[BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)'

autonotify at us.ibm.com autonotify at us.ibm.com
Mon Jan 21 02:39:47 PST 2013


Fixlet Site - 'Patches for Windows (Japanese)'
Current Version: 503	Published: Fri, 18 Jan 2013 14:09:46  GMT

New Fixlets:
============

***************************************************************
Title: MS13-001: Vulnerability in Windows Print Spooler Components Could Allow Remote Code Execution - Windows 7 Gold/SP1 (Japanese)
Severity: Critical
Fixlet ID: 1300101
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-001

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a print server received a specially crafted print job. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems connected directly to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-001: Vulnerability in Windows Print Spooler Components Could Allow Remote Code Execution - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1300103
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-001

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a print server received a specially crafted print job. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems connected directly to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-001: Vulnerability in Windows Print Spooler Components Could Allow Remote Code Execution - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1300105
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-001

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a print server received a specially crafted print job. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems connected directly to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-002: Vulnerabilities in Microsoft XML Core Services Could Allow Remote Code Execution - XML Core Services 4.0 - Windows XP SP3 / 2003 SP2 / Vista SP2 / 2008 SP2 / 7 Gold/SP1 / 8 Gold (Japanese)
Severity: Critical
Fixlet ID: 1300201
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-002

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft XML Core Services. The vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes the user to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-002: Vulnerabilities in Microsoft XML Core Services Could Allow Remote Code Execution - XML Core Services 6.0 - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1300203
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-002

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft XML Core Services. The vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes the user to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-002: Vulnerabilities in Microsoft XML Core Services Could Allow Remote Code Execution - XML Core Services 3.0 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1300205
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-002

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft XML Core Services. The vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes the user to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-002: Vulnerabilities in Microsoft XML Core Services Could Allow Remote Code Execution - XML Core Services 4.0 - XP SP2 / 2003 SP2 / Vista SP2 / 2008 SP2 / 7 Gold/SP1 / 2008 R2 Gold/SP1 / 8 Gold / 2012 Gold (x64) (Japanese)
Severity: Critical
Fixlet ID: 1300207
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-002

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft XML Core Services. The vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes the user to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-002: Vulnerabilities in Microsoft XML Core Services Could Allow Remote Code Execution - XML Core Services 6.0 - Windows XP SP2 / 2003 SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1300209
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-002

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft XML Core Services. The vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes the user to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-002: Vulnerabilities in Microsoft XML Core Services Could Allow Remote Code Execution - XML Core Services 6.0 - Windows Server 2003 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1300211
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-002

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft XML Core Services. The vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes the user to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-002: Vulnerabilities in Microsoft XML Core Services Could Allow Remote Code Execution - XML Core Services 3.0 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1300213
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-002

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft XML Core Services. The vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes the user to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-002: Vulnerabilities in Microsoft XML Core Services Could Allow Remote Code Execution - XML Core Services 6.0 - Windows Vista SP2 (Japanese)
Severity: Critical
Fixlet ID: 1300215
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-002

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft XML Core Services. The vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes the user to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-002: Vulnerabilities in Microsoft XML Core Services Could Allow Remote Code Execution - XML Core Services 3.0 / 6.0 - Windows Vista SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1300217
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-002

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft XML Core Services. The vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes the user to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-002: Vulnerabilities in Microsoft XML Core Services Could Allow Remote Code Execution - XML Core Services 6.0 - Windows Server 2008 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1300219
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-002

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft XML Core Services. The vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes the user to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-002: Vulnerabilities in Microsoft XML Core Services Could Allow Remote Code Execution - XML Core Services 3.0 / 6.0 - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1300221
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-002

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft XML Core Services. The vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes the user to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-002: Vulnerabilities in Microsoft XML Core Services Could Allow Remote Code Execution - XML Core Services 6.0 - Windows 7 Gold/SP1 (Japanese)
Severity: Critical
Fixlet ID: 1300223
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-002

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft XML Core Services. The vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes the user to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-002: Vulnerabilities in Microsoft XML Core Services Could Allow Remote Code Execution - XML Core Services 3.0 / 6.0 - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1300225
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-002

