Fixlet Site - PatchesforWindows(Japanese) Current Version: 142 Published: Fri, 11 Aug 2006 01:01:09 GMT *************************************************************** Title: MS06-040: Vulnerability in Server Service Could Allow Remote Code Execution - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 604001 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-040.mspx Fixlet Description: Microsoft has released an update that resolves a privately-reported vulnerability. An attacker who successfully exploited the vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-040: CORRUPT PATCH - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 604002 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-040.mspx Fixlet Description: The listed computers have faulty installations of a patch for the vulnerability described in MS06-040. Some files being used by these computers have versions earlier than those of the corresponding files installed by the patch. Services or applications installed after the patch was distributed may have overwritten the files, or the initial installation may have been faulty. We recommend reinstalling this patch to ensure the safety of affected computers.Microsoft has released an update that resolves a privately-reported vulnerability. An attacker who successfully exploited the vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-040: Vulnerability in Server Service Could Allow Remote Code Execution - Windows Server 2003 (Japanese) Severity: Critical Fixlet ID: 604003 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-040.mspx Fixlet Description: Microsoft has released an update that resolves a privately-reported vulnerability. An attacker who successfully exploited the vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-040: CORRUPT PATCH - Windows Server 2003 (Japanese) Severity: Critical Fixlet ID: 604004 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-040.mspx Fixlet Description: The listed computers have faulty installations of a patch for the vulnerability described in MS06-040. Some files being used by these computers have versions earlier than those of the corresponding files installed by the patch. Services or applications installed after the patch was distributed may have overwritten the files, or the initial installation may have been faulty. We recommend reinstalling this patch to ensure the safety of affected computers.Microsoft has released an update that resolves a privately-reported vulnerability. An attacker who successfully exploited the vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-040: Vulnerability in Server Service Could Allow Remote Code Execution - Windows XP SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 604005 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-040.mspx Fixlet Description: Microsoft has released an update that resolves a privately-reported vulnerability. An attacker who successfully exploited the vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-040: CORRUPT PATCH - Windows XP SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 604006 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-040.mspx Fixlet Description: The listed computers have faulty installations of a patch for the vulnerability described in MS06-040. Some files being used by these computers have versions earlier than those of the corresponding files installed by the patch. Services or applications installed after the patch was distributed may have overwritten the files, or the initial installation may have been faulty. We recommend reinstalling this patch to ensure the safety of affected computers.Microsoft has released an update that resolves a privately-reported vulnerability. An attacker who successfully exploited the vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-041: Vulnerability in DNS Resolution Could Allow Remote Code Execution - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 604101 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-041.mspx Fixlet Description: Microsoft has released an update that resolves two privately-reported vulnerabilities in Winsock and DNS Client that could allow an attacker who successfully exploited these vulnerabilities to take complete control of the affected system. For an attack on Winsock to be successful the attacker would have to force the user to open a file or visit a website that is specially crafted to call the affected Winsock API.After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-041: CORRUPT PATCH - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 604102 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-041.mspx Fixlet Description: The listed computers have faulty installations of a patch for the vulnerability described in MS06-041. Some files being used by these computers have versions earlier than those of the corresponding files installed by the patch. Services or applications installed after the patch was distributed may have overwritten the files, or the initial installation may have been faulty. We recommend reinstalling this patch to ensure the safety of affected computers.Microsoft has released an update that resolves two privately-reported vulnerabilities in Winsock and DNS Client that could allow an attacker who successfully exploited these vulnerabilities to take complete control of the affected system. For an attack on Winsock to be successful the attacker would have to force the user to open a file or visit a website that is specially crafted to call the affected Winsock API.After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-041: Vulnerability in DNS Resolution Could Allow Remote Code Execution - Windows Server 2003 (Japanese) Severity: Critical Fixlet ID: 604103 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-041.mspx Fixlet Description: Microsoft has released an update that resolves two privately-reported vulnerabilities in Winsock and DNS Client that could allow an attacker who successfully exploited these vulnerabilities to take complete control of the