[BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)'

autonotify at us.ibm.com autonotify at us.ibm.com
Fri Aug 16 02:35:23 PDT 2013


Fixlet Site - 'Patches for Windows (Japanese)'
Current Version: 521	Published: Thu, 15 Aug 2013 11:00:46  GMT

New Fixlets:
============

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1305901
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

Fixlet Description: Microsoft has released a security update that resolves eleven privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1305902
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1305903
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

Fixlet Description: Microsoft has released a security update that resolves eleven privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1305904
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1305905
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

Fixlet Description: Microsoft has released a security update that resolves eleven privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1305906
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1305907
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

Fixlet Description: Microsoft has released a security update that resolves eleven privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1305908
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1305909
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

Fixlet Description: Microsoft has released a security update that resolves eleven privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1305910
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1305911
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

Fixlet Description: Microsoft has released a security update that resolves eleven privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1305912
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1305913
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

Fixlet Description: Microsoft has released a security update that resolves eleven privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1305914
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1305915
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

Fixlet Description: Microsoft has released a security update that resolves eleven privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1305916
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 7 - Windows Vista SP2 (Japanese)
Severity: Critical
Fixlet ID: 1305917
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

Fixlet Description: Microsoft has released a security update that resolves eleven privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 7 - Windows Vista SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1305919
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

Fixlet Description: Microsoft has released a security update that resolves eleven privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2008 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1305921
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

Fixlet Description: Microsoft has released a security update that resolves eleven privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1305923
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

Fixlet Description: Microsoft has released a security update that resolves eleven privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1305925
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

Fixlet Description: Microsoft has released a security update that resolves eleven privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1305926
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1305927
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

Fixlet Description: Microsoft has released a security update that resolves eleven privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1305928
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1305929
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

Fixlet Description: Microsoft has released a security update that resolves eleven privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1305930
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1305931
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

Fixlet Description: Microsoft has released a security update that resolves eleven privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1305932
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 8 - Windows Vista SP2 (Japanese)
Severity: Critical
Fixlet ID: 1305933
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

Fixlet Description: Microsoft has released a security update that resolves eleven privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 8 - Windows Vista SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1305935
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

Fixlet Description: Microsoft has released a security update that resolves eleven privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2008 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1305937
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

Fixlet Description: Microsoft has released a security update that resolves eleven privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1305939
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

Fixlet Description: Microsoft has released a security update that resolves eleven privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 8 - Windows 7 SP1 (Japanese)
Severity: Critical
Fixlet ID: 1305941
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

Fixlet Description: Microsoft has released a security update that resolves eleven privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 8 - Windows 7 SP1 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1305943
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

Fixlet Description: Microsoft has released a security update that resolves eleven privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2008 R2 SP1 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1305945
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

Fixlet Description: Microsoft has released a security update that resolves eleven privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 9 - Windows Vista SP2 (Japanese)
Severity: Critical
Fixlet ID: 1305947
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

Fixlet Description: Microsoft has released a security update that resolves eleven privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 9 - Windows Vista SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1305949
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

Fixlet Description: Microsoft has released a security update that resolves eleven privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 9 - Windows Server 2008 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1305951
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

Fixlet Description: Microsoft has released a security update that resolves eleven privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 9 - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1305953
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

Fixlet Description: Microsoft has released a security update that resolves eleven privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 9 - Windows 7 SP1 (Japanese)
Severity: Critical
Fixlet ID: 1305955
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

Fixlet Description: Microsoft has released a security update that resolves eleven privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 9 - Windows 7 SP1 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1305957
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

Fixlet Description: Microsoft has released a security update that resolves eleven privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 9 - Windows Server 2008 R2 SP1 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1305959
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

Fixlet Description: Microsoft has released a security update that resolves eleven privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 10 - Windows 7 SP1 (Japanese)
Severity: Critical
Fixlet ID: 1305961
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

Fixlet Description: Microsoft has released a security update that resolves eleven privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 10 - Windows 7 SP1 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1305963
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