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft XML Core Services. The vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes the user to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-002: Vulnerabilities in Microsoft XML Core Services Could Allow Remote Code Execution - XML Core Services 3.0 / 6.0 - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1300227
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-002

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft XML Core Services. The vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes the user to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-002: Vulnerabilities in Microsoft XML Core Services Could Allow Remote Code Execution - XML Core Services 6.0 - Windows 8 Gold (Japanese)
Severity: Critical
Fixlet ID: 1300229
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-002

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft XML Core Services. The vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes the user to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-002: Vulnerabilities in Microsoft XML Core Services Could Allow Remote Code Execution - XML Core Services 3.0 / 6.0 - Windows 8 Gold (x64) (Japanese)
Severity: Critical
Fixlet ID: 1300231
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-002

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft XML Core Services. The vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes the user to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-002: Vulnerabilities in Microsoft XML Core Services Could Allow Remote Code Execution - XML Core Services 3.0 / 6.0 - Windows Server 2012 Gold (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1300233
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-002

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft XML Core Services. The vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes the user to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-004: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 1.0 SP3 - Tablet PC/Media Center Edition (Japanese)
Severity: Important
Fixlet ID: 1300401
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-004

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerabilities could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-004: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 1.1 SP1 - Windows XP SP2 / Server SP2 / Vista SP2 / 2008 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1300403
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-004

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerabilities could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-004: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 2.0 SP2 - Windows XP SP3 / Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1300405
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-004

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerabilities could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-004: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 4 - Windows XP SP3 / Windows Server 2003 SP2 / Windows Vista SP2 / Windows Server 2008 SP2 / Windows 7 Gold/SP1 (Japanese)
Severity: Important
Fixlet ID: 1300407
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-004

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerabilities could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-004: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 3.0 SP2 - Windows XP SP3 / Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1300409
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-004

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerabilities could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-004: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 2.0 SP2 - Windows XP SP2 / Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1300411
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-004

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerabilities could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-004: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 4 - Windows XP SP2 / 2003 SP2 / Vista SP2 / 2008 SP2 / 7 Gold/SP1 / 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1300413
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-004

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerabilities could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-004: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 3.0 SP2 - Windows XP SP2 / Windows Server 2003 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1300415
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-004

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerabilities could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-004: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 1.1 SP1 - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1300417
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-004

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerabilities could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-004: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 2.0 SP2 - Windows Vista SP2 / Windows Server 2008 SP2 (Japanese)
Severity: Important
Fixlet ID: 1300419
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-004

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerabilities could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-004: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 4.5 - Windows Vista SP2 / Windows Server 2008 SP2 / Windows 7 SP1 (Japanese)
Severity: Important
Fixlet ID: 1300421
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-004

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerabilities could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-004: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 3.0 SP2 - Windows Vista SP2 / Windows Server 2008 SP2 (Japanese)
Severity: Important
Fixlet ID: 1300423
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-004

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerabilities could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-004: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 2.0 SP2 - Windows Vista SP2 / Windows Server 2008 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1300425
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-004

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerabilities could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-004: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 4.5 - Windows Vista SP2 / 2008 SP2 / 7 SP1 / 2008 R2 SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1300427
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-004

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerabilities could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-004: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 3.0 SP2 - Windows Vista SP2 / Windows Server 2008 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1300429
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-004

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerabilities could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-004: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 3.5.1 - Windows 7 Gold (KB2742598) (Japanese)
Severity: Important
Fixlet ID: 1300431
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-004

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerabilities could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-004: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 3.5.1 - Windows 7 Gold (KB2756920) (Japanese)
Severity: Important
Fixlet ID: 1300433
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-004

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerabilities could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-004: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 3.5.1 - Windows 7 SP1 (KB2742599) (Japanese)
Severity: Important
Fixlet ID: 1300435
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-004

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerabilities could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-004: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 3.5.1 - Windows 7 SP1 (KB2756921) (Japanese)
Severity: Important
Fixlet ID: 1300437
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-004

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerabilities could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-004: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 3.5.1 - Windows 7 Gold / Windows Server 2008 R2 (KB2742598) (x64) (Japanese)
Severity: Important
Fixlet ID: 1300439
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-004

