Fixlet Site - PatchesforWindows(Japanese) Current Version: 184 Published: Fri, 15 Jun 2007 01:24:59 GMT *************************************************************** Title: MS07-012: Vulnerability in Microsoft MFC Could Allow Remote Code Execution - Windows Server 2003 (v2, re-released 6/12/2007) (Japanese) Severity: Important Fixlet ID: 701218 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-012.mspx Fixlet Description: Important Note: This patch was re-released on June 12, 2007 to add Microsoft Windows Server 2003 Service Pack 2 as an affected product. The action below deploys the revised version of the patch. Microsoft has released an update that resolves a newly discovered, privately reported vulnerability. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this patch. See the Caveats section of the security bulletin for more information. *************************************************************** Title: MS07-012: CORRUPT PATCH - Windows Server 2003 (v2, re-released 6/12/2007) (Japanese) Severity: Important Fixlet ID: 701219 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-012.mspx *************************************************************** Title: MS07-018: Vulnerabilities in Microsoft Content Management Server Could Allow Remote Code Execution - MCMS 2002 SP2 (v2, re-released 6/12/2007) (Japanese) Severity: Critical Fixlet ID: 701804 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms07-018.mspx Fixlet Description: Important Note: This patch was re-released on June 12, 2007 to address known issues with the original patch. The action below deploys the revised version of the patch. Microsoft has released an update resolving two newly discovered, privately reported vulnerabilities. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are several known issues associated with the installation of this patch. See the Caveats section of the security bulletin for more information. *************************************************************** Title: MS07-030: Vulnerabilities in Microsoft Visio Could Allow Remote Code Execution - Visio 2002 SP2 (Network/Local Install) (Japanese) Severity: Important Fixlet ID: 703001 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-030.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security patch for Visio 2002 Service Pack 2. This update resolves two privately discovered and responsibly reported vulnerabilities that could allow remote code execution if a user opened a specially crafted Visio file. *************************************************************** Title: MS07-030: Vulnerabilities in Microsoft Visio Could Allow Remote Code Execution - Visio 2003 SP2 (Network/Local Install) (Japanese) Severity: Important Fixlet ID: 703003 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-030.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security patch for Visio 2003 Service Pack 2. This update resolves two privately discovered and responsibly reported vulnerabilities that could allow remote code execution if a user opened a specially crafted Visio file. *************************************************************** Title: MS07-031: Vulnerability in the Windows Schannel Security Package Could Allow Remote Code Execution - Windows XP SP2 (Japanese) Severity: Critical Fixlet ID: 703101 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-031.mspx Fixlet Description: Microsoft has released a patch that resolves a newly discovered, privately reported vulnerability in the Secure Channel (Schannel) security package in Windows. The Schannel security package implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) Internet standard authentication protocols. This vulnerability could allow remote code execution if a user viewed a specially crafted Web page using an Internet Web browser or used an application that makes use of SSL/TLS. After downloading and installing this patch, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS07-031: CORRUPT PATCH - Windows XP SP2 (Japanese) Severity: Critical Fixlet ID: 703102 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-031.mspx *************************************************************** Title: MS07-031: Vulnerability in the Windows Schannel Security Package Could Allow Remote Code Execution - Windows 2000 SP4 (Japanese) Severity: Moderate Fixlet ID: 703103 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-031.mspx Fixlet Description: Microsoft has released a patch that resolves a newly discovered, privately reported vulnerability in the Secure Channel (Schannel) security package in Windows. The Schannel security package implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) Internet standard authentication protocols. This vulnerability could allow remote code execution if a user viewed a specially crafted Web page using an Internet Web browser or used an application that makes use of SSL/TLS. After downloading and installing this patch, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS07-031: CORRUPT PATCH - Windows 2000 SP4 (Japanese) Severity: Moderate Fixlet ID: 703104 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-031.mspx *************************************************************** Title: MS07-031: Vulnerability in the Windows Schannel Security Package Could Allow Remote Code Execution - Windows Server 2003 SP1/SP2 (Japanese) Severity: Important Fixlet ID: 703105 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-031.mspx Fixlet Description: Microsoft has released a patch that resolves a newly discovered, privately reported vulnerability in the Secure Channel (Schannel) security package in Windows. The Schannel security package implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) Internet standard authentication protocols. This vulnerability could allow remote code execution if a user viewed a specially crafted Web page using an Internet Web browser or used an application that makes use of SSL/TLS. After downloading and installing this patch, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS07-031: CORRUPT PATCH - Windows Server 2003 SP1/SP2 (Japanese) Severity: Important Fixlet ID: 703106 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-031.mspx *************************************************************** Title: MS07-032: Vulnerability in Windows Vista Could Allow Information Disclosure - Windows Vista (Japanese) Severity: Moderate Fixlet ID: 703201 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-032.mspx Fixlet Description: Microsoft has released an update that resolves a privately reported vulnerability. An attacker who successfully exploited this vulnerability could allow non-privileged users to access local user information data stores including administrative passwords contained within the registry and local file system. After downloading and installing this patch, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS07-033: Cumulative Security Update for Internet Explorer - IE 7 - Windows Vista (Japanese) Severity: Critical Fixlet ID: 703301 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-033.mspx Fixlet Description: Microsoft has released a patch that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability. All but one of these vulnerabilities could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. One vulnerability could allow spoofing, and also involves a specially crafted Web page. In all remote code execution cases, users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. For the spoofing case, exploitation requires user interaction. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS07-033: Cumulative Security Update for Internet Explorer - IE 6.0 - Windows XP SP2 (Japanese) Severity: Critical Fixlet ID: 703303 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms07-033.mspx Fixlet Description: Microsoft has released a patch that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability. All but one of these vulnerabilities could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. One vulnerability could allow spoofing, and also involves a specially crafted Web page. In all remote code execution cases, users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. For the spoofing case, exploitation requires user interaction. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are several known issues associated with the installation of this patch. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-033: CORRUPT PATCH - IE 6.0 - Windows XP SP2 (Japanese) Severity: Critical Fixlet ID: 703304 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms07-033.mspx *************************************************************** Title: MS07-033: Cumulative Security Update for Internet Explorer - IE 6.0 SP1 - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 703305 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-033.mspx Fixlet Description: Microsoft has released a patch that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability. All but one of these vulnerabilities could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. One vulnerability could allow spoofing, and also involves a specially crafted Web page. In all remote code execution cases, users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. For the spoofing case, exploitation requires user interaction. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are several known issues associated with the installation of this patch. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-033: CORRUPT PATCH - IE 6.0 SP1 - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 703306 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-033.mspx *************************************************************** Title: MS07-033: Cumulative Security Update for Internet Explorer - IE 7.0 - Windows XP SP2 (Japanese) Severity: Critical Fixlet ID: 703307 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms07-033.mspx Fixlet Description: Microsoft has released a patch that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability. All but one of these vulnerabilities could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. One vulnerability could allow spoofing, and also involves a specially crafted Web page. In all remote code execution cases, users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. For the spoofing case, exploitation requires user interaction. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are several known issues associated with the installation of this patch. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-033: CORRUPT PATCH - IE 7.0 - Windows XP SP2 (Japanese) Severity: Critical Fixlet ID: 703308 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms07-033.mspx *************************************************************** Title: MS07-033: Cumulative Security Update for Internet Explorer - IE 5.01 SP4 - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 703311 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-033.mspx Fixlet Description: Microsoft has released a patch that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability. All but one of these vulnerabilities could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. One vulnerability could allow spoofing, and also involves a specially crafted Web page. In all remote code execution cases, users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. For the spoofing case, exploitation requires user interaction. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are several known issues associated with the installation of this patch. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-033: CORRUPT PATCH - IE 5.01 SP4 - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 703312 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-033.mspx *************************************************************** Title: MS07-033: Cumulative Security Update for Internet Explorer - IE 7.0 - Windows Server 2003 SP1/SP2 (Japanese) Severity: Moderate Fixlet ID: 703319 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-033.mspx Fixlet Description: Microsoft has released a patch that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability. All but one of these vulnerabilities could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. One vulnerability could allow spoofing, and also involves a specially crafted Web page. In all remote code execution cases, users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. For the spoofing case, exploitation requires user interaction. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are several known issues associated with the installation of this patch. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-033: CORRUPT PATCH - IE 7.0 - Windows Server 2003 SP1/SP2 (Japanese) Severity: Moderate Fixlet ID: 703320 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-033.mspx *************************************************************** Title: MS07-033: Cumulative Security Update for Internet Explorer - IE 6.0 - Windows Server 2003 SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 703321 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms07-033.mspx Fixlet Description: Microsoft has released a patch that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability. All but one of these vulnerabilities could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. One vulnerability could allow spoofing, and also involves a specially crafted Web page. In all remote code execution cases, users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. For the spoofing case, exploitation requires user interaction. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are several known issues associated with the installation of this patch. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-033: CORRUPT PATCH - IE 6.0 - Windows Server 2003 SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 703322 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms07-033.mspx *************************************************************** Title: MS07-034: Cumulative Security Update for Outlook Express and Windows Mail - Windows XP SP2 (Japanese) Severity: Important Fixlet ID: 703401 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-034.mspx Fixlet Description: Microsoft has released a patch that resolves two newly discovered, publicly disclosed vulnerabilities. One of these vulnerabilities could allow remote code execution if a user viewed a specially crafted e-mail using Windows Mail in Windows Vista. The other vulnerabilities could allow information disclosure if a user visits a specially crafted Web page using Internet Explorer and cannot be exploited directly in Outlook Express. For the information disclosure vulnerabilities, users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are several known issues associated with the installation of this patch. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-034: CORRUPT PATCH - Windows XP SP2 (Japanese) Severity: Important Fixlet ID: 703402 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-034.mspx *************************************************************** Title: MS07-034: Cumulative Security Update for Outlook Express and Windows Mail - Windows 2003 SP1/SP2 (Japanese) Severity: Low Fixlet ID: 703403 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-034.mspx Fixlet Description: Microsoft has released a patch that resolves two newly discovered, publicly disclosed vulnerabilities. One of these vulnerabilities could allow remote code execution if a user viewed a specially crafted e-mail using Windows Mail in Windows Vista. The other vulnerabilities could allow information disclosure if a user visits a specially crafted Web page using Internet Explorer and cannot be exploited directly in Outlook Express. For the information disclosure vulnerabilities, users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are several known issues associated with the installation of this patch. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-034: CORRUPT PATCH - Windows 2003 SP1/SP2 (Japanese) Severity: Low Fixlet ID: 703406 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-034.mspx *************************************************************** Title: MS07-034: Cumulative Security Update for Outlook Express and Windows Mail - Windows Vista (Japanese) Severity: Critical Fixlet ID: 703411 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms07-034.mspx Fixlet Description: Microsoft has released a patch that resolves two newly discovered, publicly disclosed vulnerabilities. One of these vulnerabilities could allow remote code execution if a user viewed a specially crafted e-mail using Windows Mail in Windows Vista. The other vulnerabilities could allow information disclosure if a user visits a specially crafted Web page using Internet Explorer and cannot be exploited directly in Outlook Express. For the information disclosure vulnerabilities, users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are several known issues associated with the installation of this patch. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-035: Vulnerability in Win 32 API Could Allow Remote Code Execution - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 703501 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-035.mspx Fixlet Description: Microsoft has released an update that resolves a privately reported vulnerability in a Win32 API. This vulnerability could allow remote code execution or elevation of privilege if the affected API is used locally by a specially crafted application. Therefore applications that use this component of the Win32 API could be used as a vector for this vulnerability. After downloading and installing this patch, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS07-035: CORRUPT PATCH - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 703502 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-035.mspx *************************************************************** Title: MS07-035: Vulnerability in Win 32 API Could Allow Remote Code Execution - Windows XP SP2 (Japanese) Severity: Critical Fixlet ID: 703503 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-035.mspx Fixlet Description: Microsoft has released an update that resolves a privately reported vulnerability in a Win32 API. This vulnerability could allow remote code execution or elevation of privilege if the affected API is used locally by a specially crafted application. Therefore applications that use this component of the Win32 API could be used as a vector for this vulnerability. After downloading and installing this patch, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS07-035: CORRUPT PATCH - Windows XP SP2 (Japanese) Severity: Critical Fixlet ID: 703504 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-035.mspx *************************************************************** Title: MS07-035: Vulnerability in Win 32 API Could Allow Remote Code Execution - Windows Server 2003 SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 703505 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms07-035.mspx Fixlet Description: Microsoft has released an update that resolves a privately reported vulnerability in a Win32 API. This vulnerability could allow remote code execution or elevation of privilege if the affected API is used locally by a specially crafted application. Therefore applications that use this component of the Win32 API could be used as a vector for this vulnerability. After downloading and installing this patch, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS07-035: CORRUPT PATCH - Windows Server 2003 SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 703506 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms07-035.mspx