[BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)'

autonotify at us.ibm.com autonotify at us.ibm.com
Fri Oct 12 02:31:34 PDT 2012


Fixlet Site - 'Patches for Windows (Japanese)'
Current Version: 493	Published: Thu, 11 Oct 2012 09:41:58  GMT

New Fixlets:
============

***************************************************************
Title: MS12-064: Vulnerabilities in Microsoft Word Could Allow Remote Code Execution - Office 2003 SP3 (Administrative Installation) (Japanese)
Severity: Important
Fixlet ID: 1206401
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-064
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Office. The more severe vulnerability could allow remote code execution if a user opens or previews a specially crafted RTF file. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false;  document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" +  link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS12-064: Vulnerabilities in Microsoft Word Could Allow Remote Code Execution - Office 2003 SP3 (Local/Network Install) (Japanese)
Severity: Important
Fixlet ID: 1206402
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-064

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Office. The more severe vulnerability could allow remote code execution if a user opens or previews a specially crafted RTF file. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-064: Vulnerabilities in Microsoft Word Could Allow Remote Code Execution - Office 2007 SP2 - Word 2007 Gold/SP2/SP3 (Japanese)
Severity: Critical
Fixlet ID: 1206403
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-064

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Office. The more severe vulnerability could allow remote code execution if a user opens or previews a specially crafted RTF file. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-064: Vulnerabilities in Microsoft Word Could Allow Remote Code Execution - Office 2010 SP1 (Japanese)
Severity: Critical
Fixlet ID: 1206405
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-064

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Office. The more severe vulnerability could allow remote code execution if a user opens or previews a specially crafted RTF file. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-064: Vulnerabilities in Microsoft Word Could Allow Remote Code Execution - Office 2010 SP1 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1206407
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-064

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Office. The more severe vulnerability could allow remote code execution if a user opens or previews a specially crafted RTF file. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-064: Vulnerabilities in Microsoft Word Could Allow Remote Code Execution - Word Viewer (KB2687485) (Japanese)
Severity: Important
Fixlet ID: 1206409
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-064

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Office. The more severe vulnerability could allow remote code execution if a user opens or previews a specially crafted RTF file. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-064: Vulnerabilities in Microsoft Word Could Allow Remote Code Execution - Office Compatibility Pack Gold/SP2/SP3 (Japanese)
Severity: Important
Fixlet ID: 1206411
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-064

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Office. The more severe vulnerability could allow remote code execution if a user opens or previews a specially crafted RTF file. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-064: Vulnerabilities in Microsoft Word Could Allow Remote Code Execution - SharePoint Server 2010 SP1 - Word Automation Services (x64) (Japanese)
Severity: Important
Fixlet ID: 1206413
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-064

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Office. The more severe vulnerability could allow remote code execution if a user opens or previews a specially crafted RTF file. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-064: Vulnerabilities in Microsoft Word Could Allow Remote Code Execution - Office Web Apps 2010 SP1  (x64) (Japanese)
Severity: Important
Fixlet ID: 1206415
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-064

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Office. The more severe vulnerability could allow remote code execution if a user opens or previews a specially crafted RTF file. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-066: Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege - InfoPath 2007 Gold/SP2/SP3 (KB2687439) (Japanese)
Severity: Important
Fixlet ID: 1206601
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-066

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Office, Microsoft Communications Platforms, Microsoft Server software, and Microsoft Office Web Apps. The vulnerability could allow elevation of privilege if an attacker sends specially crafted content to a user. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-066: Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege - InfoPath 2007 Gold/SP2/SP3 (KB2687440) (Japanese)
Severity: Important
Fixlet ID: 1206603
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-066

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Office, Microsoft Communications Platforms, Microsoft Server software, and Microsoft Office Web Apps. The vulnerability could allow elevation of privilege if an attacker sends specially crafted content to a user. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-066: Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege - InfoPath 2010 SP1 (KB2687436) (Japanese)
Severity: Important
Fixlet ID: 1206605
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-066

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Office, Microsoft Communications Platforms, Microsoft Server software, and Microsoft Office Web Apps. The vulnerability could allow elevation of privilege if an attacker sends specially crafted content to a user. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-066: Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege - InfoPath 2010 SP1 (KB2687417) (Japanese)
Severity: Important
Fixlet ID: 1206607
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-066

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Office, Microsoft Communications Platforms, Microsoft Server software, and Microsoft Office Web Apps. The vulnerability could allow elevation of privilege if an attacker sends specially crafted content to a user. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-066: Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege - InfoPath 2010 SP1 (x64) (KB2687436) (Japanese)
Severity: Important
Fixlet ID: 1206609
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-066

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Office, Microsoft Communications Platforms, Microsoft Server software, and Microsoft Office Web Apps. The vulnerability could allow elevation of privilege if an attacker sends specially crafted content to a user. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-066: Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege - InfoPath 2010 SP1 (x64) (KB2687417) (Japanese)
Severity: Important
Fixlet ID: 1206611
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-066

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Office, Microsoft Communications Platforms, Microsoft Server software, and Microsoft Office Web Apps. The vulnerability could allow elevation of privilege if an attacker sends specially crafted content to a user. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-066: Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege - Communicator 2007 R2 (Japanese)
Severity: Important
Fixlet ID: 1206613
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-066

