[BigFix-Announcements-Japan] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Japanese)'

autonotify at us.ibm.com autonotify at us.ibm.com
Fri Jun 14 02:31:47 PDT 2013


Fixlet Site - 'Patches for Windows (Japanese)'
Current Version: 513	Published: Thu, 13 Jun 2013 11:50:38  GMT

New Fixlets:
============

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1304701
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

Fixlet Description: Microsoft has released a security update that resolves nineteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1304702
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1304703
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

Fixlet Description: Microsoft has released a security update that resolves nineteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1304704
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1304705
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

Fixlet Description: Microsoft has released a security update that resolves nineteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1304706
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1304707
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

Fixlet Description: Microsoft has released a security update that resolves nineteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1304708
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1304709
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

Fixlet Description: Microsoft has released a security update that resolves nineteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1304710
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1304711
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

Fixlet Description: Microsoft has released a security update that resolves nineteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1304712
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1304713
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

Fixlet Description: Microsoft has released a security update that resolves nineteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1304714
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1304715
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

Fixlet Description: Microsoft has released a security update that resolves nineteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1304716
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 7 - Windows Vista SP2 (Japanese)
Severity: Critical
Fixlet ID: 1304717
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

Fixlet Description: Microsoft has released a security update that resolves nineteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 7 - Windows Vista SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1304719
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

Fixlet Description: Microsoft has released a security update that resolves nineteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2008 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1304721
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

Fixlet Description: Microsoft has released a security update that resolves nineteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1304723
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

Fixlet Description: Microsoft has released a security update that resolves nineteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP3 (Japanese)
Severity: Critical
Fixlet ID: 1304725
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

Fixlet Description: Microsoft has released a security update that resolves nineteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1304726
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1304727
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

Fixlet Description: Microsoft has released a security update that resolves nineteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Critical
Fixlet ID: 1304728
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1304729
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

Fixlet Description: Microsoft has released a security update that resolves nineteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1304730
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1304731
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

Fixlet Description: Microsoft has released a security update that resolves nineteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese)
Severity: Moderate
Fixlet ID: 1304732
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 8 - Windows Vista SP2 (Japanese)
Severity: Critical
Fixlet ID: 1304733
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

Fixlet Description: Microsoft has released a security update that resolves nineteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 8 - Windows Vista SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1304735
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

Fixlet Description: Microsoft has released a security update that resolves nineteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2008 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1304737
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

Fixlet Description: Microsoft has released a security update that resolves nineteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1304739
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

Fixlet Description: Microsoft has released a security update that resolves nineteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 8 - Windows 7 SP1 (Japanese)
Severity: Critical
Fixlet ID: 1304741
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

Fixlet Description: Microsoft has released a security update that resolves nineteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 8 - Windows 7 SP1 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1304743
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

Fixlet Description: Microsoft has released a security update that resolves nineteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2008 R2 SP1 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1304745
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

Fixlet Description: Microsoft has released a security update that resolves nineteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 9 - Windows Vista SP2 (Japanese)
Severity: Critical
Fixlet ID: 1304747
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

Fixlet Description: Microsoft has released a security update that resolves nineteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 9 - Windows Vista SP2 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1304749
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

Fixlet Description: Microsoft has released a security update that resolves nineteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 9 - Windows Server 2008 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1304751
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

Fixlet Description: Microsoft has released a security update that resolves nineteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 9 - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1304753
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

Fixlet Description: Microsoft has released a security update that resolves nineteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 9 - Windows 7 SP1 (Japanese)
Severity: Critical
Fixlet ID: 1304755
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

Fixlet Description: Microsoft has released a security update that resolves nineteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 9 - Windows 7 SP1 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1304757
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

Fixlet Description: Microsoft has released a security update that resolves nineteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 9 - Windows Server 2008 R2 SP1 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1304759
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

Fixlet Description: Microsoft has released a security update that resolves nineteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 10 - Windows 7 SP1 (Japanese)
Severity: Critical
Fixlet ID: 1304761
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

Fixlet Description: Microsoft has released a security update that resolves nineteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 10 - Windows 7 SP1 (x64) (Japanese)
Severity: Critical
Fixlet ID: 1304763
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