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerabilities could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-004: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 3.5.1 - Windows 7 Gold / Windows Server 2008 R2 (KB2756920) (x64) (Japanese)
Severity: Important
Fixlet ID: 1300441
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-004

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerabilities could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-004: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 3.5.1 - Windows 7 SP1 / Windows Server 2008 R2 SP1 (KB2742599) (x64) (Japanese)
Severity: Important
Fixlet ID: 1300443
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-004

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerabilities could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-004: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 3.5.1 - Windows 7 SP1 / Windows Server 2008 R2 SP1 (KB2756921) (x64) (Japanese)
Severity: Important
Fixlet ID: 1300445
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-004

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerabilities could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-004: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 3.5 - Windows Server 2012 Gold (KB2742616) (x64) (Japanese)
Severity: Important
Fixlet ID: 1300447
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-004

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerabilities could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-004: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 3.5 - Windows Server 2012 Gold (KB2756923) (x64) (Japanese)
Severity: Important
Fixlet ID: 1300449
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-004

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerabilities could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-004: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 4.5 - Windows Server 2012 Gold (x64) (Japanese)
Severity: Important
Fixlet ID: 1300451
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-004

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerabilities could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-004: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 1.1 SP1 - Windows XP SP3 / Windows Vista SP2 / Windows Server 2008 SP2 (Japanese)
Severity: Important
Fixlet ID: 1300453
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-004

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerabilities could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-004: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 3.5 - Windows 8 Gold (KB2742616) (x64) (Japanese)
Severity: Important
Fixlet ID: 1300455
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-004

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerabilities could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-004: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 3.5 - Windows 8 Gold (KB2756923) (x64) (Japanese)
Severity: Important
Fixlet ID: 1300457
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-004

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerabilities could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-004: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 4.5 - Windows 8 Gold (x64) (Japanese)
Severity: Important
Fixlet ID: 1300459
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-004

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerabilities could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-004: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 3.5 - Windows 8 Gold (KB2742616) (Japanese)
Severity: Important
Fixlet ID: 1300461
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-004

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerabilities could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-004: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 3.5 - Windows 8 Gold (KB2756923) (Japanese)
Severity: Important
Fixlet ID: 1300463
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-004

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerabilities could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-004: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - .NET Framework 4.5 - Windows 8 Gold (Japanese)
Severity: Important
Fixlet ID: 1300465
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-004

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerabilities could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS13-005: Vulnerability in Windows Kernel-Mode Driver Could Allow Elevation of Privilege - Windows Vista SP2 (Japanese)
Severity: Important
Fixlet ID: 1300501
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-005

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker runs a specially crafted application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-005: Vulnerability in Windows Kernel-Mode Driver Could Allow Elevation of Privilege - Windows Vista SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1300503
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-005

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker runs a specially crafted application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-005: Vulnerability in Windows Kernel-Mode Driver Could Allow Elevation of Privilege - Windows Server 2008 SP2 (Japanese)
Severity: Important
Fixlet ID: 1300505
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-005

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker runs a specially crafted application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-005: Vulnerability in Windows Kernel-Mode Driver Could Allow Elevation of Privilege - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1300507
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-005

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker runs a specially crafted application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-005: Vulnerability in Windows Kernel-Mode Driver Could Allow Elevation of Privilege - Windows 7 Gold/SP1 (Japanese)
Severity: Important
Fixlet ID: 1300509
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-005

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker runs a specially crafted application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-005: Vulnerability in Windows Kernel-Mode Driver Could Allow Elevation of Privilege - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1300511
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-005

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker runs a specially crafted application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-005: Vulnerability in Windows Kernel-Mode Driver Could Allow Elevation of Privilege - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1300513
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-005

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker runs a specially crafted application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-005: Vulnerability in Windows Kernel-Mode Driver Could Allow Elevation of Privilege - Windows 8 Gold (Japanese)
Severity: Important
Fixlet ID: 1300515
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-005