affected system. For an attack on Winsock to be successful the attacker would have to force the user to open a file or visit a website that is specially crafted to call the affected Winsock API.After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-041: CORRUPT PATCH - Windows Server 2003 (Japanese) Severity: Critical Fixlet ID: 604104 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-041.mspx Fixlet Description: The listed computers have faulty installations of a patch for the vulnerability described in MS06-041. Some files being used by these computers have versions earlier than those of the corresponding files installed by the patch. Services or applications installed after the patch was distributed may have overwritten the files, or the initial installation may have been faulty. We recommend reinstalling this patch to ensure the safety of affected computers.Microsoft has released an update that resolves two privately-reported vulnerabilities in Winsock and DNS Client that could allow an attacker who successfully exploited these vulnerabilities to take complete control of the affected system. For an attack on Winsock to be successful the attacker would have to force the user to open a file or visit a website that is specially crafted to call the affected Winsock API.After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-041: Vulnerability in DNS Resolution Could Allow Remote Code Execution - Windows XP SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 604105 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-041.mspx Fixlet Description: Microsoft has released an update that resolves two privately-reported vulnerabilities in Winsock and DNS Client that could allow an attacker who successfully exploited these vulnerabilities to take complete control of the affected system. For an attack on Winsock to be successful the attacker would have to force the user to open a file or visit a website that is specially crafted to call the affected Winsock API.After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-041: CORRUPT PATCH - Windows XP SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 604106 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-041.mspx Fixlet Description: The listed computers have faulty installations of a patch for the vulnerability described in MS06-041. Some files being used by these computers have versions earlier than those of the corresponding files installed by the patch. Services or applications installed after the patch was distributed may have overwritten the files, or the initial installation may have been faulty. We recommend reinstalling this patch to ensure the safety of affected computers.Microsoft has released an update that resolves two privately-reported vulnerabilities in Winsock and DNS Client that could allow an attacker who successfully exploited these vulnerabilities to take complete control of the affected system. For an attack on Winsock to be successful the attacker would have to force the user to open a file or visit a website that is specially crafted to call the affected Winsock API.After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-042: Cumulative Security Update for Internet Explorer - IE 6.0 SP1 - Windows 2000 SP4/Windows XP SP1 (Japanese) Severity: Critical Fixlet ID: 604203 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-042.mspx Fixlet Description: Microsoft has released a cumulative security patch that resolves several newly discovered, publicly and privately reported vulnerabilities. If a user is logged on with administrative user rights, an attacker who successfully exploited the most severe of these vulnerabilities could take complete control of an affected system.After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-042: CORRUPT PATCH - IE 6.0 SP1 - Windows 2000 SP4/Windows XP SP1 (Japanese) Severity: Critical Fixlet ID: 604204 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-042.mspx Fixlet Description: The listed computers have faulty installations of a patch for the vulnerability described in MS06-042. Some files being used by these computers have versions earlier than those of the corresponding files installed by the patch. Services or applications installed after the patch was distributed may have overwritten the files, or the initial installation may have been faulty. We recommend reinstalling this patch to ensure the safety of affected computers.Microsoft has released a cumulative security patch that resolves several newly discovered, publicly and privately reported vulnerabilities. If a user is logged on with administrative user rights, an attacker who successfully exploited the most severe of these vulnerabilities could take complete control of an affected system.After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-042: Cumulative Security Update for Internet Explorer - IE 6.0 - Windows XP SP2 (Japanese) Severity: Critical Fixlet ID: 604205 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-042.mspx Fixlet Description: Microsoft has released a cumulative security patch that resolves several newly discovered, publicly and privately reported vulnerabilities. If a user is logged on with administrative user rights, an attacker who successfully exploited the most severe of these vulnerabilities could take complete control of an affected system.After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-042: CORRUPT PATCH - IE 6.0 - Windows XP SP2 (Japanese) Severity: Critical Fixlet ID: 604206 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-042.mspx Fixlet Description: The listed computers have faulty installations of a patch for the vulnerability described in MS06-042. Some files being used by these computers have versions earlier than those of the corresponding files installed by the patch. Services or applications installed after the patch was distributed may have overwritten the files, or the initial installation may have been faulty. We recommend reinstalling this patch to ensure the safety of affected computers.Microsoft