Fixlet Description: Microsoft has released a security update that resolves nineteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 10 - Windows Server 2008 R2 SP1 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1304765
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

Fixlet Description: Microsoft has released a security update that resolves nineteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 10 - Windows 8 Gold (Japanese)
Severity: Critical
Fixlet ID: 1304767
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

Fixlet Description: Microsoft has released a security update that resolves nineteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 10 - Windows 8 Gold (x64) (Japanese)
Severity: Critical
Fixlet ID: 1304769
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

Fixlet Description: Microsoft has released a security update that resolves nineteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-047: Cumulative Security Update for Internet Explorer - IE 10 - Windows Server 2012 Gold (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1304771
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-047

Fixlet Description: Microsoft has released a security update that resolves nineteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-048: Vulnerability in Windows Kernel Could Allow Information Disclosure - Windows XP SP3 (Japanese)
Severity: Important
Fixlet ID: 1304801
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-048

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Windows. The vulnerability could allow information disclosure if an attacker logs on to a system and runs a specially crafted application or convinces a local, logged-in user to run a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. Note that this vulnerability would not allow an attacker to execute code or to elevate their user rights directly, but it could be used to produce information that could be used to try to further compromise an affected system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-048: Vulnerability in Windows Kernel Could Allow Information Disclosure - Windows XP SP3 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1304802
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-048

***************************************************************
Title: MS13-048: Vulnerability in Windows Kernel Could Allow Information Disclosure - Windows Server 2003 SP2 (Japanese)
Severity: Important
Fixlet ID: 1304803
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-048

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Windows. The vulnerability could allow information disclosure if an attacker logs on to a system and runs a specially crafted application or convinces a local, logged-in user to run a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. Note that this vulnerability would not allow an attacker to execute code or to elevate their user rights directly, but it could be used to produce information that could be used to try to further compromise an affected system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-048: Vulnerability in Windows Kernel Could Allow Information Disclosure - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese)
Severity: Important
Fixlet ID: 1304804
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-048

***************************************************************
Title: MS13-048: Vulnerability in Windows Kernel Could Allow Information Disclosure - Windows Vista SP2 (Japanese)
Severity: Important
Fixlet ID: 1304805
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-048

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Windows. The vulnerability could allow information disclosure if an attacker logs on to a system and runs a specially crafted application or convinces a local, logged-in user to run a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. Note that this vulnerability would not allow an attacker to execute code or to elevate their user rights directly, but it could be used to produce information that could be used to try to further compromise an affected system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-048: Vulnerability in Windows Kernel Could Allow Information Disclosure - Windows Server 2008 SP2 (Japanese)
Severity: Important
Fixlet ID: 1304807
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-048

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Windows. The vulnerability could allow information disclosure if an attacker logs on to a system and runs a specially crafted application or convinces a local, logged-in user to run a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. Note that this vulnerability would not allow an attacker to execute code or to elevate their user rights directly, but it could be used to produce information that could be used to try to further compromise an affected system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-048: Vulnerability in Windows Kernel Could Allow Information Disclosure - Windows 7 SP1 (Japanese)
Severity: Important
Fixlet ID: 1304809
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-048

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Windows. The vulnerability could allow information disclosure if an attacker logs on to a system and runs a specially crafted application or convinces a local, logged-in user to run a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. Note that this vulnerability would not allow an attacker to execute code or to elevate their user rights directly, but it could be used to produce information that could be used to try to further compromise an affected system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-048: Vulnerability in Windows Kernel Could Allow Information Disclosure - Windows 8 Gold (Japanese)
Severity: Important
Fixlet ID: 1304811
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-048

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Windows. The vulnerability could allow information disclosure if an attacker logs on to a system and runs a specially crafted application or convinces a local, logged-in user to run a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. Note that this vulnerability would not allow an attacker to execute code or to elevate their user rights directly, but it could be used to produce information that could be used to try to further compromise an affected system. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS13-049: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - Windows Vista SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1304901
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-049

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker sends specially crafted packets to the server. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-049: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - Windows Vista SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1304903
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-049