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker runs a specially crafted application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-005: Vulnerability in Windows Kernel-Mode Driver Could Allow Elevation of Privilege - Windows 8 Gold (x64) (Japanese)
Severity: Important
Fixlet ID: 1300517
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-005

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker runs a specially crafted application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-005: Vulnerability in Windows Kernel-Mode Driver Could Allow Elevation of Privilege - Windows Server 2012 Gold (x64) (Japanese)
Severity: Important
Fixlet ID: 1300519
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-005

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker runs a specially crafted application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-006: Vulnerability in Microsoft Windows Could Allow Security Feature Bypass - Windows Vista SP2 (Japanese)
Severity: Important
Fixlet ID: 1300601
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-006

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the implementation of SSL and TLS in Microsoft Windows. The vulnerability could allow security feature bypass if an attacker intercepts encrypted web traffic handshakes After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-006: Vulnerability in Microsoft Windows Could Allow Security Feature Bypass - Windows Vista SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1300603
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-006

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the implementation of SSL and TLS in Microsoft Windows. The vulnerability could allow security feature bypass if an attacker intercepts encrypted web traffic handshakes After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-006: Vulnerability in Microsoft Windows Could Allow Security Feature Bypass - Windows Server 2008 SP2 (Japanese)
Severity: Important
Fixlet ID: 1300605
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-006

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the implementation of SSL and TLS in Microsoft Windows. The vulnerability could allow security feature bypass if an attacker intercepts encrypted web traffic handshakes After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-006: Vulnerability in Microsoft Windows Could Allow Security Feature Bypass - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1300607
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-006

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the implementation of SSL and TLS in Microsoft Windows. The vulnerability could allow security feature bypass if an attacker intercepts encrypted web traffic handshakes After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-006: Vulnerability in Microsoft Windows Could Allow Security Feature Bypass - Windows 7 Gold/SP1 (Japanese)
Severity: Important
Fixlet ID: 1300609
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-006

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the implementation of SSL and TLS in Microsoft Windows. The vulnerability could allow security feature bypass if an attacker intercepts encrypted web traffic handshakes After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-006: Vulnerability in Microsoft Windows Could Allow Security Feature Bypass - Windows 7 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1300611
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-006

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the implementation of SSL and TLS in Microsoft Windows. The vulnerability could allow security feature bypass if an attacker intercepts encrypted web traffic handshakes After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-006: Vulnerability in Microsoft Windows Could Allow Security Feature Bypass - Windows Server 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1300613
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-006

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the implementation of SSL and TLS in Microsoft Windows. The vulnerability could allow security feature bypass if an attacker intercepts encrypted web traffic handshakes After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-006: Vulnerability in Microsoft Windows Could Allow Security Feature Bypass - Windows 8 Gold (Japanese)
Severity: Important
Fixlet ID: 1300615
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-006

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the implementation of SSL and TLS in Microsoft Windows. The vulnerability could allow security feature bypass if an attacker intercepts encrypted web traffic handshakes After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-006: Vulnerability in Microsoft Windows Could Allow Security Feature Bypass - Windows 8 Gold (x64) (Japanese)
Severity: Important
Fixlet ID: 1300617
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-006

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the implementation of SSL and TLS in Microsoft Windows. The vulnerability could allow security feature bypass if an attacker intercepts encrypted web traffic handshakes After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-006: Vulnerability in Microsoft Windows Could Allow Security Feature Bypass - Windows Server 2012 Gold (x64) (Japanese)
Severity: Important
Fixlet ID: 1300619
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-006

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the implementation of SSL and TLS in Microsoft Windows. The vulnerability could allow security feature bypass if an attacker intercepts encrypted web traffic handshakes After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-007: Vulnerability in Open Data Protocol Could Allow Denial of Service - .NET Framework 3.5 SP1 - Windows XP SP3 / Windows Server 2003 SP2 / Windows Vista SP2 / Windows Server 2008 SP2 (Japanese)
Severity: Important
Fixlet ID: 1300701
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-007

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Open Data (OData) protocol. The vulnerability could allow denial of service if an unauthenticated attacker sends specially crafted HTTP requests to an affected site. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-007: Vulnerability in Open Data Protocol Could Allow Denial of Service - .NET Framework 4 - Windows XP SP3 / Windows Server 2003 SP2 / Windows Vista SP2 / Windows Server 2008 SP2 / Windows 7 Gold/SP1 (Japanese)
Severity: Important
Fixlet ID: 1300703
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-007

