 2003 can be used to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-001: Vulnerability in Windows Kernel Could Allow Security Feature Bypass - Windows 7 Gold/SP1 (Japanese)
Severity: Important
Fixlet ID: 1200115
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-001

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow an attacker to bypass the SafeSEH security feature in a software application. An attacker could then use other vulnerabilities to leverage the structured exception handler to run arbitrary code. Only software applications that were compiled using Microsoft Visual C++ .NET 2003 can be used to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-001: Vulnerability in Windows Kernel Could Allow Security Feature Bypass - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1200117
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-001

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow an attacker to bypass the SafeSEH security feature in a software application. An attacker could then use other vulnerabilities to leverage the structured exception handler to run arbitrary code. Only software applications that were compiled using Microsoft Visual C++ .NET 2003 can be used to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-001: Vulnerability in Windows Kernel Could Allow Security Feature Bypass - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1200119
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-001

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow an attacker to bypass the SafeSEH security feature in a software application. An attacker could then use other vulnerabilities to leverage the structured exception handler to run arbitrary code. Only software applications that were compiled using Microsoft Visual C++ .NET 2003 can be used to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-002: Vulnerability in Windows Object Packager Could Allow Remote Code Execution - Windows XP SP3 (Japanese)
Severity: Important
Fixlet ID: 1200201
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-002

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a legitimate file with an embedded packaged object that is located in the same network directory as a specially crafted executable file. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-002: Vulnerability in Windows Object Packager Could Allow Remote Code Execution - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1200203
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-002

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a legitimate file with an embedded packaged object that is located in the same network directory as a specially crafted executable file. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-002: Vulnerability in Windows Object Packager Could Allow Remote Code Execution - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1200205
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-002

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a legitimate file with an embedded packaged object that is located in the same network directory as a specially crafted executable file. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-002: Vulnerability in Windows Object Packager Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1200207
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-002

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a legitimate file with an embedded packaged object that is located in the same network directory as a specially crafted executable file. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-003: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows XP SP3 (Japanese)
Severity: Important
Fixlet ID: 1200301
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-003

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Windows. This security update is rated Important for all supported editions of Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. All supported editions of Windows 7 and Windows Server 2008 R2 are not affected by this vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-003: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1200302
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-003

***************************************************************
Title: MS12-003: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1200303
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-003

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Windows. This security update is rated Important for all supported editions of Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. All supported editions of Windows 7 and Windows Server 2008 R2 are not affected by this vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-003: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1200304
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-003

***************************************************************
Title: MS12-003: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1200305
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-003

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Windows. This security update is rated Important for all supported editions of Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. All supported editions of Windows 7 and Windows Server 2008 R2 are not affected by this vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-003: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1200306
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-003

***************************************************************
Title: MS12-003: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1200307
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-003

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Windows. This security update is rated Important for all supported editions of Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. All supported editions of Windows 7 and Windows Server 2008 R2 are not affected by this vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-003: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1200308
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-003

***************************************************************
Title: MS12-003: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Vista SP2 (Japanese)
Severity: Important
Fixlet ID: 1200309
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-003

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Windows. This security update is rated Important for all supported editions of Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. All supported editions of Windows 7 and Windows Server 2008 R2 are not affected by this vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-003: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Vista SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1200311
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-003

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Windows. This security update is rated Important for all supported editions of Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. All supported editions of Windows 7 and Windows Server 2008 R2 are not affected by this vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-003: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Server 2008 SP2 (Japanese)
Severity: Important
Fixlet ID: 1200313
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-003

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Windows. This security update is rated Important for all supported editions of Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. All supported editions of Windows 7 and Windows Server 2008 R2 are not affected by this vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-003: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1200315
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-003

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Windows. This security update is rated Important for all supported editions of Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. All supported editions of Windows 7 and Windows Server 2008 R2 are not affected by this vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - Windows Multimedia Library - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1200401
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-004

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - Windows Multimedia Library - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1200402
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-004

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - DirectShow - Windows XP Media Center Edition 2005 SP3 (Japanese)
Severity: Important
Fixlet ID: 1200403
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-004

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - DirectShow - Windows XP Media Center Edition 2005 SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1200404
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-004

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - Windows Multimedia Library - Windows XP Media Center Edition 2005 SP3 (Japanese)
Severity: Critical
Fixlet ID: 1200405
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-004

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - Windows Multimedia Library - Windows XP Media Center Edition 2005 SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1200406
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-004

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - Windows Multimedia Library - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1200407
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-004

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - Windows Multimedia Library - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1200408
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-004

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - DirectShow - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1200409
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-004

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - DirectShow - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1200410
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-004

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - Windows Multimedia Library - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1200411
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-004

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - Windows Multimedia Library - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1200412
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-004

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - DirectShow - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1200413
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-004

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - DirectShow - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1200414
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-004