has released a cumulative security patch that resolves several newly discovered, publicly and privately reported vulnerabilities. If a user is logged on with administrative user rights, an attacker who successfully exploited the most severe of these vulnerabilities could take complete control of an affected system.After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-042: Cumulative Security Update for Internet Explorer - IE 5.01 SP4 - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 604207 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-042.mspx Fixlet Description: Microsoft has released a cumulative security patch that resolves several newly discovered, publicly and privately reported vulnerabilities. If a user is logged on with administrative user rights, an attacker who successfully exploited the most severe of these vulnerabilities could take complete control of an affected system.After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-042: CORRUPT PATCH - IE 5.01 SP4 - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 604208 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-042.mspx Fixlet Description: The listed computers have faulty installations of a patch for the vulnerability described in MS06-042. Some files being used by these computers have versions earlier than those of the corresponding files installed by the patch. Services or applications installed after the patch was distributed may have overwritten the files, or the initial installation may have been faulty. We recommend reinstalling this patch to ensure the safety of affected computers.Microsoft has released a cumulative security patch that resolves several newly discovered, publicly and privately reported vulnerabilities. If a user is logged on with administrative user rights, an attacker who successfully exploited the most severe of these vulnerabilities could take complete control of an affected system.After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-042: Cumulative Security Update for Internet Explorer - IE 6.0 - Windows Server 2003 (Japanese) Severity: Critical Fixlet ID: 604209 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-042.mspx Fixlet Description: Microsoft has released a cumulative security patch that resolves several newly discovered, publicly and privately reported vulnerabilities. If a user is logged on with administrative user rights, an attacker who successfully exploited the most severe of these vulnerabilities could take complete control of an affected system.After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-042: CORRUPT PATCH - IE 6.0 - Windows Server 2003 (Japanese) Severity: Critical Fixlet ID: 604210 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-042.mspx Fixlet Description: The listed computers have faulty installations of a patch for the vulnerability described in MS06-042. Some files being used by these computers have versions earlier than those of the corresponding files installed by the patch. Services or applications installed after the patch was distributed may have overwritten the files, or the initial installation may have been faulty. We recommend reinstalling this patch to ensure the safety of affected computers. Microsoft has released a cumulative security patch that resolves several newly discovered, publicly and privately reported vulnerabilities. If a user is logged on with administrative user rights, an attacker who successfully exploited the most severe of these vulnerabilities could take complete control of an affected system.After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-043: Vulnerability in Microsoft Windows Could Allow Remote Code Execution - Windows Server 2003 SP1 (Japanese) Severity: Critical Fixlet ID: 604303 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-043.mspx Fixlet Description: Microsoft has released an update that resolves a remote code execution vulnerability in Windows that results from incorrect parsing of the MHTML protocol. An attacker could exploit the vulnerability by constructing a specially crafted Web page or HTML e-mail that could potentially lead to remote code execution if a user visited a specially crafted Web site or clicked a link in a specially crafted e-mail message. If a user were logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less affected than users who operate with administrative user rights.After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-043: CORRUPT PATCH - Windows Server 2003 SP1 (Japanese) Severity: Critical Fixlet ID: 604304 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-043.mspx Fixlet Description: The listed computers have faulty installations of a patch for the vulnerability described in MS06-043. Some files being used by these computers have versions earlier than those of the corresponding files installed by the patch. Services or applications installed after the patch was distributed may have overwritten the files, or the initial installation may have been faulty. We recommend reinstalling this patch to ensure the safety of affected computers.Microsoft has released an update that resolves a remote code execution vulnerability in Windows that results from incorrect parsing of the MHTML protocol. An attacker could exploit the vulnerability by constructing a specially crafted Web page or HTML e-mail that could potentially lead to remote code execution if a user visited a specially crafted Web site or clicked a link in a specially crafted e-mail message. If a user were logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less affected than users who operate with administrative user rights.After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-043: Vulnerability in Microsoft Windows Could Allow Remote Code Execution - Windows XP SP2 (Japanese) Severity: Critical Fixlet ID: 604305 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-043.mspx Fixlet Description: Microsoft has released an update that resolves a remote code execution vulnerability in Windows that results from