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Office, Microsoft Communications Platforms, Microsoft Server software, and Microsoft Office Web Apps. The vulnerability could allow elevation of privilege if an attacker sends specially crafted content to a user. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-066: Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege - Lync 2010 (Japanese)
Severity: Important
Fixlet ID: 1206615
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-066

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Office, Microsoft Communications Platforms, Microsoft Server software, and Microsoft Office Web Apps. The vulnerability could allow elevation of privilege if an attacker sends specially crafted content to a user. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-066: Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege - Lync 2010 (x64) (Japanese)
Severity: Important
Fixlet ID: 1206617
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-066

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Office, Microsoft Communications Platforms, Microsoft Server software, and Microsoft Office Web Apps. The vulnerability could allow elevation of privilege if an attacker sends specially crafted content to a user. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-066: Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege - Lync 2010 Attendee(admin level install) (Japanese)
Severity: Important
Fixlet ID: 1206619
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-066

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Office, Microsoft Communications Platforms, Microsoft Server software, and Microsoft Office Web Apps. The vulnerability could allow elevation of privilege if an attacker sends specially crafted content to a user. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-066: Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege - Lync 2010 Attendee (user level install) (Japanese)
Severity: Important
Fixlet ID: 1206621
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-066

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Office, Microsoft Communications Platforms, Microsoft Server software, and Microsoft Office Web Apps. The vulnerability could allow elevation of privilege if an attacker sends specially crafted content to a user. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-066: Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege - SharePoint Server 2007 Gold/SP2/SP3 (Japanese)
Severity: Important
Fixlet ID: 1206623
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-066

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Office, Microsoft Communications Platforms, Microsoft Server software, and Microsoft Office Web Apps. The vulnerability could allow elevation of privilege if an attacker sends specially crafted content to a user. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-066: Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege - SharePoint Server 2007 Gold/SP2/SP3 (x64) (Japanese)
Severity: Important
Fixlet ID: 1206625
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-066

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Office, Microsoft Communications Platforms, Microsoft Server software, and Microsoft Office Web Apps. The vulnerability could allow elevation of privilege if an attacker sends specially crafted content to a user. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-066: Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege - SharePoint Server 2010 SP1 (wosrv) (x64) (Japanese)
Severity: Important
Fixlet ID: 1206627
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-066

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Office, Microsoft Communications Platforms, Microsoft Server software, and Microsoft Office Web Apps. The vulnerability could allow elevation of privilege if an attacker sends specially crafted content to a user. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-066: Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege - SharePoint Server 2010 SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1206629
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-066

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Office, Microsoft Communications Platforms, Microsoft Server software, and Microsoft Office Web Apps. The vulnerability could allow elevation of privilege if an attacker sends specially crafted content to a user. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-066: Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege - Groove Server 2010 SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1206631
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-066

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Office, Microsoft Communications Platforms, Microsoft Server software, and Microsoft Office Web Apps. The vulnerability could allow elevation of privilege if an attacker sends specially crafted content to a user. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-066: Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege - Windows SharePoint Services 3.0 SP2 (Japanese)
Severity: Important
Fixlet ID: 1206633
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-066

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Office, Microsoft Communications Platforms, Microsoft Server software, and Microsoft Office Web Apps. The vulnerability could allow elevation of privilege if an attacker sends specially crafted content to a user. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-066: Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege - Windows SharePoint Services 3.0 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1206635
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-066

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Office, Microsoft Communications Platforms, Microsoft Server software, and Microsoft Office Web Apps. The vulnerability could allow elevation of privilege if an attacker sends specially crafted content to a user. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-066: Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege - SharePoint Foundation 2010 SP1(x64) (Japanese)
Severity: Important
Fixlet ID: 1206637
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-066

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Office, Microsoft Communications Platforms, Microsoft Server software, and Microsoft Office Web Apps. The vulnerability could allow elevation of privilege if an attacker sends specially crafted content to a user. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-066: Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege - Office Web Apps 2010 SP1(x64) (Japanese)
Severity: Important
Fixlet ID: 1206639
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-066

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Office, Microsoft Communications Platforms, Microsoft Server software, and Microsoft Office Web Apps. The vulnerability could allow elevation of privilege if an attacker sends specially crafted content to a user. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-067: Vulnerabilities in FAST Search Server 2010 for SharePoint Parsing Could Allow Remote Code Execution - FAST Search Server 2010 for SharePoint SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1206701
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-067

Fixlet Description: Microsoft has released a security update that resolves publicly disclosed vulnerabilities in Microsoft FAST Search Server 2010 for SharePoint. The vulnerabilities could allow remote code execution in the security context of a user account with a restricted token. FAST Search Server for SharePoint is only affected by this issue when Advanced Filter Pack is enabled. By default, Advanced Filter Pack is disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-068: Vulnerability in Windows Kernel Could Allow Elevation of Privilege - Windows XP SP3 (Japanese)
Severity: Important
Fixlet ID: 1206801
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-068

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in all supported releases of Microsoft Windows except Windows 8 and Windows Server 2012. This security update is rated Important for all supported editions of Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-068: Vulnerability in Windows Kernel Could Allow Elevation of Privilege - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1206802
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-068

***************************************************************
Title: MS12-068: Vulnerability in Windows Kernel Could Allow Elevation of Privilege - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1206803
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-068

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in all supported releases of Microsoft Windows except Windows 8 and Windows Server 2012. This security update is rated Important for all supported editions of Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-068: Vulnerability in Windows Kernel Could Allow Elevation of Privilege - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1206804
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-068