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - Windows Multimedia Library - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1200415
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-004

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - Windows Multimedia Library - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1200416
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-004

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - DirectShow - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1200417
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-004

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - DirectShow - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1200418
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-004

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - Windows Multimedia Library - Windows Vista SP2 (Japanese)
Severity: Critical
Fixlet ID: 1200419
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-004

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - DirectShow - Windows Vista SP2 (Japanese)
Severity: Important
Fixlet ID: 1200421
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-004

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - Windows Multimedia Library - Windows Vista SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1200423
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-004

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - DirectShow - Windows Vista SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1200425
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-004

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - Windows Multimedia Library - Windows Server 2008 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1200427
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-004

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - DirectShow - Windows Server 2008 SP2 (Japanese)
Severity: Important
Fixlet ID: 1200429
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-004

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - Windows Multimedia Library - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1200431
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-004

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - DirectShow - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1200433
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-004

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - DirectShow - Windows 7 Gold/SP1 (Japanese)
Severity: Important
Fixlet ID: 1200435
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-004

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - DirectShow - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1200437
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-004

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - DirectShow - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1200439
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-004

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - Windows Media Center TV Pack - Windows Vista SP1/SP2 (Japanese)
Severity: Important
Fixlet ID: 1200441
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-004

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - Windows Media Center TV Pack - Windows Vista SP1/SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1200443
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-004

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - DirectShow - Windows XP SP3 (Japanese)
Severity: Important
Fixlet ID: 1200445
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-004

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - DirectShow - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1200446
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-004

***************************************************************
Title: MS12-005: Vulnerability in Microsoft Windows Could Allow Remote Code Execution - Windows XP SP3 (Japanese)
Severity: Important
Fixlet ID: 1200501
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-005

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted Microsoft Office file containing a malicious embedded ClickOnce application. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-005: Vulnerability in Microsoft Windows Could Allow Remote Code Execution - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1200502
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-005

***************************************************************
Title: MS12-005: Vulnerability in Microsoft Windows Could Allow Remote Code Execution - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1200503
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-005

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted Microsoft Office file containing a malicious embedded ClickOnce application. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-005: Vulnerability in Microsoft Windows Could Allow Remote Code Execution - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1200504
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-005

***************************************************************
Title: MS12-005: Vulnerability in Microsoft Windows Could Allow Remote Code Execution - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1200505
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-005

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted Microsoft Office file containing a malicious embedded ClickOnce application. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-005: Vulnerability in Microsoft Windows Could Allow Remote Code Execution - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1200506
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-005

***************************************************************
Title: MS12-005: Vulnerability in Microsoft Windows Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1200507
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-005

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted Microsoft Office file containing a malicious embedded ClickOnce application. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-005: Vulnerability in Microsoft Windows Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1200508
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-005

***************************************************************
Title: MS12-005: Vulnerability in Microsoft Windows Could Allow Remote Code Execution - Windows Vista SP2 (Japanese)
Severity: Important
Fixlet ID: 1200509
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-005

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted Microsoft Office file containing a malicious embedded ClickOnce application. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-005: Vulnerability in Microsoft Windows Could Allow Remote Code Execution - Windows Vista SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1200511
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-005

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted Microsoft Office file containing a malicious embedded ClickOnce application. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-005: Vulnerability in Microsoft Windows Could Allow Remote Code Execution - Windows Server 2008 SP2 (Japanese)
Severity: Important
Fixlet ID: 1200513
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-005

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted Microsoft Office file containing a malicious embedded ClickOnce application. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-005: Vulnerability in Microsoft Windows Could Allow Remote Code Execution - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1200515
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-005

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted Microsoft Office file containing a malicious embedded ClickOnce application. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-005: Vulnerability in Microsoft Windows Could Allow Remote Code Execution - Windows 7 Gold/SP1 (Japanese)
Severity: Important
Fixlet ID: 1200517
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-005

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted Microsoft Office file containing a malicious embedded ClickOnce application. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-005: Vulnerability in Microsoft Windows Could Allow Remote Code Execution - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1200519
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-005

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted Microsoft Office file containing a malicious embedded ClickOnce application. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-005: Vulnerability in Microsoft Windows Could Allow Remote Code Execution - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1200521
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-005

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted Microsoft Office file containing a malicious embedded ClickOnce application. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-006: Vulnerability in SSL/TLS Could Allow Information Disclosure - Windows XP SP3 (Japanese)
Severity: Important
Fixlet ID: 1200601
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-006

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in SSL 3.0 and TLS 1.0. This vulnerability affects the protocol itself and is not specific to the Windows operating system. The vulnerability could allow information disclosure if an attacker intercepts encrypted web traffic served from an affected system. TLS 1.1, TLS 1.2, and all cipher suites that do not use CBC mode are not affected. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-006: Vulnerability in SSL/TLS Could Allow Information Disclosure - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1200602
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-006