Fixlet Description: Microsoft has released a security update that resolves eleven privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 10 - Windows Server 2008 R2 SP1 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1305965
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

Fixlet Description: Microsoft has released a security update that resolves eleven privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 10 - Windows 8 Gold (Japanese)
Severity: Critical
Fixlet ID: 1305967
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

Fixlet Description: Microsoft has released a security update that resolves eleven privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 10 - Windows 8 Gold (x64) (Japanese)
Severity: Critical
Fixlet ID: 1305969
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

Fixlet Description: Microsoft has released a security update that resolves eleven privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-059: Cumulative Security Update for Internet Explorer - IE 10 - Windows Server 2012 Gold (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1305971
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-059

Fixlet Description: Microsoft has released a security update that resolves eleven privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-060: Vulnerability in Unicode Scripts Processor Could Allow Remote Code Execution - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1306001
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-060

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Unicode Scripts Processor included in Microsoft Windows. The vulnerability could allow remote code execution if a user viewed a specially crafted document or webpage with an application that supports embedded OpenType fonts. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-060: Vulnerability in Unicode Scripts Processor Could Allow Remote Code Execution - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1306002
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-060

***************************************************************
Title: MS13-060: Vulnerability in Unicode Scripts Processor Could Allow Remote Code Execution - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1306003
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-060

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Unicode Scripts Processor included in Microsoft Windows. The vulnerability could allow remote code execution if a user viewed a specially crafted document or webpage with an application that supports embedded OpenType fonts. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-060: Vulnerability in Unicode Scripts Processor Could Allow Remote Code Execution - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1306004
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-060

***************************************************************
Title: MS13-060: Vulnerability in Unicode Scripts Processor Could Allow Remote Code Execution - Windows Server 2003 SP2 (Japanese)
Severity: Critical
Fixlet ID: 1306005
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-060

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Unicode Scripts Processor included in Microsoft Windows. The vulnerability could allow remote code execution if a user viewed a specially crafted document or webpage with an application that supports embedded OpenType fonts. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-060: Vulnerability in Unicode Scripts Processor Could Allow Remote Code Execution - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1306006
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-060

***************************************************************
Title: MS13-060: Vulnerability in Unicode Scripts Processor Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1306007
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-060

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Unicode Scripts Processor included in Microsoft Windows. The vulnerability could allow remote code execution if a user viewed a specially crafted document or webpage with an application that supports embedded OpenType fonts. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-060: Vulnerability in Unicode Scripts Processor Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1306008
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-060

***************************************************************
Title: MS13-061: Vulnerabilities in Microsoft Exchange Server Could Allow Remote Code Execution - Exchange Server 2007 SP3 (2873746) (Japanese)
Severity: Critical
Fixlet ID: 1306101
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-061

Fixlet Description: Microsoft has released a security update that resolves three publicly disclosed vulnerabilities in Microsoft Exchange Server. The vulnerabilities exist in the WebReady Document Viewing and Data Loss Prevention features of Microsoft Exchange Server. The vulnerabilities could allow remote code execution in the security context of the transcoding service on the Exchange server if a user previews a specially crafted file using Outlook Web App (OWA). The transcoding service in Exchange that is used for WebReady Document Viewing uses the credentials of the LocalService account. The Data Loss Prevention feature hosts code that could allow remote code execution in the security context of the Filtering Management service if a specially crafted message is received by the Exchange server. The Filtering Management service in Exchange uses the credentials of the LocalService account. The LocalService account has minimum privileges on the local system and presents anonymous credentials on the network After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-061: Vulnerabilities in Microsoft Exchange Server Could Allow Remote Code Execution - Exchange Server 2010 SP2 (2874216) (x64) (Japanese)
Severity: Critical
Fixlet ID: 1306103
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-061