incorrect parsing of the MHTML protocol. An attacker could exploit the vulnerability by constructing a specially crafted Web page or HTML e-mail that could potentially lead to remote code execution if a user visited a specially crafted Web site or clicked a link in a specially crafted e-mail message. If a user were logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less affected than users who operate with administrative user rights.After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-043: CORRUPT PATCH - Windows XP SP2 (Japanese) Severity: Critical Fixlet ID: 604306 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-043.mspx Fixlet Description: The listed computers have faulty installations of a patch for the vulnerability described in MS06-043. Some files being used by these computers have versions earlier than those of the corresponding files installed by the patch. Services or applications installed after the patch was distributed may have overwritten the files, or the initial installation may have been faulty. We recommend reinstalling this patch to ensure the safety of affected computers.Microsoft has released an update that resolves a remote code execution vulnerability in Windows that results from incorrect parsing of the MHTML protocol. An attacker could exploit the vulnerability by constructing a specially crafted Web page or HTML e-mail that could potentially lead to remote code execution if a user visited a specially crafted Web site or clicked a link in a specially crafted e-mail message. If a user were logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less affected than users who operate with administrative user rights.After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-044: Vulnerability in Microsoft Management Console Could Allow Remote Code Execution - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 604401 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-044.mspx Fixlet Description: Microsoft has released a patch that resolves a newly discovered, privately reported vulnerability. An attacker who successfully exploited this vulnerability could take complete control of an affected system.After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-044: CORRUPT PATCH - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 604402 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-044.mspx Fixlet Description: The listed computers have faulty installations of a patch for the vulnerability described in MS06-044. Some files being used by these computers have versions earlier than those of the corresponding files installed by the patch. Services or applications installed after the patch was distributed may have overwritten the files, or the initial installation may have been faulty. We recommend reinstalling this patch to ensure the safety of affected computers.Microsoft has released a patch that resolves a newly discovered, privately reported vulnerability. An attacker who successfully exploited this vulnerability could take complete control of an affected system.After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-045: Vulnerability in Windows Explorer Could Allow Remote Code Execution - Windows 2000 SP4 (Japanese) Severity: Important Fixlet ID: 604501 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-045.mspx Fixlet Description: Microsoft has released a patch that resolves a newly-discovered, publicly-reported vulnerability. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-045: CORRUPT PATCH - Windows 2000 SP4 (Japanese) Severity: Important Fixlet ID: 604502 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-045.mspx Fixlet Description: The listed computers have faulty installations of a patch for the vulnerability described in MS06-045. Some files being used by these computers have versions earlier than those of the corresponding files installed by the patch. Services or applications installed after the patch was distributed may have overwritten the files, or the initial installation may have been faulty. We recommend reinstalling this patch to ensure the safety of affected computers.Microsoft has released a patch that resolves a newly-discovered, publicly-reported vulnerability. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-045: Vulnerability in Windows Explorer Could Allow Remote Code Execution - Windows Server 2003 (Japanese) Severity: Important Fixlet ID: 604503 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-045.mspx Fixlet Description: Microsoft has released a patch that resolves a newly-discovered, publicly-reported vulnerability. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-045: CORRUPT PATCH - Windows Server 2003 (Japanese) Severity: Important Fixlet ID: 604504 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-045.mspx Fixlet Description: The listed computers have faulty installations of a patch for the vulnerability described in MS06-045. Some files being used by these computers have versions earlier than those of the corresponding files installed by the patch. Services or applications installed after the patch was distributed may have overwritten the files, or the initial installation may have been faulty. We recommend reinstalling this patch to ensure the safety of affected computers.Microsoft has released a patch that resolves a newly-discovered, publicly-reported vulnerability. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-045: Vulnerability in Windows Explorer Could Allow Remote Code Execution - Windows XP SP1/SP2 (Japanese) Severity: Important Fixlet ID: 604505 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-045.mspx Fixlet Description: Microsoft has released a patch that resolves a newly-discovered, publicly-reported vulnerability. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-045: CORRUPT PATCH - Windows XP SP1/SP2 (Japanese) Severity: Important Fixlet ID: 604506 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-045.mspx Fixlet Description: The listed computers have faulty installations of a patch for the vulnerability described in MS06-045. Some files being used by these computers have versions earlier than those of the corresponding files installed by the patch. Services or applications installed after the patch was distributed may have overwritten the files, or the initial installation may have been faulty. We recommend reinstalling this patch to ensure the safety of affected computers.Microsoft has released a patch that resolves a newly-discovered, publicly-reported vulnerability. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-046: Vulnerability in HTML Help Could Allow Remote Code Execution - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 604601 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-046.mspx Fixlet Description: Microsoft has released an update that resolves a newly-discovered, privately-reported vulnerability. On vulnerable versions of Windows, if a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of the client workstation. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-046: CORRUPT PATCH - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 604602 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-046.mspx Fixlet Description: The listed computers have faulty installations of a patch for the vulnerability described in MS06-046. Some files being used by these computers have versions earlier than those of the corresponding files installed by the patch. Services or applications installed after the patch was distributed may have overwritten the files, or the initial installation may have been faulty. We recommend reinstalling this patch to ensure the safety of affected computers.Microsoft has released an update that resolves a newly-discovered, privately-reported vulnerability. On vulnerable versions of Windows, if a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of the client workstation. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-046: Vulnerability in HTML Help Could Allow Remote Code Execution - Windows Server 2003 (Japanese) Severity: Moderate Fixlet ID: 604603 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-046.mspx Fixlet Description: Microsoft has released an update that resolves a newly-discovered, privately-reported vulnerability. On vulnerable versions of Windows, if a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of the client workstation. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-046: CORRUPT PATCH - Windows Server 2003 (Japanese) Severity: Moderate Fixlet ID: 604604 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-046.mspx Fixlet Description: The listed computers have faulty installations of a patch for the vulnerability described in MS06-046. Some files being used by these computers have versions earlier than those of the corresponding files installed by the patch. Services or applications installed after the patch was distributed may have overwritten the files, or the initial installation may have been faulty. We recommend reinstalling this patch to ensure the safety of affected computers.Microsoft has released an update that resolves a newly-discovered, privately-reported vulnerability. On vulnerable versions of Windows, if a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of the client workstation. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-046: Vulnerability in HTML Help Could Allow Remote Code Execution - Windows XP SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 604605 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-046.mspx Fixlet Description: Microsoft has released an update that resolves a newly-discovered, privately-reported vulnerability. On vulnerable versions of Windows, if a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of the client workstation. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-046: CORRUPT PATCH - Windows XP SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 604606 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-046.mspx Fixlet Description: The listed computers have faulty installations of a patch for the vulnerability described in MS06-046. Some files being used by these computers have versions earlier than those of the corresponding files installed by the patch. Services or applications installed after the patch was distributed may have overwritten the files, or the initial installation may have been faulty. We recommend reinstalling this patch to ensure the safety of affected computers.Microsoft has released an update that resolves a newly-discovered, privately-reported vulnerability. On vulnerable versions of Windows, if a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of the client workstation. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-047: Vulnerability in Microsoft Visual Basic for Applications Could Allow Remote Code Execution - Office XP (Network/Local Install) (Japanese) Severity: Important Fixlet ID: 604708 Fixlet Link: http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS06-047.asp Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security patch for Office XP. This update resolves several newly-discovered, privately reported and public vulnerabilities. On vulnerable versions of Office, if a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of the client workstation. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-047: Vulnerability in Microsoft Visual Basic for Applications Could Allow Remote Code Execution - Project 2002 (Network/Local Install) (Japanese) Severity: Important Fixlet ID: 604710 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-047.mspx Fixlet Description: Microsoft has released a security patch for Project 2002. This update resolves several newly-discovered, privately reported and public vulnerabilities. On vulnerable versions of Office, if a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of the client workstation. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-047: Vulnerability in Microsoft Visual Basic for Applications Could Allow Remote Code Execution - Visio 2002 (Network/Local Install) (Japanese) Severity: Important Fixlet ID: 604711 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-047.mspx Fixlet Description: Microsoft has released a security patch for Visio 2002. This update resolves several newly-discovered, privately reported and public vulnerabilities. On vulnerable versions of Office, if a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of the client workstation. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-047: Vulnerability in Microsoft Visual Basic for Applications Could Allow Remote Code Execution - Office XP - Windows NT/2000/XP/2003 (Administrative Install) (Japanese) Severity: Important Fixlet ID: 604712 Fixlet Link: http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS06-047.asp Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security patch for Office XP. This update resolves several newly-discovered, privately reported and public vulnerabilities. On vulnerable versions of Office, if a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of the client workstation. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-048: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - PowerPoint 2002 - (Network/Local Install) (Japanese) Severity: Important Fixlet ID: 604804 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-048.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security patch for PowerPoint 2002. When using vulnerable versions of Office, if a user were logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of the client workstation. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-048: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - PowerPoint 2002 - Windows NT/2000/XP/2003 (Administrative Install) (Japanese) Severity: Important Fixlet ID: 604805 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-048.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security patch for PowerPoint 2002. When using vulnerable versions of Office, if a user were logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of the client workstation. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-048: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - PowerPoint 2003 - (Network/Local Install) (Japanese) Severity: Important Fixlet ID: 604806 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-048.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security patch for PowerPoint 2002. When using vulnerable versions of Office, if a user were logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of the client workstation. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-048: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution - PowerPoint 2003 - (Administrative Install) (Japanese) Severity: Important Fixlet ID: 604808 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-048.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security patch for PowerPoint 2002. When using vulnerable versions of Office, if a user were logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of the client workstation. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-049: Vulnerability in Windows Kernel Could Result in Elevation of Privilege - Windows 2000 SP4 (Japanese) Severity: Important Fixlet ID: 604901 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-049.mspx Fixlet Description: Microsoft has released an update that resolves a newly-discovered, privately-reported vulnerability. An attacker who successfully exploited the vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-049: CORRUPT PATCH - Windows 2000 SP4 (Japanese) Severity: Important Fixlet ID: 604902 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-049.mspx Fixlet Description: The listed computers have faulty installations of a patch for the vulnerability described in MS06-049. Some files being used by these computers have versions earlier than those of the corresponding files installed by the patch. Services or applications installed after the patch was distributed may have overwritten the files, or the initial installation may have been faulty. We recommend reinstalling this patch to ensure the safety of affected computers.Microsoft has released an update that resolves a newly-discovered, privately-reported vulnerability. An attacker who successfully exploited the vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-050: Vulnerabilities in Microsoft Windows Hyperlink Object Library Could Allow Remote Code Execution - Windows 2000 SP4 (Japanese) Severity: Important Fixlet ID: 605001 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-050.mspx Fixlet Description: Microsoft has released an update that resolves two newly-discovered, privately-reported vulnerabilities. An attacker who successfully exploited the most severe of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-050: CORRUPT PATCH - Windows 2000 SP4 (Japanese) Severity: Important Fixlet ID: 605002 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-050.mspx Fixlet Description: The listed computers have faulty installations of a patch for the vulnerability described in MS06-050. Some files being used by these computers have versions earlier than those of the corresponding files installed by the patch. Services or applications installed after the patch was distributed may have overwritten the files, or the initial installation may have been faulty. We recommend reinstalling this patch to ensure the safety of affected computers.Microsoft has released an update that resolves two newly-discovered, privately-reported vulnerabilities. An attacker who successfully exploited the most severe of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-050: Vulnerabilities in Microsoft Windows Hyperlink Object Library Could Allow Remote Code Execution - Windows Server 2003 (Japanese) Severity: Important Fixlet ID: 605003 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-050.mspx Fixlet Description: Microsoft has released an update that resolves two newly-discovered, privately-reported vulnerabilities. An attacker who successfully exploited the most severe