***************************************************************
Title: MS12-006: Vulnerability in SSL/TLS Could Allow Information Disclosure - Windows XP SP2 (KB2585542) (x64) (Japanese)
Severity: Important
Fixlet ID: 1200603
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-006

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in SSL 3.0 and TLS 1.0. This vulnerability affects the protocol itself and is not specific to the Windows operating system. The vulnerability could allow information disclosure if an attacker intercepts encrypted web traffic served from an affected system. TLS 1.1, TLS 1.2, and all cipher suites that do not use CBC mode are not affected. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-006: Vulnerability in SSL/TLS Could Allow Information Disclosure - Windows XP SP2 (KB2585542) (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1200604
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-006

***************************************************************
Title: MS12-006: Vulnerability in SSL/TLS Could Allow Information Disclosure - Windows XP SP2 (KB2638806) (x64) (Japanese)
Severity: Important
Fixlet ID: 1200605
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-006

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in SSL 3.0 and TLS 1.0. This vulnerability affects the protocol itself and is not specific to the Windows operating system. The vulnerability could allow information disclosure if an attacker intercepts encrypted web traffic served from an affected system. TLS 1.1, TLS 1.2, and all cipher suites that do not use CBC mode are not affected. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-006: Vulnerability in SSL/TLS Could Allow Information Disclosure - Windows Server 2003 SP2 (KB2585542) (Japanese)
Severity: Important
Fixlet ID: 1200607
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-006

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in SSL 3.0 and TLS 1.0. This vulnerability affects the protocol itself and is not specific to the Windows operating system. The vulnerability could allow information disclosure if an attacker intercepts encrypted web traffic served from an affected system. TLS 1.1, TLS 1.2, and all cipher suites that do not use CBC mode are not affected. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-006: Vulnerability in SSL/TLS Could Allow Information Disclosure - Windows Server 2003 SP2 (KB2585542) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1200608
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-006

***************************************************************
Title: MS12-006: Vulnerability in SSL/TLS Could Allow Information Disclosure - Windows Server 2003 SP2 (KB2638806) (Japanese)
Severity: Important
Fixlet ID: 1200609
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-006

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in SSL 3.0 and TLS 1.0. This vulnerability affects the protocol itself and is not specific to the Windows operating system. The vulnerability could allow information disclosure if an attacker intercepts encrypted web traffic served from an affected system. TLS 1.1, TLS 1.2, and all cipher suites that do not use CBC mode are not affected. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-006: Vulnerability in SSL/TLS Could Allow Information Disclosure - Windows Server 2003 SP2 (KB2585542) (x64) (Japanese)
Severity: Important
Fixlet ID: 1200611
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-006

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in SSL 3.0 and TLS 1.0. This vulnerability affects the protocol itself and is not specific to the Windows operating system. The vulnerability could allow information disclosure if an attacker intercepts encrypted web traffic served from an affected system. TLS 1.1, TLS 1.2, and all cipher suites that do not use CBC mode are not affected. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-006: Vulnerability in SSL/TLS Could Allow Information Disclosure - Windows Server 2003 SP2 (KB2585542) (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1200612
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-006

***************************************************************
Title: MS12-006: Vulnerability in SSL/TLS Could Allow Information Disclosure - Windows Server 2003 SP2 (KB2638806) (x64) (Japanese)
Severity: Important
Fixlet ID: 1200613
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-006

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in SSL 3.0 and TLS 1.0. This vulnerability affects the protocol itself and is not specific to the Windows operating system. The vulnerability could allow information disclosure if an attacker intercepts encrypted web traffic served from an affected system. TLS 1.1, TLS 1.2, and all cipher suites that do not use CBC mode are not affected. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-006: Vulnerability in SSL/TLS Could Allow Information Disclosure - Windows Vista SP2 (Japanese)
Severity: Important
Fixlet ID: 1200615
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-006

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in SSL 3.0 and TLS 1.0. This vulnerability affects the protocol itself and is not specific to the Windows operating system. The vulnerability could allow information disclosure if an attacker intercepts encrypted web traffic served from an affected system. TLS 1.1, TLS 1.2, and all cipher suites that do not use CBC mode are not affected. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-006: Vulnerability in SSL/TLS Could Allow Information Disclosure - Windows Vista SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1200617
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-006

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in SSL 3.0 and TLS 1.0. This vulnerability affects the protocol itself and is not specific to the Windows operating system. The vulnerability could allow information disclosure if an attacker intercepts encrypted web traffic served from an affected system. TLS 1.1, TLS 1.2, and all cipher suites that do not use CBC mode are not affected. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-006: Vulnerability in SSL/TLS Could Allow Information Disclosure - Windows Server 2008 SP2 (Japanese)
Severity: Important
Fixlet ID: 1200619
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-006