Fixlet Description: Microsoft has released a security update that resolves three publicly disclosed vulnerabilities in Microsoft Exchange Server. The vulnerabilities exist in the WebReady Document Viewing and Data Loss Prevention features of Microsoft Exchange Server. The vulnerabilities could allow remote code execution in the security context of the transcoding service on the Exchange server if a user previews a specially crafted file using Outlook Web App (OWA). The transcoding service in Exchange that is used for WebReady Document Viewing uses the credentials of the LocalService account. The Data Loss Prevention feature hosts code that could allow remote code execution in the security context of the Filtering Management service if a specially crafted message is received by the Exchange server. The Filtering Management service in Exchange uses the credentials of the LocalService account. The LocalService account has minimum privileges on the local system and presents anonymous credentials on the network After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-061: Vulnerabilities in Microsoft Exchange Server Could Allow Remote Code Execution - Exchange Server 2010 SP3 (2866475) (x64) (Japanese)
Severity: Critical
Fixlet ID: 1306105
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-061

Fixlet Description: Microsoft has released a security update that resolves three publicly disclosed vulnerabilities in Microsoft Exchange Server. The vulnerabilities exist in the WebReady Document Viewing and Data Loss Prevention features of Microsoft Exchange Server. The vulnerabilities could allow remote code execution in the security context of the transcoding service on the Exchange server if a user previews a specially crafted file using Outlook Web App (OWA). The transcoding service in Exchange that is used for WebReady Document Viewing uses the credentials of the LocalService account. The Data Loss Prevention feature hosts code that could allow remote code execution in the security context of the Filtering Management service if a specially crafted message is received by the Exchange server. The Filtering Management service in Exchange uses the credentials of the LocalService account. The LocalService account has minimum privileges on the local system and presents anonymous credentials on the network After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-061: Vulnerabilities in Microsoft Exchange Server Could Allow Remote Code Execution - Exchange Server 2013 Cumulative Update 1 (2874216) (x64) (Japanese)
Severity: Critical
Fixlet ID: 1306107
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-061

Fixlet Description: Important Note: Microsoft has removed this update because of  an issue in the update that could cause Exchange Server to stop indexing mail on servers. A new version of this Fixlet will be released when Microsoft comes out with new packages that address this issue.

Microsoft has released a security update that resolves three publicly disclosed vulnerabilities in Microsoft Exchange Server. The vulnerabilities exist in the WebReady Document Viewing and Data Loss Prevention features of Microsoft Exchange Server. The vulnerabilities could allow remote code execution in the security context of the transcoding service on the Exchange server if a user previews a specially crafted file using Outlook Web App (OWA). The transcoding service in Exchange that is used for WebReady Document Viewing uses the credentials of the LocalService account. The Data Loss Prevention feature hosts code that could allow remote code execution in the security context of the Filtering Management service if a specially crafted message is received by the Exchange server. The Filtering Management service in Exchange uses the credentials of the LocalService account. The LocalService account has minimum privileges on the local system and presents anonymous credentials on the network After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-061: Vulnerabilities in Microsoft Exchange Server Could Allow Remote Code Execution - Exchange Server 2013 Cumulative Update 2 (2874216) (x64) (Japanese)
Severity: Critical
Fixlet ID: 1306109
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-061

Fixlet Description: Important Note: Microsoft has removed this update because of  an issue in the update that could cause Exchange Server to stop indexing mail on servers. A new version of this Fixlet will be released when Microsoft comes out with new packages that address this issue.

Microsoft has released a security update that resolves three publicly disclosed vulnerabilities in Microsoft Exchange Server. The vulnerabilities exist in the WebReady Document Viewing and Data Loss Prevention features of Microsoft Exchange Server. The vulnerabilities could allow remote code execution in the security context of the transcoding service on the Exchange server if a user previews a specially crafted file using Outlook Web App (OWA). The transcoding service in Exchange that is used for WebReady Document Viewing uses the credentials of the LocalService account. The Data Loss Prevention feature hosts code that could allow remote code execution in the security context of the Filtering Management service if a specially crafted message is received by the Exchange server. The Filtering Management service in Exchange uses the credentials of the LocalService account. The LocalService account has minimum privileges on the local system and presents anonymous credentials on the network After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-062: Vulnerability in Remote Procedure Call Could Allow Elevation of Privilege - Windows XP SP3 (Japanese)
Severity: Important
Fixlet ID: 1306201
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-062