***************************************************************
Title: MS12-068: Vulnerability in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1206805
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-068

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in all supported releases of Microsoft Windows except Windows 8 and Windows Server 2012. This security update is rated Important for all supported editions of Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-068: Vulnerability in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1206807
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-068

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in all supported releases of Microsoft Windows except Windows 8 and Windows Server 2012. This security update is rated Important for all supported editions of Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-068: Vulnerability in Windows Kernel Could Allow Elevation of Privilege - Windows Vista SP2 (Japanese)
Severity: Important
Fixlet ID: 1206809
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-068

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in all supported releases of Microsoft Windows except Windows 8 and Windows Server 2012. This security update is rated Important for all supported editions of Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-068: Vulnerability in Windows Kernel Could Allow Elevation of Privilege - Windows Vista SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1206811
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-068

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in all supported releases of Microsoft Windows except Windows 8 and Windows Server 2012. This security update is rated Important for all supported editions of Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-068: Vulnerability in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2008 SP2 (Japanese)
Severity: Important
Fixlet ID: 1206813
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-068

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in all supported releases of Microsoft Windows except Windows 8 and Windows Server 2012. This security update is rated Important for all supported editions of Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-068: Vulnerability in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1206815
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-068

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in all supported releases of Microsoft Windows except Windows 8 and Windows Server 2012. This security update is rated Important for all supported editions of Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-068: Vulnerability in Windows Kernel Could Allow Elevation of Privilege - Windows 7 Gold/SP1 (Japanese)
Severity: Important
Fixlet ID: 1206817
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-068

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in all supported releases of Microsoft Windows except Windows 8 and Windows Server 2012. This security update is rated Important for all supported editions of Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-068: Vulnerability in Windows Kernel Could Allow Elevation of Privilege - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1206819
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-068

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in all supported releases of Microsoft Windows except Windows 8 and Windows Server 2012. This security update is rated Important for all supported editions of Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-068: Vulnerability in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1206821
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-068

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in all supported releases of Microsoft Windows except Windows 8 and Windows Server 2012. This security update is rated Important for all supported editions of Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-069: Vulnerability in Kerberos Could Allow Denial of Service - Windows 7 Gold/SP1 (Japanese)
Severity: Important
Fixlet ID: 1206901
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-069

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if a remote attacker sends a specially crafted session request to the Kerberos server. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-069: Vulnerability in Kerberos Could Allow Denial of Service - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1206903
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-069

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if a remote attacker sends a specially crafted session request to the Kerberos server. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-069: Vulnerability in Kerberos Could Allow Denial of Service - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1206905
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-069

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if a remote attacker sends a specially crafted session request to the Kerberos server. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-070: Vulnerability in SQL Server Could Allow Elevation of Privilege - SQL Server 2000 Reporting Services SP2 (Japanese)
Severity: Important
Fixlet ID: 1207001
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-070

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft SQL Server on systems running SQL Server Reporting Services (SSRS). The vulnerability is a cross-site-scripting (XSS) vulnerability that could allow elevation of privilege, enabling an attacker to execute arbitrary commands on the SSRS site in the context of the targeted user. An attacker could exploit this vulnerability by sending a specially crafted link to the user and convincing the user to click the link. An attacker could also host a website that contains a webpage designed to exploit the vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-070: Vulnerability in SQL Server Could Allow Elevation of Privilege - SQL Server 2005 Express Edition with Advanced Services SP4 / SQL Server 2005 SP4 - QFE Branch (Japanese)
Severity: Important
Fixlet ID: 1207003
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-070

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft SQL Server on systems running SQL Server Reporting Services (SSRS). The vulnerability is a cross-site-scripting (XSS) vulnerability that could allow elevation of privilege, enabling an attacker to execute arbitrary commands on the SSRS site in the context of the targeted user. An attacker could exploit this vulnerability by sending a specially crafted link to the user and convincing the user to click the link. An attacker could also host a website that contains a webpage designed to exploit the vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-070: Vulnerability in SQL Server Could Allow Elevation of Privilege - SQL Server 2005 Express Edition with Advanced Services SP4 / SQL Server 2005 SP4 - GDR Branch (Japanese)
Severity: Important
Fixlet ID: 1207005
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-070

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft SQL Server on systems running SQL Server Reporting Services (SSRS). The vulnerability is a cross-site-scripting (XSS) vulnerability that could allow elevation of privilege, enabling an attacker to execute arbitrary commands on the SSRS site in the context of the targeted user. An attacker could exploit this vulnerability by sending a specially crafted link to the user and convincing the user to click the link. An attacker could also host a website that contains a webpage designed to exploit the vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-070: Vulnerability in SQL Server Could Allow Elevation of Privilege - SQL Server 2005 SP4 - QFE Branch (x64) (Japanese)
Severity: Important
Fixlet ID: 1207007
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-070

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft SQL Server on systems running SQL Server Reporting Services (SSRS). The vulnerability is a cross-site-scripting (XSS) vulnerability that could allow elevation of privilege, enabling an attacker to execute arbitrary commands on the SSRS site in the context of the targeted user. An attacker could exploit this vulnerability by sending a specially crafted link to the user and convincing the user to click the link. An attacker could also host a website that contains a webpage designed to exploit the vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-070: Vulnerability in SQL Server Could Allow Elevation of Privilege - SQL Server 2005 SP4 - GDR Branch (x64) (Japanese)
Severity: Important
Fixlet ID: 1207009
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-070

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft SQL Server on systems running SQL Server Reporting Services (SSRS). The vulnerability is a cross-site-scripting (XSS) vulnerability that could allow elevation of privilege, enabling an attacker to execute arbitrary commands on the SSRS site in the context of the targeted user. An attacker could exploit this vulnerability by sending a specially crafted link to the user and convincing the user to click the link. An attacker could also host a website that contains a webpage designed to exploit the vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-070: Vulnerability in SQL Server Could Allow Elevation of Privilege - SQL Server 2008 SP2 - QFE Branch (Japanese)
Severity: Important
Fixlet ID: 1207011
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-070

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft SQL Server on systems running SQL Server Reporting Services (SSRS). The vulnerability is a cross-site-scripting (XSS) vulnerability that could allow elevation of privilege, enabling an attacker to execute arbitrary commands on the SSRS site in the context of the targeted user. An attacker could exploit this vulnerability by sending a specially crafted link to the user and convincing the user to click the link. An attacker could also host a website that contains a webpage designed to exploit the vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-070: Vulnerability in SQL Server Could Allow Elevation of Privilege - SQL Server 2008 SP2 - GDR Branch (Japanese)
Severity: Important
Fixlet ID: 1207013
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-070

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft SQL Server on systems running SQL Server Reporting Services (SSRS). The vulnerability is a cross-site-scripting (XSS) vulnerability that could allow elevation of privilege, enabling an attacker to execute arbitrary commands on the SSRS site in the context of the targeted user. An attacker could exploit this vulnerability by sending a specially crafted link to the user and convincing the user to click the link. An attacker could also host a website that contains a webpage designed to exploit the vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-070: Vulnerability in SQL Server Could Allow Elevation of Privilege - SQL Server 2008 SP3 - QFE Branch (Japanese)
Severity: Important
Fixlet ID: 1207015
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-070

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft SQL Server on systems running SQL Server Reporting Services (SSRS). The vulnerability is a cross-site-scripting (XSS) vulnerability that could allow elevation of privilege, enabling an attacker to execute arbitrary commands on the SSRS site in the context of the targeted user. An attacker could exploit this vulnerability by sending a specially crafted link to the user and convincing the user to click the link. An attacker could also host a website that contains a webpage designed to exploit the vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-070: Vulnerability in SQL Server Could Allow Elevation of Privilege - SQL Server 2008 SP3 - GDR Branch (Japanese)
Severity: Important
Fixlet ID: 1207017
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-070

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft SQL Server on systems running SQL Server Reporting Services (SSRS). The vulnerability is a cross-site-scripting (XSS) vulnerability that could allow elevation of privilege, enabling an attacker to execute arbitrary commands on the SSRS site in the context of the targeted user. An attacker could exploit this vulnerability by sending a specially crafted link to the user and convincing the user to click the link. An attacker could also host a website that contains a webpage designed to exploit the vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-070: Vulnerability in SQL Server Could Allow Elevation of Privilege - SQL Server 2008 SP2 - QFE Branch (x64) (Japanese)
Severity: Important
Fixlet ID: 1207019
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-070

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft SQL Server on systems running SQL Server Reporting Services (SSRS). The vulnerability is a cross-site-scripting (XSS) vulnerability that could allow elevation of privilege, enabling an attacker to execute arbitrary commands on the SSRS site in the context of the targeted user. An attacker could exploit this vulnerability by sending a specially crafted link to the user and convincing the user to click the link. An attacker could also host a website that contains a webpage designed to exploit the vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-070: Vulnerability in SQL Server Could Allow Elevation of Privilege - SQL Server 2008 SP2 - GDR Branch (x64) (Japanese)
Severity: Important
Fixlet ID: 1207021
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-070

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft SQL Server on systems running SQL Server Reporting Services (SSRS). The vulnerability is a cross-site-scripting (XSS) vulnerability that could allow elevation of privilege, enabling an attacker to execute arbitrary commands on the SSRS site in the context of the targeted user. An attacker could exploit this vulnerability by sending a specially crafted link to the user and convincing the user to click the link. An attacker could also host a website that contains a webpage designed to exploit the vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-070: Vulnerability in SQL Server Could Allow Elevation of Privilege - SQL Server 2008 SP3 - QFE Branch (x64) (Japanese)
Severity: Important
Fixlet ID: 1207023
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-070

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft SQL Server on systems running SQL Server Reporting Services (SSRS). The vulnerability is a cross-site-scripting (XSS) vulnerability that could allow elevation of privilege, enabling an attacker to execute arbitrary commands on the SSRS site in the context of the targeted user. An attacker could exploit this vulnerability by sending a specially crafted link to the user and convincing the user to click the link. An attacker could also host a website that contains a webpage designed to exploit the vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-070: Vulnerability in SQL Server Could Allow Elevation of Privilege - SQL Server 2008 SP3 - GDR Branch (x64) (Japanese)
Severity: Important
Fixlet ID: 1207025
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-070

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft SQL Server on systems running SQL Server Reporting Services (SSRS). The vulnerability is a cross-site-scripting (XSS) vulnerability that could allow elevation of privilege, enabling an attacker to execute arbitrary commands on the SSRS site in the context of the targeted user. An attacker could exploit this vulnerability by sending a specially crafted link to the user and convincing the user to click the link. An attacker could also host a website that contains a webpage designed to exploit the vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-070: Vulnerability in SQL Server Could Allow Elevation of Privilege - SQL Server 2008 R2 SP1 - QFE Branch (Japanese)
Severity: Important
Fixlet ID: 1207027
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-070

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft SQL Server on systems running SQL Server Reporting Services (SSRS). The vulnerability is a cross-site-scripting (XSS) vulnerability that could allow elevation of privilege, enabling an attacker to execute arbitrary commands on the SSRS site in the context of the targeted user. An attacker could exploit this vulnerability by sending a specially crafted link to the user and convincing the user to click the link. An attacker could also host a website that contains a webpage designed to exploit the vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-070: Vulnerability in SQL Server Could Allow Elevation of Privilege - SQL Server 2008 R2 SP1 - GDR Branch (Japanese)
Severity: Important
Fixlet ID: 1207029
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-070

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft SQL Server on systems running SQL Server Reporting Services (SSRS). The vulnerability is a cross-site-scripting (XSS) vulnerability that could allow elevation of privilege, enabling an attacker to execute arbitrary commands on the SSRS site in the context of the targeted user. An attacker could exploit this vulnerability by sending a specially crafted link to the user and convincing the user to click the link. An attacker could also host a website that contains a webpage designed to exploit the vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-070: Vulnerability in SQL Server Could Allow Elevation of Privilege - SQL Server 2008 R2 SP1 - QFE Branch (x64) (Japanese)
Severity: Important
Fixlet ID: 1207031
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-070

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft SQL Server on systems running SQL Server Reporting Services (SSRS). The vulnerability is a cross-site-scripting (XSS) vulnerability that could allow elevation of privilege, enabling an attacker to execute arbitrary commands on the SSRS site in the context of the targeted user. An attacker could exploit this vulnerability by sending a specially crafted link to the user and convincing the user to click the link. An attacker could also host a website that contains a webpage designed to exploit the vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-070: Vulnerability in SQL Server Could Allow Elevation of Privilege - SQL Server 2008 R2 SP1 - GDR Branch (x64) (Japanese)
Severity: Important
Fixlet ID: 1207033
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-070

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft SQL Server on systems running SQL Server Reporting Services (SSRS). The vulnerability is a cross-site-scripting (XSS) vulnerability that could allow elevation of privilege, enabling an attacker to execute arbitrary commands on the SSRS site in the context of the targeted user. An attacker could exploit this vulnerability by sending a specially crafted link to the user and convincing the user to click the link. An attacker could also host a website that contains a webpage designed to exploit the vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-070: Vulnerability in SQL Server Could Allow Elevation of Privilege - SQL Server 2012 - QFE Branch (Japanese)
Severity: Important
Fixlet ID: 1207035
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-070

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft SQL Server on systems running SQL Server Reporting Services (SSRS). The vulnerability is a cross-site-scripting (XSS) vulnerability that could allow elevation of privilege, enabling an attacker to execute arbitrary commands on the SSRS site in the context of the targeted user. An attacker could exploit this vulnerability by sending a specially crafted link to the user and convincing the user to click the link. An attacker could also host a website that contains a webpage designed to exploit the vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-070: Vulnerability in SQL Server Could Allow Elevation of Privilege - SQL Server 2012 - GDR Branch (Japanese)
Severity: Important
Fixlet ID: 1207037
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-070

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft SQL Server on systems running SQL Server Reporting Services (SSRS). The vulnerability is a cross-site-scripting (XSS) vulnerability that could allow elevation of privilege, enabling an attacker to execute arbitrary commands on the SSRS site in the context of the targeted user. An attacker could exploit this vulnerability by sending a specially crafted link to the user and convincing the user to click the link. An attacker could also host a website that contains a webpage designed to exploit the vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-070: Vulnerability in SQL Server Could Allow Elevation of Privilege - SQL Server 2012 - QFE Branch (x64) (Japanese)
Severity: Important
Fixlet ID: 1207039
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-070

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft SQL Server on systems running SQL Server Reporting Services (SSRS). The vulnerability is a cross-site-scripting (XSS) vulnerability that could allow elevation of privilege, enabling an attacker to execute arbitrary commands on the SSRS site in the context of the targeted user. An attacker could exploit this vulnerability by sending a specially crafted link to the user and convincing the user to click the link. An attacker could also host a website that contains a webpage designed to exploit the vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-070: Vulnerability in SQL Server Could Allow Elevation of Privilege - SQL Server 2012 - GDR Branch (x64) (Japanese)
Severity: Important
Fixlet ID: 1207041
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS12-070

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft SQL Server on systems running SQL Server Reporting Services (SSRS). The vulnerability is a cross-site-scripting (XSS) vulnerability that could allow elevation of privilege, enabling an attacker to execute arbitrary commands on the SSRS site in the context of the targeted user. An attacker could exploit this vulnerability by sending a specially crafted link to the user and convincing the user to click the link. An attacker could also host a website that contains a webpage designed to exploit the vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: 2736233: Update Rollup for ActiveX Kill Bits - Windows XP SP3 (Japanese)
Severity: N/A
Fixlet ID: 273623301
Fixlet Link: http://technet.microsoft.com/JA-JP/security/advisory/2736233

Fixlet Description: Microsoft has released a new set of ActiveX kill bits with this advisory. This update that sets the kill bits for the following third-party software:  Cisco Secure Desktop. The following Class Identifier relates to a request by Cisco to set a kill bit for an ActiveX control that is vulnerable. For more information regarding security issues in the Cisco Secure Desktop ActiveX control, please see the Cisco Security Advisory, Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client. The class identifiers (CLSIDs) for this ActiveX control are as listed in the Third-Party Kill Bits section of this advisory. Cisco Hostscan. The following Class Identifier relates to a request by Cisco to set a kill bit for an ActiveX control that is vulnerable. For more information regarding security issues in the Cisco Hostscan ActiveX control, please see the Cisco Security Advisory, Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client. The class identifiers (CLSIDs) for this ActiveX control are as listed in the Third-Party Kill Bits section of this advisory. Cisco AnyConnect Secure Mobility Client. The following Class Identifier relates to a request by Cisco to set a kill bit for an ActiveX control that is vulnerable. For more information regarding security issues in the Cisco AnyConnect Secure Mobility Client ActiveX control, please see the Cisco Security Advisory, Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client. The class identifiers (CLSIDs) for this ActiveX control are as listed in the Third-Party Kill Bits section of this advisory.After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2736233: Update Rollup for ActiveX Kill Bits - Windows XP SP2 (x64) (Japanese)
Severity: N/A
Fixlet ID: 273623303
Fixlet Link: http://technet.microsoft.com/JA-JP/security/advisory/2736233

Fixlet Description: Microsoft has released a new set of ActiveX kill bits with this advisory. This update that sets the kill bits for the following third-party software:  Cisco Secure Desktop. The following Class Identifier relates to a request by Cisco to set a kill bit for an ActiveX control that is vulnerable. For more information regarding security issues in the Cisco Secure Desktop ActiveX control, please see the Cisco Security Advisory, Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client. The class identifiers (CLSIDs) for this ActiveX control are as listed in the Third-Party Kill Bits section of this advisory. Cisco Hostscan. The following Class Identifier relates to a request by Cisco to set a kill bit for an ActiveX control that is vulnerable. For more information regarding security issues in the Cisco Hostscan ActiveX control, please see the Cisco Security Advisory, Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client. The class identifiers (CLSIDs) for this ActiveX control are as listed in the Third-Party Kill Bits section of this advisory. Cisco AnyConnect Secure Mobility Client. The following Class Identifier relates to a request by Cisco to set a kill bit for an ActiveX control that is vulnerable. For more information regarding security issues in the Cisco AnyConnect Secure Mobility Client ActiveX control, please see the Cisco Security Advisory, Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client. The class identifiers (CLSIDs) for this ActiveX control are as listed in the Third-Party Kill Bits section of this advisory.After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2736233: Update Rollup for ActiveX Kill Bits - Windows Server 2003 SP2 (Japanese)
Severity: N/A
Fixlet ID: 273623305
Fixlet Link: http://technet.microsoft.com/JA-JP/security/advisory/2736233

Fixlet Description: Microsoft has released a new set of ActiveX kill bits with this advisory. This update that sets the kill bits for the following third-party software:  Cisco Secure Desktop. The following Class Identifier relates to a request by Cisco to set a kill bit for an ActiveX control that is vulnerable. For more information regarding security issues in the Cisco Secure Desktop ActiveX control, please see the Cisco Security Advisory, Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client. The class identifiers (CLSIDs) for this ActiveX control are as listed in the Third-Party Kill Bits section of this advisory. Cisco Hostscan. The following Class Identifier relates to a request by Cisco to set a kill bit for an ActiveX control that is vulnerable. For more information regarding security issues in the Cisco Hostscan ActiveX control, please see the Cisco Security Advisory, Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client. The class identifiers (CLSIDs) for this ActiveX control are as listed in the Third-Party Kill Bits section of this advisory.  Cisco AnyConnect Secure Mobility Client. The following Class Identifier relates to a request by Cisco to set a kill bit for an ActiveX control that is vulnerable. For more information regarding security issues in the Cisco AnyConnect Secure Mobility Client ActiveX control, please see the Cisco Security Advisory, Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client. The class identifiers (CLSIDs) for this ActiveX control are as listed in the Third-Party Kill Bits section of this advisory. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2736233: Update Rollup for ActiveX Kill Bits - Windows Server 2003 SP2 (x64) (Japanese)
Severity: N/A
Fixlet ID: 273623307
Fixlet Link: http://technet.microsoft.com/JA-JP/security/advisory/2736233

Fixlet Description: Microsoft has released a new set of ActiveX kill bits with this advisory. This update that sets the kill bits for the following third-party software:  Cisco Secure Desktop. The following Class Identifier relates to a request by Cisco to set a kill bit for an ActiveX control that is vulnerable. For more information regarding security issues in the Cisco Secure Desktop ActiveX control, please see the Cisco Security Advisory, Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client. The class identifiers (CLSIDs) for this ActiveX control are as listed in the Third-Party Kill Bits section of this advisory. Cisco Hostscan. The following Class Identifier relates to a request by Cisco to set a kill bit for an ActiveX control that is vulnerable. For more information regarding security issues in the Cisco Hostscan ActiveX control, please see the Cisco Security Advisory, Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client. The class identifiers (CLSIDs) for this ActiveX control are as listed in the Third-Party Kill Bits section of this advisory. Cisco AnyConnect Secure Mobility Client. The following Class Identifier relates to a request by Cisco to set a kill bit for an ActiveX control that is vulnerable. For more information regarding security issues in the Cisco AnyConnect Secure Mobility Client ActiveX control, please see the Cisco Security Advisory, Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client. The class identifiers (CLSIDs) for this ActiveX control are as listed in the Third-Party Kill Bits section of this advisory.After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2736233: Update Rollup for ActiveX Kill Bits - Windows Vista SP2 (Japanese)
Severity: N/A
Fixlet ID: 273623311
Fixlet Link: http://technet.microsoft.com/JA-JP/security/advisory/2736233