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker sends specially crafted packets to the server. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-049: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - Windows Server 2008 SP2 (Japanese)
Severity: Moderate
Fixlet ID: 1304905
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-049

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker sends specially crafted packets to the server. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-049: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1304907
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-049

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker sends specially crafted packets to the server. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-049: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - Windows 7 SP1 (Japanese)
Severity: Moderate
Fixlet ID: 1304909
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-049

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker sends specially crafted packets to the server. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-049: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - Windows 7 SP1 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1304911
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-049

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker sends specially crafted packets to the server. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-049: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - Windows Server 2008 R2 SP1 (x64) (Japanese)
Severity: Moderate
Fixlet ID: 1304913
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-049

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker sends specially crafted packets to the server. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-049: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - Windows 8 Gold (Japanese)
Severity: Important
Fixlet ID: 1304915
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-049

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker sends specially crafted packets to the server. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-049: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - Windows 8 Gold (x64) (Japanese)
Severity: Important
Fixlet ID: 1304917
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-049

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker sends specially crafted packets to the server. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-049: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service - Windows Server 2012 Gold (x64) (Japanese)
Severity: Important
Fixlet ID: 1304919
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-049

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker sends specially crafted packets to the server. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-050: Vulnerability in Windows Print Spooler Components Could Allow Elevation of Privilege - Windows Vista SP2 (Japanese)
Severity: Important
Fixlet ID: 1305001
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-050

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege when an authenticated attacker deletes a printer connection. An attacker must have valid logon credentials and be able to log on to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-050: Vulnerability in Windows Print Spooler Components Could Allow Elevation of Privilege - Windows Vista SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1305003
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-050

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege when an authenticated attacker deletes a printer connection. An attacker must have valid logon credentials and be able to log on to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-050: Vulnerability in Windows Print Spooler Components Could Allow Elevation of Privilege - Windows Server 2008 SP2 (Japanese)
Severity: Important
Fixlet ID: 1305005
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-050

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege when an authenticated attacker deletes a printer connection. An attacker must have valid logon credentials and be able to log on to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-050: Vulnerability in Windows Print Spooler Components Could Allow Elevation of Privilege - Windows Server 2008 SP2 (x64) (Japanese)
Severity: Important
Fixlet ID: 1305007
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-050

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege when an authenticated attacker deletes a printer connection. An attacker must have valid logon credentials and be able to log on to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-050: Vulnerability in Windows Print Spooler Components Could Allow Elevation of Privilege - Windows 7 SP1 (Japanese)
Severity: Important
Fixlet ID: 1305009
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-050

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege when an authenticated attacker deletes a printer connection. An attacker must have valid logon credentials and be able to log on to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-050: Vulnerability in Windows Print Spooler Components Could Allow Elevation of Privilege - Windows 7 SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1305011
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-050

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege when an authenticated attacker deletes a printer connection. An attacker must have valid logon credentials and be able to log on to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-050: Vulnerability in Windows Print Spooler Components Could Allow Elevation of Privilege - Windows Server 2008 R2 SP1 (x64) (Japanese)
Severity: Important
Fixlet ID: 1305013
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-050

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege when an authenticated attacker deletes a printer connection. An attacker must have valid logon credentials and be able to log on to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-050: Vulnerability in Windows Print Spooler Components Could Allow Elevation of Privilege - Windows 8 Gold (Japanese)
Severity: Important
Fixlet ID: 1305015
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-050

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege when an authenticated attacker deletes a printer connection. An attacker must have valid logon credentials and be able to log on to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-050: Vulnerability in Windows Print Spooler Components Could Allow Elevation of Privilege - Windows 8 Gold (x64) (Japanese)
Severity: Important
Fixlet ID: 1305017
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-050

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege when an authenticated attacker deletes a printer connection. An attacker must have valid logon credentials and be able to log on to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-050: Vulnerability in Windows Print Spooler Components Could Allow Elevation of Privilege - Windows Server 2012 Gold (x64) (Japanese)
Severity: Important
Fixlet ID: 1305019
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-050

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege when an authenticated attacker deletes a printer connection. An attacker must have valid logon credentials and be able to log on to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS13-051: Vulnerability in Microsoft Office Could Allow Remote Code Execution - Office 2003 SP3 (Local/Network Installation) (Japanese)
Severity: Important
Fixlet ID: 1305101
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-051
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Office document using an affected version of Microsoft Office software, or previews or opens a specially crafted email message in Outlook while using Microsoft Word as the email reader. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false;  document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" +  link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS13-051: Vulnerability in Microsoft Office Could Allow Remote Code Execution - Office 2003 SP3 (Administrative Installation) (Japanese)
Severity: Important
Fixlet ID: 1305103
Fixlet Link: http://technet.microsoft.com/JA-JP/security/bulletin/MS13-051
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Office document using an affected version of Microsoft Office software, or previews or opens a specially crafted email message in Outlook while using Microsoft Word as the email reader. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false;  document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" +  link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: 2813430: An update is available that enables administrators to update trusted and disallowed CTLs in disconnected environments in Windows - Windows Vista SP2 (Japanese)
Severity: N/A
Fixlet ID: 281343001
Fixlet Link: http://support.microsoft.com/kb/2813430

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. This update allows administrators to: Configure domain-joined computers to use auto update without having access to the Windows Update site. This applies to updates for both trusted and disallowed CTLs. Configure domain-joined computers to independently opt in to auto update for both trusted and disallowed CTLs. Examine the set of roots in Microsoft root programs and to choose a subset of them for distribution via Group Policy. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2813430: An update is available that enables administrators to update trusted and disallowed CTLs in disconnected environments in Windows - Windows 2008 SP2 (Japanese)
Severity: N/A
Fixlet ID: 281343003
Fixlet Link: http://support.microsoft.com/kb/2813430

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. This update allows administrators to: Configure domain-joined computers to use auto update without having access to the Windows Update site. This applies to updates for both trusted and disallowed CTLs. Configure domain-joined computers to independently opt in to auto update for both trusted and disallowed CTLs. Examine the set of roots in Microsoft root programs and to choose a subset of them for distribution via Group Policy. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2813430: An update is available that enables administrators to update trusted and disallowed CTLs in disconnected environments in Windows - Windows 7 SP1 (Japanese)
Severity: N/A
Fixlet ID: 281343005
Fixlet Link: http://support.microsoft.com/kb/2813430

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. This update allows administrators to: Configure domain-joined computers to use auto update without having access to the Windows Update site. This applies to updates for both trusted and disallowed CTLs. Configure domain-joined computers to independently opt in to auto update for both trusted and disallowed CTLs. Examine the set of roots in Microsoft root programs and to choose a subset of them for distribution via Group Policy. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2813430: An update is available that enables administrators to update trusted and disallowed CTLs in disconnected environments in Windows - Windows 8 Gold (Japanese)
Severity: N/A
Fixlet ID: 281343007
Fixlet Link: http://support.microsoft.com/kb/2813430

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. This update allows administrators to: Configure domain-joined computers to use auto update without having access to the Windows Update site. This applies to updates for both trusted and disallowed CTLs. Configure domain-joined computers to independently opt in to auto update for both trusted and disallowed CTLs. Examine the set of roots in Microsoft root programs and to choose a subset of them for distribution via Group Policy. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2813430: An update is available that enables administrators to update trusted and disallowed CTLs in disconnected environments in Windows - Windows Vista SP2 (x64) (Japanese)
Severity: N/A
Fixlet ID: 281343009
Fixlet Link: http://support.microsoft.com/kb/2813430

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. This update allows administrators to: Configure domain-joined computers to use auto update without having access to the Windows Update site. This applies to updates for both trusted and disallowed CTLs. Configure domain-joined computers to independently opt in to auto update for both trusted and disallowed CTLs. Examine the set of roots in Microsoft root programs and to choose a subset of them for distribution via Group Policy. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2813430: An update is available that enables administrators to update trusted and disallowed CTLs in disconnected environments in Windows - Windows 2008 SP2 (x64) (Japanese)
Severity: N/A
Fixlet ID: 281343011
Fixlet Link: http://support.microsoft.com/kb/2813430

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. This update allows administrators to: Configure domain-joined computers to use auto update without having access to the Windows Update site. This applies to updates for both trusted and disallowed CTLs. Configure domain-joined computers to independently opt in to auto update for both trusted and disallowed CTLs. Examine the set of roots in Microsoft root programs and to choose a subset of them for distribution via Group Policy. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2813430: An update is available that enables administrators to update trusted and disallowed CTLs in disconnected environments in Windows - Windows 7 SP1 (x64) (Japanese)
Severity: N/A
Fixlet ID: 281343013
Fixlet Link: http://support.microsoft.com/kb/2813430

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. This update allows administrators to: Configure domain-joined computers to use auto update without having access to the Windows Update site. This applies to updates for both trusted and disallowed CTLs. Configure domain-joined computers to independently opt in to auto update for both trusted and disallowed CTLs. Examine the set of roots in Microsoft root programs and to choose a subset of them for distribution via Group Policy. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2813430: An update is available that enables administrators to update trusted and disallowed CTLs in disconnected environments in Windows - Windows 2008 R2 SP1 (x64) (Japanese)
Severity: N/A
Fixlet ID: 281343015
Fixlet Link: http://support.microsoft.com/kb/2813430

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. This update allows administrators to: Configure domain-joined computers to use auto update without having access to the Windows Update site. This applies to updates for both trusted and disallowed CTLs. Configure domain-joined computers to independently opt in to auto update for both trusted and disallowed CTLs. Examine the set of roots in Microsoft root programs and to choose a subset of them for distribution via Group Policy. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2813430: An update is available that enables administrators to update trusted and disallowed CTLs in disconnected environments in Windows - Windows 8 Gold (x64) (Japanese)
Severity: N/A
Fixlet ID: 281343017
Fixlet Link: http://support.microsoft.com/kb/2813430

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. This update allows administrators to: Configure domain-joined computers to use auto update without having access to the Windows Update site. This applies to updates for both trusted and disallowed CTLs. Configure domain-joined computers to independently opt in to auto update for both trusted and disallowed CTLs. Examine the set of roots in Microsoft root programs and to choose a subset of them for distribution via Group Policy. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2813430: An update is available that enables administrators to update trusted and disallowed CTLs in disconnected environments in Windows - Windows 2012 Gold (x64) (Japanese)
Severity: N/A
Fixlet ID: 281343019
Fixlet Link: http://support.microsoft.com/kb/2813430

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. This update allows administrators to: Configure domain-joined computers to use auto update without having access to the Windows Update site. This applies to updates for both trusted and disallowed CTLs. Configure domain-joined computers to independently opt in to auto update for both trusted and disallowed CTLs. Examine the set of roots in Microsoft root programs and to choose a subset of them for distribution via Group Policy. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: 2847928: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer 10 - Windows 8 Gold (Japanese)
Severity: Critical
Fixlet ID: 284792801
Fixlet Link: http://support.microsoft.com/kb/2847928

Fixlet Description: Microsoft released an update for all supported editions of Windows 8, Windows Server 2012, and Windows RT. The update addresses the vulnerabilities described in Adobe Security bulletin APSB13-16. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: 2847928: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer 10 - Windows 8 Gold (x64) (Japanese)
Severity: Critical
Fixlet ID: 284792803
Fixlet Link: http://support.microsoft.com/kb/2847928

Fixlet Description: Microsoft released an update for all supported editions of Windows 8, Windows Server 2012, and Windows RT. The update addresses the vulnerabilities described in Adobe Security bulletin APSB13-16. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: 2847928: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer 10 - Windows 2012 Gold (x64) (Japanese)
Severity: Critical
Fixlet ID: 284792805
Fixlet Link: http://support.microsoft.com/kb/2847928

Fixlet Description: Microsoft released an update for all supported editions of Windows 8, Windows Server 2012, and Windows RT. The update addresses the vulnerabilities described in Adobe Security bulletin APSB13-16. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.



More information about the BigFix-Announcements-Japan mailing list