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker sends a specially crafted RPC request After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-062: Vulnerability in Remote Procedure Call Could Allow Elevation of Privilege - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1306202
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-062

***************************************************************
Title: MS13-062: Vulnerability in Remote Procedure Call Could Allow Elevation of Privilege - Windows XP SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1306203
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-062

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker sends a specially crafted RPC request After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-062: Vulnerability in Remote Procedure Call Could Allow Elevation of Privilege - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1306204
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-062

***************************************************************
Title: MS13-062: Vulnerability in Remote Procedure Call Could Allow Elevation of Privilege - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1306205
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-062

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker sends a specially crafted RPC request After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-062: Vulnerability in Remote Procedure Call Could Allow Elevation of Privilege - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1306206
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-062

***************************************************************
Title: MS13-062: Vulnerability in Remote Procedure Call Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1306207
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-062

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker sends a specially crafted RPC request After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-062: Vulnerability in Remote Procedure Call Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1306208
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-062

***************************************************************
Title: MS13-062: Vulnerability in Remote Procedure Call Could Allow Elevation of Privilege - Windows Vista SP2 (Japanese)
Severity: Important
Fixlet ID: 1306209
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-062

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker sends a specially crafted RPC request After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-062: Vulnerability in Remote Procedure Call Could Allow Elevation of Privilege - Windows Vista SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1306211
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-062

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker sends a specially crafted RPC request After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-062: Vulnerability in Remote Procedure Call Could Allow Elevation of Privilege - Windows Server 2008 SP2 (Japanese)
Severity: Important
Fixlet ID: 1306213
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-062

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker sends a specially crafted RPC request After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-062: Vulnerability in Remote Procedure Call Could Allow Elevation of Privilege - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1306215
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-062

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker sends a specially crafted RPC request After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-062: Vulnerability in Remote Procedure Call Could Allow Elevation of Privilege - Windows 7 SP1 (Japanese)
Severity: Important
Fixlet ID: 1306217
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-062

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker sends a specially crafted RPC request After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-062: Vulnerability in Remote Procedure Call Could Allow Elevation of Privilege - Windows 7 SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1306219
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-062

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker sends a specially crafted RPC request After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-062: Vulnerability in Remote Procedure Call Could Allow Elevation of Privilege - Windows Server 2008 R2 SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1306221
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-062

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker sends a specially crafted RPC request After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-062: Vulnerability in Remote Procedure Call Could Allow Elevation of Privilege - Windows 8 Gold (Japanese)
Severity: Important
Fixlet ID: 1306223
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-062

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker sends a specially crafted RPC request After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-062: Vulnerability in Remote Procedure Call Could Allow Elevation of Privilege - Windows 8 Gold (x64) (Japanese)
Severity: Important
Fixlet ID: 1306225
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-062

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker sends a specially crafted RPC request After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-062: Vulnerability in Remote Procedure Call Could Allow Elevation of Privilege - Windows Server 2012 Gold (x64) (Japanese)
Severity: Important
Fixlet ID: 1306227
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-062

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker sends a specially crafted RPC request After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-063: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows XP SP3 (Japanese)
Severity: Important
Fixlet ID: 1306301
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-063

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and three privately reported vulnerabilities in Microsoft Windows. The most severe vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-063: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1306302
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-063

***************************************************************
Title: MS13-063: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1306303
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-063

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and three privately reported vulnerabilities in Microsoft Windows. The most severe vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-063: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1306304
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-063

***************************************************************
Title: MS13-063: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Vista SP2 (Japanese)
Severity: Important
Fixlet ID: 1306305
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-063

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and three privately reported vulnerabilities in Microsoft Windows. The most severe vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-063: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Vista SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1306307
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-063

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and three privately reported vulnerabilities in Microsoft Windows. The most severe vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-063: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2008 SP2 (Japanese)
Severity: Important
Fixlet ID: 1306309
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-063