Fixlet Description: Microsoft has released a new set of ActiveX kill bits with this advisory. This update that sets the kill bits for the following third-party software:  Cisco Secure Desktop. The following Class Identifier relates to a request by Cisco to set a kill bit for an ActiveX control that is vulnerable. For more information regarding security issues in the Cisco Secure Desktop ActiveX control, please see the Cisco Security Advisory, Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client. The class identifiers (CLSIDs) for this ActiveX control are as listed in the Third-Party Kill Bits section of this advisory. Cisco Hostscan. The following Class Identifier relates to a request by Cisco to set a kill bit for an ActiveX control that is vulnerable. For more information regarding security issues in the Cisco Hostscan ActiveX control, please see the Cisco Security Advisory, Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client. The class identifiers (CLSIDs) for this ActiveX control are as listed in the Third-Party Kill Bits section of this advisory. Cisco AnyConnect Secure Mobility Client. The following Class Identifier relates to a request by Cisco to set a kill bit for an ActiveX control that is vulnerable. For more information regarding security issues in the Cisco AnyConnect Secure Mobility Client ActiveX control, please see the Cisco Security Advisory, Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client. The class identifiers (CLSIDs) for this ActiveX control are as listed in the Third-Party Kill Bits section of this advisory. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2736233: Update Rollup for ActiveX Kill Bits - Windows Vista SP2 (x64) (Japanese)
Severity: N/A
Fixlet ID: 273623313
Fixlet Link: http://technet.microsoft.com/JA-JP/security/advisory/2736233

Fixlet Description: Microsoft has released a new set of ActiveX kill bits with this advisory. This update that sets the kill bits for the following third-party software:  Cisco Secure Desktop. The following Class Identifier relates to a request by Cisco to set a kill bit for an ActiveX control that is vulnerable. For more information regarding security issues in the Cisco Secure Desktop ActiveX control, please see the Cisco Security Advisory, Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client. The class identifiers (CLSIDs) for this ActiveX control are as listed in the Third-Party Kill Bits section of this advisory. Cisco Hostscan. The following Class Identifier relates to a request by Cisco to set a kill bit for an ActiveX control that is vulnerable. For more information regarding security issues in the Cisco Hostscan ActiveX control, please see the Cisco Security Advisory, Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client.The class identifiers (CLSIDs) for this ActiveX control are as listed in the Third-Party Kill Bits section of this advisory. Cisco AnyConnect Secure Mobility Client. The following Class Identifier relates to a request by Cisco to set a kill bit for an ActiveX control that is vulnerable. For more information regarding security issues in the Cisco AnyConnect Secure Mobility Client ActiveX control, please see the Cisco Security Advisory, Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client. The class identifiers (CLSIDs) for this ActiveX control are as listed in the Third-Party Kill Bits section of this advisory. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2736233: Update Rollup for ActiveX Kill Bits - Windows Server 2008 SP2 (Japanese)
Severity: N/A
Fixlet ID: 273623315
Fixlet Link: http://technet.microsoft.com/JA-JP/security/advisory/2736233

Fixlet Description: Microsoft has released a new set of ActiveX kill bits with this advisory. This update that sets the kill bits for the following third-party software:  Cisco Secure Desktop. The following Class Identifier relates to a request by Cisco to set a kill bit for an ActiveX control that is vulnerable. For more information regarding security issues in the Cisco Secure Desktop ActiveX control, please see the Cisco Security Advisory, Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client. The class identifiers (CLSIDs) for this ActiveX control are as listed in the Third-Party Kill Bits section of this advisory. Cisco Hostscan. The following Class Identifier relates to a request by Cisco to set a kill bit for an ActiveX control that is vulnerable. For more information regarding security issues in the Cisco Hostscan ActiveX control, please see the Cisco Security Advisory, Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client. The class identifiers (CLSIDs) for this ActiveX control are as listed in the Third-Party Kill Bits section of this advisory. Cisco AnyConnect Secure Mobility Client. The following Class Identifier relates to a request by Cisco to set a kill bit for an ActiveX control that is vulnerable. For more information regarding security issues in the Cisco AnyConnect Secure Mobility Client ActiveX control, please see the Cisco Security Advisory, Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client. The class identifiers (CLSIDs) for this ActiveX control are as listed in the Third-Party Kill Bits section of this advisory.After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2736233: Update Rollup for ActiveX Kill Bits - Windows Server 2008 SP2 (x64) (Japanese)
Severity: N/A
Fixlet ID: 273623317
Fixlet Link: http://technet.microsoft.com/JA-JP/security/advisory/2736233

Fixlet Description: Microsoft has released a new set of ActiveX kill bits with this advisory. This update that sets the kill bits for the following third-party software:  Cisco Secure Desktop. The following Class Identifier relates to a request by Cisco to set a kill bit for an ActiveX control that is vulnerable. For more information regarding security issues in the Cisco Secure Desktop ActiveX control, please see the Cisco Security Advisory, Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client.The class identifiers (CLSIDs) for this ActiveX control are as listed in the Third-Party Kill Bits section of this advisory. Cisco Hostscan. The following Class Identifier relates to a request by Cisco to set a kill bit for an ActiveX control that is vulnerable. For more information regarding security issues in the Cisco Hostscan ActiveX control, please see the Cisco Security Advisory, Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client. The class identifiers (CLSIDs) for this ActiveX control are as listed in the Third-Party Kill Bits section of this advisory. Cisco AnyConnect Secure Mobility Client. The following Class Identifier relates to a request by Cisco to set a kill bit for an ActiveX control that is vulnerable. For more information regarding security issues in the Cisco AnyConnect Secure Mobility Client ActiveX control, please see the Cisco Security Advisory, Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client.The class identifiers (CLSIDs) for this ActiveX control are as listed in the Third-Party Kill Bits section of this advisory. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2736233: Update Rollup for ActiveX Kill Bits - Windows 7 Gold/SP1 (Japanese)
Severity: N/A
Fixlet ID: 273623321
Fixlet Link: http://technet.microsoft.com/JA-JP/security/advisory/2736233

Fixlet Description: Microsoft has released a new set of ActiveX kill bits with this advisory. This update that sets the kill bits for the following third-party software:  Cisco Secure Desktop. The following Class Identifier relates to a request by Cisco to set a kill bit for an ActiveX control that is vulnerable. For more information regarding security issues in the Cisco Secure Desktop ActiveX control, please see the Cisco Security Advisory, Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client. The class identifiers (CLSIDs) for this ActiveX control are as listed in the Third-Party Kill Bits section of this advisory. Cisco Hostscan. The following Class Identifier relates to a request by Cisco to set a kill bit for an ActiveX control that is vulnerable. For more information regarding security issues in the Cisco Hostscan ActiveX control, please see the Cisco Security Advisory, Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client. The class identifiers (CLSIDs) for this ActiveX control are as listed in the Third-Party Kill Bits section of this advisory. Cisco AnyConnect Secure Mobility Client. The following Class Identifier relates to a request by Cisco to set a kill bit for an ActiveX control that is vulnerable. For more information regarding security issues in the Cisco AnyConnect Secure Mobility Client ActiveX control, please see the Cisco Security Advisory, Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client. The class identifiers (CLSIDs) for this ActiveX control are as listed in the Third-Party Kill Bits section of this advisory.After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2736233: Update Rollup for ActiveX Kill Bits - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: N/A
Fixlet ID: 273623323
Fixlet Link: http://technet.microsoft.com/JA-JP/security/advisory/2736233

Fixlet Description: Microsoft has released a new set of ActiveX kill bits with this advisory. This update that sets the kill bits for the following third-party software:  Cisco Secure Desktop. The following Class Identifier relates to a request by Cisco to set a kill bit for an ActiveX control that is vulnerable. For more information regarding security issues in the Cisco Secure Desktop ActiveX control, please see the Cisco Security Advisory, Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client. The class identifiers (CLSIDs) for this ActiveX control are as listed in the Third-Party Kill Bits section of this advisory. Cisco Hostscan. The following Class Identifier relates to a request by Cisco to set a kill bit for an ActiveX control that is vulnerable. For more information regarding security issues in the Cisco Hostscan ActiveX control, please see the Cisco Security Advisory, Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client. The class identifiers (CLSIDs) for this ActiveX control are as listed in the Third-Party Kill Bits section of this advisory. Cisco AnyConnect Secure Mobility Client. The following Class Identifier relates to a request by Cisco to set a kill bit for an ActiveX control that is vulnerable. For more information regarding security issues in the Cisco AnyConnect Secure Mobility Client ActiveX control, please see the Cisco Security Advisory, Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client.The class identifiers (CLSIDs) for this ActiveX control are as listed in the Third-Party Kill Bits section of this advisory. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2736233: Update Rollup for ActiveX Kill Bits - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: N/A
Fixlet ID: 273623325
Fixlet Link: http://technet.microsoft.com/JA-JP/security/advisory/2736233

Fixlet Description: Microsoft has released a new set of ActiveX kill bits with this advisory. This update that sets the kill bits for the following third-party software:  Cisco Secure Desktop. The following Class Identifier relates to a request by Cisco to set a kill bit for an ActiveX control that is vulnerable. For more information regarding security issues in the Cisco Secure Desktop ActiveX control, please see the Cisco Security Advisory, Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client. The class identifiers (CLSIDs) for this ActiveX control are as listed in the Third-Party Kill Bits section of this advisory. Cisco Hostscan. The following Class Identifier relates to a request by Cisco to set a kill bit for an ActiveX control that is vulnerable. For more information regarding security issues in the Cisco Hostscan ActiveX control, please see the Cisco Security Advisory, Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client. The class identifiers (CLSIDs) for this ActiveX control are as listed in the Third-Party Kill Bits section of this advisory. Cisco AnyConnect Secure Mobility Client. The following Class Identifier relates to a request by Cisco to set a kill bit for an ActiveX control that is vulnerable. For more information regarding security issues in the Cisco AnyConnect Secure Mobility Client ActiveX control, please see the Cisco Security Advisory, Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client. The class identifiers (CLSIDs) for this ActiveX control are as listed in the Third-Party Kill Bits section of this advisory. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.



More information about the BigFix-Announcements-Japan mailing list