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Open Data (OData) protocol. The vulnerability could allow denial of service if an unauthenticated attacker sends specially crafted HTTP requests to an affected site. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-007: Vulnerability in Open Data Protocol Could Allow Denial of Service - .NET Framework 3.5 SP1 - Windows XP SP2 / Windows Server 2003 SP2 / Windows Vista SP2 / Windows Server 2008 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1300705
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-007

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Open Data (OData) protocol. The vulnerability could allow denial of service if an unauthenticated attacker sends specially crafted HTTP requests to an affected site. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-007: Vulnerability in Open Data Protocol Could Allow Denial of Service - .NET Framework 4 - Windows XP SP2 / 2003 SP2 / Vista SP2 / Server 2008 SP2 / 7 Gold/SP1 / 2008 R2 Gold/SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1300707
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-007

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Open Data (OData) protocol. The vulnerability could allow denial of service if an unauthenticated attacker sends specially crafted HTTP requests to an affected site. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-007: Vulnerability in Open Data Protocol Could Allow Denial of Service - .NET Framework 3.5.1 - Windows 7 Gold (Japanese)
Severity: Important
Fixlet ID: 1300709
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-007

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Open Data (OData) protocol. The vulnerability could allow denial of service if an unauthenticated attacker sends specially crafted HTTP requests to an affected site. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-007: Vulnerability in Open Data Protocol Could Allow Denial of Service - .NET Framework 3.5.1 - Windows 7 SP1 (Japanese)
Severity: Important
Fixlet ID: 1300711
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-007

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Open Data (OData) protocol. The vulnerability could allow denial of service if an unauthenticated attacker sends specially crafted HTTP requests to an affected site. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-007: Vulnerability in Open Data Protocol Could Allow Denial of Service - .NET Framework 3.5.1 - Windows 7 Gold / Windows Server 2008 R2  (x64) (Japanese)
Severity: Important
Fixlet ID: 1300713
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-007

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Open Data (OData) protocol. The vulnerability could allow denial of service if an unauthenticated attacker sends specially crafted HTTP requests to an affected site. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-007: Vulnerability in Open Data Protocol Could Allow Denial of Service - .NET Framework 3.5.1 - Windows 7 SP1 / Windows Server 2008 R2 SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1300715
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-007

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Open Data (OData) protocol. The vulnerability could allow denial of service if an unauthenticated attacker sends specially crafted HTTP requests to an affected site. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-007: Vulnerability in Open Data Protocol Could Allow Denial of Service - .NET Framework 3.5 - Windows Server 2012 Gold (x64) (Japanese)
Severity: Important
Fixlet ID: 1300717
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-007

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Open Data (OData) protocol. The vulnerability could allow denial of service if an unauthenticated attacker sends specially crafted HTTP requests to an affected site. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-007: Vulnerability in Open Data Protocol Could Allow Denial of Service - Management OData IIS Extension - Windows Server 2012 Gold (x64) (Japanese)
Severity: Important
Fixlet ID: 1300719
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-007

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Open Data (OData) protocol. The vulnerability could allow denial of service if an unauthenticated attacker sends specially crafted HTTP requests to an affected site. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-007: Vulnerability in Open Data Protocol Could Allow Denial of Service - .NET Framework 3.5 - Windows 8 Gold (x64) (Japanese)
Severity: Important
Fixlet ID: 1300721
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-007

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Open Data (OData) protocol. The vulnerability could allow denial of service if an unauthenticated attacker sends specially crafted HTTP requests to an affected site. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-007: Vulnerability in Open Data Protocol Could Allow Denial of Service - .NET Framework 3.5 - Windows 8 Gold (Japanese)
Severity: Important
Fixlet ID: 1300723
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-007

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Open Data (OData) protocol. The vulnerability could allow denial of service if an unauthenticated attacker sends specially crafted HTTP requests to an affected site. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.



More information about the BigFix-Announcements-Japan mailing list