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in SSL 3.0 and TLS 1.0. This vulnerability affects the protocol itself and is not specific to the Windows operating system. The vulnerability could allow information disclosure if an attacker intercepts encrypted web traffic served from an affected system. TLS 1.1, TLS 1.2, and all cipher suites that do not use CBC mode are not affected. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-006: Vulnerability in SSL/TLS Could Allow Information Disclosure - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1200621
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-006

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in SSL 3.0 and TLS 1.0. This vulnerability affects the protocol itself and is not specific to the Windows operating system. The vulnerability could allow information disclosure if an attacker intercepts encrypted web traffic served from an affected system. TLS 1.1, TLS 1.2, and all cipher suites that do not use CBC mode are not affected. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-006: Vulnerability in SSL/TLS Could Allow Information Disclosure - Windows 7 Gold/SP1 (Japanese)
Severity: Important
Fixlet ID: 1200623
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-006

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in SSL 3.0 and TLS 1.0. This vulnerability affects the protocol itself and is not specific to the Windows operating system. The vulnerability could allow information disclosure if an attacker intercepts encrypted web traffic served from an affected system. TLS 1.1, TLS 1.2, and all cipher suites that do not use CBC mode are not affected. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-006: Vulnerability in SSL/TLS Could Allow Information Disclosure - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1200625
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-006

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in SSL 3.0 and TLS 1.0. This vulnerability affects the protocol itself and is not specific to the Windows operating system. The vulnerability could allow information disclosure if an attacker intercepts encrypted web traffic served from an affected system. TLS 1.1, TLS 1.2, and all cipher suites that do not use CBC mode are not affected. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-006: Vulnerability in SSL/TLS Could Allow Information Disclosure - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1200627
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-006

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in SSL 3.0 and TLS 1.0. This vulnerability affects the protocol itself and is not specific to the Windows operating system. The vulnerability could allow information disclosure if an attacker intercepts encrypted web traffic served from an affected system. TLS 1.1, TLS 1.2, and all cipher suites that do not use CBC mode are not affected. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-007: Vulnerability in AntiXSS Library Could Allow Information Disclosure - Microsoft Anti-Cross Site Scripting Library V3.x/V4.0 (Japanese)
Severity: Important
Fixlet ID: 1200701
Fixlet Link: http://technet.microsoft.com/security/bulletin/MS12-007

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in the Microsoft Anti-Cross Site Scripting (AntiXSS) Library. The vulnerability could allow information disclosure if an attacker passes a malicious script to a website using the sanitization function of the AntiXSS Library. The consequences of the disclosure of that information depends on the nature of the information itself. Note that this vulnerability would not allow an attacker to execute code or to elevate the attacker's user rights directly, but it could be used to produce information that could be used to try to further compromise the affected system. Only sites that use the sanitization module of the AntiXSS Library are affected by this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2633952: Dec. 2011 Cumulative Time Zone Update - Windows XP SP3 (Japanese)
Severity: <Unspecified>
Fixlet ID: 263395201
Fixlet Link: http://support.microsoft.com/kb/2633952

Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. 

Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates.

***************************************************************
Title: 2633952: Dec. 2011 Cumulative Time Zone Update - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: <Unspecified>
Fixlet ID: 263395202
Fixlet Link: http://support.microsoft.com/kb/2633952

***************************************************************
Title: 2633952: Dec. 2011 Cumulative Time Zone Update - Windows Server 2003 SP2 (Japanese)
Severity: <Unspecified>
Fixlet ID: 263395203
Fixlet Link: http://support.microsoft.com/kb/2633952

Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. 

Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates.

***************************************************************
Title: 2633952: Dec. 2011 Cumulative Time Zone Update - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: <Unspecified>
Fixlet ID: 263395204
Fixlet Link: http://support.microsoft.com/kb/2633952

***************************************************************
Title: 2633952: Dec. 2011 Cumulative Time Zone Update - Windows Vista SP2 (Japanese)
Severity: <Unspecified>
Fixlet ID: 263395205
Fixlet Link: http://support.microsoft.com/kb/2633952

Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. 

Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates.

***************************************************************
Title: 2633952: Dec. 2011 Cumulative Time Zone Update - Windows Server 2008 SP2 (Japanese)
Severity: <Unspecified>
Fixlet ID: 263395207
Fixlet Link: http://support.microsoft.com/kb/2633952

Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. 

Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates.

***************************************************************
Title: 2633952: Dec. 2011 Cumulative Time Zone Update - Windows 7 Gold/SP1 (Japanese)
Severity: <Unspecified>
Fixlet ID: 263395209
Fixlet Link: http://support.microsoft.com/kb/2633952

Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. 

Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates.



More information about the BigFix-Announcements-Japan mailing list