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and three privately reported vulnerabilities in Microsoft Windows. The most severe vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-063: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1306311
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-063

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and three privately reported vulnerabilities in Microsoft Windows. The most severe vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-063: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows 7 SP1 (Japanese)
Severity: Important
Fixlet ID: 1306313
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-063

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and three privately reported vulnerabilities in Microsoft Windows. The most severe vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-063: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows 7 SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1306315
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-063

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and three privately reported vulnerabilities in Microsoft Windows. The most severe vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-063: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2008 R2 SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1306317
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-063

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and three privately reported vulnerabilities in Microsoft Windows. The most severe vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-063: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows 8 Gold (Japanese)
Severity: Important
Fixlet ID: 1306319
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-063

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and three privately reported vulnerabilities in Microsoft Windows. The most severe vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-064: Vulnerability in Windows NAT Driver Could Allow Denial of Service - Windows Server 2012 Gold (x64) (Japanese)
Severity: Important
Fixlet ID: 1306401
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-064

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows NAT Driver in Microsoft Windows. The vulnerability could allow denial of service if an attacker sends a specially crafted ICMP packet to a target server that is running the Windows NAT Driver service. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-065: Vulnerability in ICMPv6 could allow Denial of Service - Windows Vista SP2 (Japanese)
Severity: Important
Fixlet ID: 1306501
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-065

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow a denial of service if the attacker sends a specially crafted ICMP packet to the target system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-065: Vulnerability in ICMPv6 could allow Denial of Service - Windows Vista SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1306503
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-065

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow a denial of service if the attacker sends a specially crafted ICMP packet to the target system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-065: Vulnerability in ICMPv6 could allow Denial of Service - Windows Server 2008 SP2 (Japanese)
Severity: Important
Fixlet ID: 1306505
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-065

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow a denial of service if the attacker sends a specially crafted ICMP packet to the target system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-065: Vulnerability in ICMPv6 could allow Denial of Service - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1306507
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-065

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow a denial of service if the attacker sends a specially crafted ICMP packet to the target system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-065: Vulnerability in ICMPv6 could allow Denial of Service - Windows 7 SP1 (Japanese)
Severity: Important
Fixlet ID: 1306509
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-065

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow a denial of service if the attacker sends a specially crafted ICMP packet to the target system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-065: Vulnerability in ICMPv6 could allow Denial of Service - Windows 7 SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1306511
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-065

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow a denial of service if the attacker sends a specially crafted ICMP packet to the target system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-065: Vulnerability in ICMPv6 could allow Denial of Service - Windows Server 2008 R2 SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1306513
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-065

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow a denial of service if the attacker sends a specially crafted ICMP packet to the target system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-065: Vulnerability in ICMPv6 could allow Denial of Service - Windows 8 Gold (Japanese)
Severity: Important
Fixlet ID: 1306515
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-065

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow a denial of service if the attacker sends a specially crafted ICMP packet to the target system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-065: Vulnerability in ICMPv6 could allow Denial of Service - Windows 8 Gold (x64) (Japanese)
Severity: Important
Fixlet ID: 1306517
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-065

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow a denial of service if the attacker sends a specially crafted ICMP packet to the target system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-065: Vulnerability in ICMPv6 could allow Denial of Service - Windows Server 2012 Gold (x64) (Japanese)
Severity: Important
Fixlet ID: 1306519
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-065

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow a denial of service if the attacker sends a specially crafted ICMP packet to the target system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-066: Vulnerability in Active Directory Federation Services Could Allow Information Disclosure - Active Directory Federation Services 1.x - Windows Server 2003 R2 SP2 (Japanese)
Severity: <Unspecified>
Fixlet ID: 1306601
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-066

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Active Directory Federation Services (AD FS). The vulnerability could reveal information pertaining to the service account used by AD FS. An attacker could then attempt logons from outside the corporate network, which would result in account lockout of the service account used by AD FS if an account lockout policy has been configured. This would result in denial of service for all applications relying on the AD FS instance. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-066: Vulnerability in Active Directory Federation Services Could Allow Information Disclosure - Active Directory Federation Services 1.x - Windows Server 2003 R2 SP2 (x64) (Japanese)
Severity: <Unspecified>
Fixlet ID: 1306603
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-066

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Active Directory Federation Services (AD FS). The vulnerability could reveal information pertaining to the service account used by AD FS. An attacker could then attempt logons from outside the corporate network, which would result in account lockout of the service account used by AD FS if an account lockout policy has been configured. This would result in denial of service for all applications relying on the AD FS instance. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-066: Vulnerability in Active Directory Federation Services Could Allow Information Disclosure - Active Directory Federation Services 2.0 - Windows Server 2008 SP2 (Japanese)
Severity: <Unspecified>
Fixlet ID: 1306605
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-066

Fixlet Description: Important Note: Microsoft has removed this update because of  an issue in the update that could cause AD FS to stop working. A new version of this Fixlet will be released when Microsoft comes out with new packages that address this issue.

Microsoft has released a security update that resolves a privately reported vulnerability in Active Directory Federation Services (AD FS). The vulnerability could reveal information pertaining to the service account used by AD FS. An attacker could then attempt logons from outside the corporate network, which would result in account lockout of the service account used by AD FS if an account lockout policy has been configured. This would result in denial of service for all applications relying on the AD FS instance. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-066: Vulnerability in Active Directory Federation Services Could Allow Information Disclosure - Active Directory Federation Services 1.x - Windows Server 2008 SP2 (Japanese)
Severity: <Unspecified>
Fixlet ID: 1306607
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-066

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Active Directory Federation Services (AD FS). The vulnerability could reveal information pertaining to the service account used by AD FS. An attacker could then attempt logons from outside the corporate network, which would result in account lockout of the service account used by AD FS if an account lockout policy has been configured. This would result in denial of service for all applications relying on the AD FS instance. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-066: Vulnerability in Active Directory Federation Services Could Allow Information Disclosure - Active Directory Federation Services 2.0 - Windows Server 2008 SP2 (x64) (Japanese)
Severity: <Unspecified>
Fixlet ID: 1306609
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-066

Fixlet Description: Important Note: Microsoft has removed this update because of  an issue in the update that could cause AD FS to stop working. A new version of this Fixlet will be released when Microsoft comes out with new packages that address this issue.

Microsoft has released a security update that resolves a privately reported vulnerability in Active Directory Federation Services (AD FS). The vulnerability could reveal information pertaining to the service account used by AD FS. An attacker could then attempt logons from outside the corporate network, which would result in account lockout of the service account used by AD FS if an account lockout policy has been configured. This would result in denial of service for all applications relying on the AD FS instance. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-066: Vulnerability in Active Directory Federation Services Could Allow Information Disclosure - Active Directory Federation Services 1.x - Windows Server 2008 SP2 (x64) (Japanese)
Severity: <Unspecified>
Fixlet ID: 1306611
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-066

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Active Directory Federation Services (AD FS). The vulnerability could reveal information pertaining to the service account used by AD FS. An attacker could then attempt logons from outside the corporate network, which would result in account lockout of the service account used by AD FS if an account lockout policy has been configured. This would result in denial of service for all applications relying on the AD FS instance. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-066: Vulnerability in Active Directory Federation Services Could Allow Information Disclosure - Active Directory Federation Services 2.0 - Windows Server 2008 R2 SP1 (x64) (Japanese)
Severity: <Unspecified>
Fixlet ID: 1306613
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-066

Fixlet Description: Important Note: Microsoft has removed this update because of  an issue in the update that could cause AD FS to stop working. A new version of this Fixlet will be released when Microsoft comes out with new packages that address this issue.

Microsoft has released a security update that resolves a privately reported vulnerability in Active Directory Federation Services (AD FS). The vulnerability could reveal information pertaining to the service account used by AD FS. An attacker could then attempt logons from outside the corporate network, which would result in account lockout of the service account used by AD FS if an account lockout policy has been configured. This would result in denial of service for all applications relying on the AD FS instance. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-066: Vulnerability in Active Directory Federation Services Could Allow Information Disclosure - Active Directory Federation Services 1.x - Windows Server 2008 R2 SP1 (x64) (Japanese)
Severity: <Unspecified>
Fixlet ID: 1306615
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-066

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Active Directory Federation Services (AD FS). The vulnerability could reveal information pertaining to the service account used by AD FS. An attacker could then attempt logons from outside the corporate network, which would result in account lockout of the service account used by AD FS if an account lockout policy has been configured. This would result in denial of service for all applications relying on the AD FS instance. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-066: Vulnerability in Active Directory Federation Services Could Allow Information Disclosure - Active Directory Federation Services 2.1 - Windows Server 2012 Gold (x64) (Japanese)
Severity: <Unspecified>
Fixlet ID: 1306617
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-066

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Active Directory Federation Services (AD FS). The vulnerability could reveal information pertaining to the service account used by AD FS. An attacker could then attempt logons from outside the corporate network, which would result in account lockout of the service account used by AD FS if an account lockout policy has been configured. This would result in denial of service for all applications relying on the AD FS instance. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: 2861855: Updates to improve Remote Desktop Protocol network-level authentication - Windows 7 SP1 (Japanese)
Severity: N/A
Fixlet ID: 286185501
Fixlet Link: http://support.microsoft.com/kb/2861855

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: 2861855: Updates to improve Remote Desktop Protocol network-level authentication - Windows 2008 R2 SP1 (x64) (Japanese)
Severity: N/A
Fixlet ID: 286185503
Fixlet Link: http://support.microsoft.com/kb/2861855

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: 2861855: Updates to improve Remote Desktop Protocol network-level authentication - Windows 2008 SP2 (x64) (Japanese)
Severity: N/A
Fixlet ID: 286185505
Fixlet Link: http://support.microsoft.com/kb/2861855

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: 2861855: Updates to improve Remote Desktop Protocol network-level authentication - Windows 2008 SP2 (Japanese)
Severity: N/A
Fixlet ID: 286185509
Fixlet Link: http://support.microsoft.com/kb/2861855

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: 2861855: Updates to improve Remote Desktop Protocol network-level authentication - Windows Vista SP2 (x64) (Japanese)
Severity: N/A
Fixlet ID: 286185513
Fixlet Link: http://support.microsoft.com/kb/2861855

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: 2861855: Updates to improve Remote Desktop Protocol network-level authentication - Windows 7 SP1 (x64) (Japanese)
Severity: N/A
Fixlet ID: 286185515
Fixlet Link: http://support.microsoft.com/kb/2861855

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: 2861855: Updates to improve Remote Desktop Protocol network-level authentication - Windows Vista SP2 (Japanese)
Severity: N/A
Fixlet ID: 286185517
Fixlet Link: http://support.microsoft.com/kb/2861855

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: 2862966: An update is available that improves management of weak certificate cryptographic algorithms in Windows - Windows 2012 Gold (x64) (Japanese)
Severity: N/A
Fixlet ID: 286296603
Fixlet Link: http://support.microsoft.com/kb/2862966

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: 2862966: An update is available that improves management of weak certificate cryptographic algorithms in Windows - Windows Vista SP2 (x64) (Japanese)
Severity: N/A
Fixlet ID: 286296605
Fixlet Link: http://support.microsoft.com/kb/2862966

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: 2862966: An update is available that improves management of weak certificate cryptographic algorithms in Windows - Windows 7 SP1 (x64) (Japanese)
Severity: N/A
Fixlet ID: 286296609
Fixlet Link: http://support.microsoft.com/kb/2862966

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: 2862966: An update is available that improves management of weak certificate cryptographic algorithms in Windows - Windows Vista SP2 (Japanese)
Severity: N/A
Fixlet ID: 286296611
Fixlet Link: http://support.microsoft.com/kb/2862966

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: 2862966: An update is available that improves management of weak certificate cryptographic algorithms in Windows - Windows 8 Gold (x64) (Japanese)
Severity: N/A
Fixlet ID: 286296613
Fixlet Link: http://support.microsoft.com/kb/2862966

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: 2862966: An update is available that improves management of weak certificate cryptographic algorithms in Windows - Windows 2008 SP2 (Japanese)
Severity: N/A
Fixlet ID: 286296615
Fixlet Link: http://support.microsoft.com/kb/2862966

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: 2862966: An update is available that improves management of weak certificate cryptographic algorithms in Windows - Windows 2008 R2 SP1 (x64) (Japanese)
Severity: N/A
Fixlet ID: 286296617
Fixlet Link: http://support.microsoft.com/kb/2862966

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: 2862966: An update is available that improves management of weak certificate cryptographic algorithms in Windows - Windows 7 SP1 (Japanese)
Severity: N/A
Fixlet ID: 286296619
Fixlet Link: http://support.microsoft.com/kb/2862966

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: 2862966: An update is available that improves management of weak certificate cryptographic algorithms in Windows - Windows 8 Gold (Japanese)
Severity: N/A
Fixlet ID: 286296621
Fixlet Link: http://support.microsoft.com/kb/2862966

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: 2862966: An update is available that improves management of weak certificate cryptographic algorithms in Windows - Windows 2008 SP2 (x64) (Japanese)
Severity: N/A
Fixlet ID: 286296623
Fixlet Link: http://support.microsoft.com/kb/2862966

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: 2862973: Update for deprecation of MD5 hashing algorithm for Microsoft root certificate program - Windows 8 Gold (Japanese)
Severity: N/A
Fixlet ID: 286297301
Fixlet Link: http://support.microsoft.com/kb/2862973

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: 2862973: Update for deprecation of MD5 hashing algorithm for Microsoft root certificate program - Windows Vista SP2 (x64) (Japanese)
Severity: N/A
Fixlet ID: 286297303
Fixlet Link: http://support.microsoft.com/kb/2862973

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: 2862973: Update for deprecation of MD5 hashing algorithm for Microsoft root certificate program - Windows Vista SP2 (Japanese)
Severity: N/A
Fixlet ID: 286297307
Fixlet Link: http://support.microsoft.com/kb/2862973

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: 2862973: Update for deprecation of MD5 hashing algorithm for Microsoft root certificate program - Windows 7 SP1 (Japanese)
Severity: N/A
Fixlet ID: 286297309
Fixlet Link: http://support.microsoft.com/kb/2862973

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: 2862973: Update for deprecation of MD5 hashing algorithm for Microsoft root certificate program - Windows 2008 SP2 (Japanese)
Severity: N/A
Fixlet ID: 286297313
Fixlet Link: http://support.microsoft.com/kb/2862973

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: 2862973: Update for deprecation of MD5 hashing algorithm for Microsoft root certificate program - Windows 8 Gold (x64) (Japanese)
Severity: N/A
Fixlet ID: 286297315
Fixlet Link: http://support.microsoft.com/kb/2862973

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: 2862973: Update for deprecation of MD5 hashing algorithm for Microsoft root certificate program - Windows 7 SP1 (x64) (Japanese)
Severity: N/A
Fixlet ID: 286297317
Fixlet Link: http://support.microsoft.com/kb/2862973

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: 2862973: Update for deprecation of MD5 hashing algorithm for Microsoft root certificate program - Windows 2008 SP2 (x64) (Japanese)
Severity: N/A
Fixlet ID: 286297319
Fixlet Link: http://support.microsoft.com/kb/2862973

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: 2862973: Update for deprecation of MD5 hashing algorithm for Microsoft root certificate program - Windows 2008 R2 SP1(x64) (Japanese)
Severity: N/A
Fixlet ID: 286297321
Fixlet Link: http://support.microsoft.com/kb/2862973

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: 2862973: Update for deprecation of MD5 hashing algorithm for Microsoft root certificate program - Windows 2012 Gold (x64) (Japanese)
Severity: N/A
Fixlet ID: 286297323
Fixlet Link: http://support.microsoft.com/kb/2862973

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.



More information about the BigFix-Announcements-Japan mailing list