of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-050: CORRUPT PATCH - Windows Server 2003 (Japanese) Severity: Important Fixlet ID: 605004 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-050.mspx Fixlet Description: The listed computers have faulty installations of a patch for the vulnerability described in MS06-050. Some files being used by these computers have versions earlier than those of the corresponding files installed by the patch. Services or applications installed after the patch was distributed may have overwritten the files, or the initial installation may have been faulty. We recommend reinstalling this patch to ensure the safety of affected computers.Microsoft has released an update that resolves two newly-discovered, privately-reported vulnerabilities. An attacker who successfully exploited the most severe of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-050: Vulnerabilities in Microsoft Windows Hyperlink Object Library Could Allow Remote Code Execution - Windows XP SP1/SP2 (Japanese) Severity: Important Fixlet ID: 605005 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-050.mspx Fixlet Description: Microsoft has released an update that resolves two newly-discovered, privately-reported vulnerabilities. An attacker who successfully exploited the most severe of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-050: CORRUPT PATCH - Windows XP SP1/SP2 (Japanese) Severity: Important Fixlet ID: 605006 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-050.mspx Fixlet Description: The listed computers have faulty installations of a patch for the vulnerability described in MS06-050. Some files being used by these computers have versions earlier than those of the corresponding files installed by the patch. Services or applications installed after the patch was distributed may have overwritten the files, or the initial installation may have been faulty. We recommend reinstalling this patch to ensure the safety of affected computers.Microsoft has released an update that resolves two newly-discovered, privately-reported vulnerabilities. An attacker who successfully exploited the most severe of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-051: Vulnerability in Windows Kernel Could Result in Remote Code Execution - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 605101 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-051.mspx Fixlet Description: Microsoft has released an update that resolves a newly-discovered, privately-reported vulnerability. An attacker who successfully exploited the most severe of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-051: CORRUPT PATCH - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 605102 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-051.mspx Fixlet Description: The listed computers have faulty installations of a patch for the vulnerability described in MS06-051. Some files being used by these computers have versions earlier than those of the corresponding files installed by the patch. Services or applications installed after the patch was distributed may have overwritten the files, or the initial installation may have been faulty. We recommend reinstalling this patch to ensure the safety of affected computers.Microsoft has released an update that resolves a newly-discovered, privately-reported vulnerability. An attacker who successfully exploited the most severe of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-051: Vulnerability in Windows Kernel Could Result in Remote Code Execution - Windows Server 2003 (Japanese) Severity: Critical Fixlet ID: 605103 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-051.mspx Fixlet Description: Microsoft has released an update that resolves a newly-discovered, privately-reported vulnerability. An attacker who successfully exploited the most severe of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-051: CORRUPT PATCH - Windows Server 2003 (Japanese) Severity: Critical Fixlet ID: 605104 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-051.mspx Fixlet Description: The listed computers have faulty installations of a patch for the vulnerability described in MS06-051. Some files being used by these computers have versions earlier than those of the corresponding files installed by the patch. Services or applications installed after the patch was distributed may have overwritten the files, or the initial installation may have been faulty. We recommend reinstalling this patch to ensure the safety of affected computers.Microsoft has released an update that resolves a newly-discovered, privately-reported vulnerability. An attacker who successfully exploited the most severe of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-051: Vulnerability in Windows Kernel Could Result in Remote Code Execution - Windows XP SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 605105 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-051.mspx Fixlet Description: Microsoft has released an update that resolves a newly-discovered, privately-reported vulnerability. An attacker who successfully exploited the most severe of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS06-051: CORRUPT PATCH - Windows XP SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 605106 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS06-051.mspx Fixlet Description: The listed computers have faulty installations of a patch for the vulnerability described in MS06-051. Some files being used by these computers have versions earlier than those of the corresponding files installed by the patch. Services or applications installed after the patch was distributed may have overwritten the files, or the initial installation may have been faulty. We recommend reinstalling this patch to ensure the safety of affected computers.Microsoft has released an update that resolves a newly-discovered, privately-reported vulnerability. An attacker who successfully exploited the most severe of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities.