Fixlet Site - PatchesforWindows(Japanese) Current Version: 192 Published: Fri, 17 Aug 2007 23:57:07 GMT *************************************************************** Title: MS07-038: Vulnerability in Windows Vista Firewall Could Allow Information Disclosure - Windows Vista (v2, re-released 8/14/2007) (Japanese) Severity: Moderate Fixlet ID: 703803 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-038.mspx Fixlet Description: Important Note: This patch was re-released on August 14, 2007 to address known issues with the original patch. The action below deploys the revised version of the patch. Microsoft has released a patch that resolves a privately reported vulnerability. This vulnerability could allow incoming unsolicited network traffic to access a network interface. An attacker could potentially gather information about the affected host. This security update addresses the vulnerability by modifying the Windows Vista firewall default behavior to block unsolicited traffic communicating over the Teredo interface. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS07-042: Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution - XML Core Services 5.0 - Office 2003 (Network/Local Install) (Japanese) Severity: Critical Fixlet ID: 704201 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-042.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a patch that resolves a privately reported vulnerability. This vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. The vulnerability could be exploited through attacks on Microsoft XML Core Services. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS07-042: Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution - XML Core Services 5.0 - Office 2003 (Administrative Install) (Japanese) Severity: Critical Fixlet ID: 704202 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-042.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a patch that resolves a privately reported vulnerability. This vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. The vulnerability could be exploited through attacks on Microsoft XML Core Services. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS07-042: Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution - XML Core Services 5.0 - Office 2007 (Japanese) Severity: Critical Fixlet ID: 704211 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-042.mspx Fixlet Description: Microsoft has released a patch that resolves a privately reported vulnerability. This vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. The vulnerability could be exploited through attacks on Microsoft XML Core Services. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS07-042: Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution - XML Core Services 5.0 - SharePoint Server 2007 (Japanese) Severity: Critical Fixlet ID: 704213 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-042.mspx Fixlet Description: Microsoft has released a patch that resolves a privately reported vulnerability. This vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. The vulnerability could be exploited through attacks on Microsoft XML Core Services. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS07-042: Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution - XML Core Services 3.0 - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 704221 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-042.mspx Fixlet Description: Microsoft has released a critical security update resolving a privately reported vulnerability. This vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. The vulnerability could be exploited through attacks on Microsoft XML Core Services. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS07-042: CORRUPT PATCH - XML Core Services 3.0 - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 704222 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-042.mspx *************************************************************** Title: MS07-042: Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution - XML Core Services 3.0 - Windows XP SP2 (Japanese) Severity: Critical Fixlet ID: 704227 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-042.mspx Fixlet Description: Microsoft has released this critical security update to resolve a privately reported vulnerability. This vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. The vulnerability could be exploited through attacks on Microsoft XML Core Services. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerability. *************************************************************** Title: MS07-042: CORRUPT PATCH - XML Core Services 3.0 - Windows XP SP2 (Japanese) Severity: Critical Fixlet ID: 704228 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-042.mspx *************************************************************** Title: MS07-042: Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution - XML Core Services 4.0 SP2 (Japanese) Severity: Critical Fixlet ID: 704231 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-042.mspx Fixlet Description: Microsoft has released this critical security update to resolve a privately reported vulnerability. This vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. The vulnerability could be exploited through attacks on Microsoft XML Core Services. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS07-042: Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution - XML Core Services 6.0 - Windows 2000/XP/2003 (Japanese) Severity: Critical Fixlet ID: 704235 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-042.mspx Fixlet Description: Microsoft has released a critical security update resolving a privately reported vulnerability. This vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. The vulnerability could be exploited through attacks on Microsoft XML Core Services. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerability. *************************************************************** Title: MS07-042: Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution - XML Core Services 3.0 - Windows Server 2003 (Japanese) Severity: Critical Fixlet ID: 704237 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-042.mspx Fixlet Description: Microsoft has released a critical security update resolving a privately reported vulnerability. This vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. The vulnerability could be exploited through attacks on Microsoft XML Core Services. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerability. *************************************************************** Title: MS07-042: CORRUPT PATCH - XML Core Services 3.0 - Windows Server 2003 (Japanese) Severity: Critical Fixlet ID: 704238 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-042.mspx *************************************************************** Title: MS07-042: Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution - XML Core Services 3.0 - Windows Vista (Japanese) Severity: Critical Fixlet ID: 704263 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-042.mspx Fixlet Description: Microsoft has released a critical security update to resolve a privately reported vulnerability. This vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. The vulnerability could be exploited through attacks on Microsoft XML Core Services. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerability. *************************************************************** Title: MS07-042: Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution - XML Core Services 6.0 - Windows Vista (Japanese) Severity: Critical Fixlet ID: 704267 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-042.mspx Fixlet Description: Microsoft has released a critical security update to resolve a privately reported vulnerability. This vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. The vulnerability could be exploited through attacks on Microsoft XML Core Services. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerability. *************************************************************** Title: MS07-043: Vulnerability in OLE Automation Could Allow Remote Code Execution - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 704301 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms07-043.mspx Fixlet Description: Microsoft has released a patch that resolves a privately reported vulnerability in OLE Automation. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could execute code remotely. After downloading and installing this patch, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this patch. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-043: CORRUPT PATCH - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 704302 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms07-043.mspx *************************************************************** Title: MS07-043: Vulnerability in OLE Automation Could Allow Remote Code Execution - Windows XP SP2 (Japanese) Severity: Critical Fixlet ID: 704303 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms07-043.mspx Fixlet Description: Microsoft has released a patch that resolves a privately reported vulnerability in OLE Automation. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could execute code remotely. After downloading and installing this patch, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this patch. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-043: CORRUPT PATCH - Windows XP SP2 (Japanese) Severity: Critical Fixlet ID: 704304 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms07-043.mspx *************************************************************** Title: MS07-043: Vulnerability in OLE Automation Could Allow Remote Code Execution - Windows Server 2003 SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 704305 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms07-043.mspx Fixlet Description: Microsoft has released a patch that resolves a privately reported vulnerability in OLE Automation. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could execute code remotely. After downloading and installing this patch, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this patch. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-043: CORRUPT PATCH - Windows Server 2003 SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 704306 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms07-043.mspx *************************************************************** Title: MS07-043: Vulnerability in OLE Automation Could Allow Remote Code Execution - Visual Basic 6.0 SP6 (Japanese) Severity: Critical Fixlet ID: 704307 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms07-043.mspx Fixlet Description: Microsoft has released a patch that resolves a privately reported vulnerability in OLE Automation. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could execute code remotely. After downloading and installing this patch, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this patch. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-044: Vulnerability in Microsoft Excel Could Allow Remote Code Execution - Excel 2002 (Network/Local Install) (Japanese) Severity: Important Fixlet ID: 704411 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-044.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security patch for Excel 2002. This security update resolves a privately reported vulnerability in addition to other security issues identified during the course of the investigation. These vulnerabilities could allow remote code execution if a user opens a specially crafted Excel file. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS07-044: Vulnerability in Microsoft Excel Could Allow Remote Code Execution - Excel 2002 - Windows NT/2000/XP/2003 (Administrative Install) (Japanese) Severity: Important Fixlet ID: 704412 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-044.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security patch for Excel 2002. This security update resolves a privately reported vulnerability in addition to other security issues identified during the course of the investigation. These vulnerabilities could allow remote code execution if a user opens a specially crafted Excel file. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS07-044: Vulnerability in Microsoft Excel Could Allow Remote Code Execution - Excel 2003 (Local Install) (Japanese) Severity: Important Fixlet ID: 704421 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-044.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security patch for Excel 2003. This security update resolves a privately reported vulnerability in addition to other security issues identified during the course of the investigation. These vulnerabilities could allow remote code execution if a user opens a specially crafted Excel file. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS07-044: Vulnerability in Microsoft Excel Could Allow Remote Code Execution - Excel 2003 (Network Install) (Japanese) Severity: Important Fixlet ID: 704422 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-044.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security patch for Excel 2003. This security update resolves a privately reported vulnerability in addition to other security issues identified during the course of the investigation. These vulnerabilities could allow remote code execution if a user opens a specially crafted Excel file. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS07-044: Vulnerability in Microsoft Excel Could Allow Remote Code Execution - Excel Viewer 2003 (Japanese) Severity: Important Fixlet ID: 704423 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-044.mspx Fixlet Description: Microsoft has released a security patch for Excel Viewer 2003. This security update resolves a privately reported vulnerability in addition to other security issues identified during the course of the investigation. These vulnerabilities could allow remote code execution if a user opens a specially crafted Excel file. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS07-044: Vulnerability in Microsoft Excel Could Allow Remote Code Execution - Excel 2003 (Administrative Install) (Japanese) Severity: Important Fixlet ID: 704424 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-044.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security patch for Excel 2003. This security update resolves a privately reported vulnerability in addition to other security issues identified during the course of the investigation. These vulnerabilities could allow remote code execution if a user opens a specially crafted Excel file. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS07-045: Cumulative Security Update for Internet Explorer - IE 5.01 SP4 - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 704501 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-045.mspx Fixlet Description: Microsoft has released a patch that resolves three privately reported vulnerabilities. These vulnerabilities could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are several known issues associated with the installation of this patch. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-045: CORRUPT PATCH - IE 5.01 SP4 - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 704502 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-045.mspx *************************************************************** Title: MS07-045: Cumulative Security Update for Internet Explorer - IE 6 SP1 - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 704503 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-045.mspx Fixlet Description: Microsoft has released a patch that resolves three privately reported vulnerabilities. These vulnerabilities could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are several known issues associated with the installation of this patch. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-045: CORRUPT PATCH - IE 6 SP1 - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 704504 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-045.mspx *************************************************************** Title: MS07-045: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2 (Japanese) Severity: Critical Fixlet ID: 704505 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-045.mspx Fixlet Description: Microsoft has released a patch that resolves three privately reported vulnerabilities. These vulnerabilities could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are several known issues associated with the installation of this patch. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-045: CORRUPT PATCH - IE 6 - Windows XP SP2 (Japanese) Severity: Critical Fixlet ID: 704506 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-045.mspx *************************************************************** Title: MS07-045: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 704507 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-045.mspx Fixlet Description: Microsoft has released a patch that resolves three privately reported vulnerabilities. These vulnerabilities could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are several known issues associated with the installation of this patch. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-045: CORRUPT PATCH - IE 6 - Windows Server 2003 SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 704508 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-045.mspx *************************************************************** Title: MS07-045: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2 (Japanese) Severity: Important Fixlet ID: 704509 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms07-045.mspx Fixlet Description: Microsoft has released a patch that resolves three privately reported vulnerabilities. These vulnerabilities could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are several known issues associated with the installation of this patch. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-045: CORRUPT PATCH - IE 7 - Windows XP SP2 (Japanese) Severity: Important Fixlet ID: 704510 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms07-045.mspx *************************************************************** Title: MS07-045: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 704511 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-045.mspx Fixlet Description: Microsoft has released a patch that resolves three privately reported vulnerabilities. These vulnerabilities could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are several known issues associated with the installation of this patch. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-045: CORRUPT PATCH - IE 7 - Windows Server 2003 SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 704512 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-045.mspx *************************************************************** Title: MS07-045: Cumulative Security Update for Internet Explorer - IE 7 - Windows Vista (Japanese) Severity: Important Fixlet ID: 704513 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-045.mspx Fixlet Description: Microsoft has released a patch that resolves three privately reported vulnerabilities and one publicly disclosed vulnerability. These vulnerabilities could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are several known issues associated with the installation of this patch. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-046: Vulnerability in GDI Could Allow Remote Code Execution - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 704601 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-046.mspx Fixlet Description: Microsoft has released an update that resolves a privately reported vulnerability in the Graphics Rendering Engine and the way that it handles specially crafted images that could allow remote code execution. An attacker could exploit the vulnerability by constructing a specially crafted image that could potentially allow remote code execution if a user opened a specially crafted attachment in e-mail. An attacker who successfully exploited this vulnerability could take complete control of an affected system. After downloading and installing this patch, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS07-046: CORRUPT PATCH - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 704602 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-046.mspx *************************************************************** Title: MS07-046: Vulnerability in GDI Could Allow Remote Code Execution - Windows XP SP2 (Japanese) Severity: Critical Fixlet ID: 704603 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-046.mspx Fixlet Description: Microsoft has released an update that resolves a privately reported vulnerability in the Graphics Rendering Engine and the way that it handles specially crafted images that could allow remote code execution. An attacker could exploit the vulnerability by constructing a specially crafted image that could potentially allow remote code execution if a user opened a specially crafted attachment in e-mail. An attacker who successfully exploited this vulnerability could take complete control of an affected system. After downloading and installing this patch, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS07-046: CORRUPT PATCH - Windows XP SP2 (Japanese) Severity: Critical Fixlet ID: 704604 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-046.mspx *************************************************************** Title: MS07-046: Vulnerability in GDI Could Allow Remote Code Execution - Windows Server 2003 SP1 (Japanese) Severity: Critical Fixlet ID: 704605 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-046.mspx Fixlet Description: Microsoft has released an update that resolves a privately reported vulnerability in the Graphics Rendering Engine and the way that it handles specially crafted images that could allow remote code execution. An attacker could exploit the vulnerability by constructing a specially crafted image that could potentially allow remote code execution if a user opened a specially crafted attachment in e-mail. An attacker who successfully exploited this vulnerability could take complete control of an affected system. After downloading and installing this patch, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS07-046: CORRUPT PATCH - Windows Server 2003 SP1 (Japanese) Severity: Critical Fixlet ID: 704606 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-046.mspx *************************************************************** Title: MS07-047: Vulnerabilities in Windows Media Player Could Allow Remote Code Execution - Windows Media Player 9 - Windows 2000/XP (Japanese) Severity: Important Fixlet ID: 704701 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms07-047.mspx Fixlet Description: Microsoft has released a patch eliminating security vulnerabilities in Windows Media Player. If a user is logged on with administrative user rights, an attacker who successfully exploited these vulnerabilities could take complete control of an affected system. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this patch. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-047: CORRUPT PATCH - Windows Media Player 9 - Windows 2000/XP (Japanese) Severity: Important Fixlet ID: 704702 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms07-047.mspx *************************************************************** Title: MS07-047: Vulnerabilities in Windows Media Player Could Allow Remote Code Execution - Windows Media Player 7.1 - Windows 2000 SP4 (Japanese) Severity: Important Fixlet ID: 704703 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms07-047.mspx Fixlet Description: Microsoft has released a patch eliminating security vulnerabilities in Windows Media Player. If a user is logged on with administrative user rights, an attacker who successfully exploited these vulnerabilities could take complete control of an affected system. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this patch. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-047: CORRUPT PATCH - Windows Media Player 7.1 - Windows 2000 SP4 (Japanese) Severity: Important Fixlet ID: 704704 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms07-047.mspx *************************************************************** Title: MS07-047: Vulnerabilities in Windows Media Player Could Allow Remote Code Execution - Windows Media Player 10 - Windows XP SP2 (Japanese) Severity: Important Fixlet ID: 704705 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms07-047.mspx Fixlet Description: Microsoft has released a patch eliminating security vulnerabilities in Windows Media Player. If a user is logged on with administrative user rights, an attacker who successfully exploited these vulnerabilities could take complete control of an affected system. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this patch. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-047: CORRUPT PATCH - Windows Media Player 10 - Windows XP SP2 (Japanese) Severity: Important Fixlet ID: 704706 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms07-047.mspx *************************************************************** Title: MS07-047: Vulnerabilities in Windows Media Player Could Allow Remote Code Execution - Windows Media Player 10 - Windows Server 2003 SP1/SP2 (Japanese) Severity: Important Fixlet ID: 704707 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms07-047.mspx Fixlet Description: Microsoft has released a patch eliminating security vulnerabilities in Windows Media Player. If a user is logged on with administrative user rights, an attacker who successfully exploited these vulnerabilities could take complete control of an affected system. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this patch. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-047: CORRUPT PATCH - Windows Media Player 10 - Windows Server 2003 SP1/SP2 (Japanese) Severity: Important Fixlet ID: 704708 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms07-047.mspx *************************************************************** Title: MS07-047: Vulnerabilities in Windows Media Player Could Allow Remote Code Execution - Windows Media Player 11 - Windows XP SP2 (Japanese) Severity: Important Fixlet ID: 704709 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms07-047.mspx Fixlet Description: Microsoft has released a patch eliminating security vulnerabilities in Windows Media Player. If a user is logged on with administrative user rights, an attacker who successfully exploited these vulnerabilities could take complete control of an affected system. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this patch. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-047: CORRUPT PATCH - Windows Media Player 11 - Windows XP SP2 (Japanese) Severity: Important Fixlet ID: 704710 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms07-047.mspx *************************************************************** Title: MS07-047: Vulnerabilities in Windows Media Player Could Allow Remote Code Execution - Windows Media Player 11 - Windows Vista (Japanese) Severity: Important Fixlet ID: 704711 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms07-047.mspx Fixlet Description: Microsoft has released a patch eliminating security vulnerabilities in Windows Media Player. If a user is logged on with administrative user rights, an attacker who successfully exploited these vulnerabilities could take complete control of an affected system. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this patch. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-048: Vulnerabilities in Windows Gadgets Could Allow Remote Code Execution - Windows Vista (Japanese) Severity: Important Fixlet ID: 704801 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-048.mspx Fixlet Description: Microsoft has released a patch that resolves two privately reported vulnerabilities in addition to other vulnerabilities identified during the course of the investigation. These vulnerabilities could allow an anonymous remote attacker to run code with the privileges of the logged on user. If a user subscribed to a malicious RSS feed in the Feed Headlines Gadget or added a malicious contacts file in the Contacts Gadget or a user clicked on a malicious link in the Weather Gadget an attacker could potentially run code on the system. In all attack vectors, users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are several known issues associated with the installation of this patch. See the Caveats section of the security bulletin for more information. *************************************************************** Title: MS07-049: Vulnerability in Virtual PC and Virtual Server Could Allow Elevation of Privilege - Virtual PC 2004 SP1 (Japanese) Severity: Important Fixlet ID: 704903 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms07-049.mspx Fixlet Description: Microsoft has released an important security update that resolves one privately reported elevation of privilege vulnerability. The vulnerability in Microsoft Virtual PC and Microsoft Virtual Server could allow a guest operating system user to run code on the host or another guest operating system. Only guest operating system users who are granted administrative permissions would be able to exploit this vulnerability. After downloading and installing this patch, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this patch. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-049: CORRUPT PATCH - Virtual PC 2004 SP1 (Japanese) Severity: Important Fixlet ID: 704904 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms07-049.mspx *************************************************************** Title: MS07-049: Vulnerability in Virtual PC and Virtual Server Could Allow Elevation of Privilege - Virtual Server 2005 Standard Edition (Japanese) Severity: Important Fixlet ID: 704905 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-049.mspx Fixlet Description: Microsoft has released an important security update that resolves one privately reported elevation of privilege vulnerability. The vulnerability in Microsoft Virtual PC and Microsoft Virtual Server could allow a guest operating system user to run code on the host or another guest operating system. Only guest operating system users who are granted administrative permissions would be able to exploit this vulnerability. After downloading and installing this patch, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this patch. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-049: Vulnerability in Virtual PC and Virtual Server Could Allow Elevation of Privilege - Virtual Server 2005 Enterprise Edition (Japanese) Severity: Important Fixlet ID: 704907 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms07-049.mspx Fixlet Description: Microsoft has released an important security update that resolves one privately reported elevation of privilege vulnerability. The vulnerability in Microsoft Virtual PC and Microsoft Virtual Server could allow a guest operating system user to run code on the host or another guest operating system. Only guest operating system users who are granted administrative permissions would be able to exploit this vulnerability. After downloading and installing this patch, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this patch. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-049: Vulnerability in Virtual PC and Virtual Server Could Allow Elevation of Privilege - Virtual Server 2005 Standard Edition R2 (Japanese) Severity: Important Fixlet ID: 704909 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-049.mspx Fixlet Description: Microsoft has released an important security update that resolves one privately reported elevation of privilege vulnerability. The vulnerability in Microsoft Virtual PC and Microsoft Virtual Server could allow a guest operating system user to run code on the host or another guest operating system. Only guest operating system users who are granted administrative permissions would be able to exploit this vulnerability. After downloading and installing this patch, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this patch. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-049: Vulnerability in Virtual PC and Virtual Server Could Allow Elevation of Privilege - Virtual Server 2005 Enterprise Edition R2 (Japanese) Severity: Important Fixlet ID: 704911 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms07-049.mspx Fixlet Description: Microsoft has released an important security update that resolves one privately reported elevation of privilege vulnerability. The vulnerability in Microsoft Virtual PC and Microsoft Virtual Server could allow a guest operating system user to run code on the host or another guest operating system. Only guest operating system users who are granted administrative permissions would be able to exploit this vulnerability. After downloading and installing this patch, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this patch. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-050: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 5.01 SP4 - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 705001 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-050.mspx Fixlet Description: This security update resolves a privately reported vulnerability in the Vector Markup Language (VML) implementation in Windows. The vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The security update addresses the vulnerability by strengthening the validation of requests to render VML within Internet Explorer. After downloading and installing this patch, affected computers will no longer be susceptible to this vulnerability. Important Note: There are several known issues associated with the installation of this patch. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-050: CORRUPT PATCH - IE 5.01 SP4 - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 705002 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-050.mspx *************************************************************** Title: MS07-050: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 6 SP1 - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 705003 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-050.mspx Fixlet Description: This security update resolves a privately reported vulnerability in the Vector Markup Language (VML) implementation in Windows. The vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The security update addresses the vulnerability by strengthening the validation of requests to render VML within Internet Explorer. After downloading and installing this patch, affected computers will no longer be susceptible to this vulnerability. Important Note: There are several known issues associated with the installation of this patch. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-050: CORRUPT PATCH - IE 6 SP1 - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 705004 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-050.mspx *************************************************************** Title: MS07-050: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 6 - Windows XP SP2 (Japanese) Severity: Critical Fixlet ID: 705005 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms07-050.mspx Fixlet Description: This security update resolves a privately reported vulnerability in the Vector Markup Language (VML) implementation in Windows. The vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The security update addresses the vulnerability by strengthening the validation of requests to render VML within Internet Explorer. After downloading and installing this patch, affected computers will no longer be susceptible to this vulnerability. Important Note: There are several known issues associated with the installation of this patch. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-050: CORRUPT PATCH - IE 6 - Windows XP SP2 (Japanese) Severity: Critical Fixlet ID: 705006 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms07-050.mspx *************************************************************** Title: MS07-050: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 6 - Windows Server 2003 SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 705007 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms07-050.mspx Fixlet Description: This security update resolves a privately reported vulnerability in the Vector Markup Language (VML) implementation in Windows. The vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The security update addresses the vulnerability by strengthening the validation of requests to render VML within Internet Explorer. After downloading and installing this patch, affected computers will no longer be susceptible to this vulnerability. Important Note: There are several known issues associated with the installation of this patch. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-050: CORRUPT PATCH - IE 6 - Windows Server 2003 SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 705008 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms07-050.mspx *************************************************************** Title: MS07-050: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 7 - Windows XP SP2 (Japanese) Severity: Critical Fixlet ID: 705009 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-050.mspx Fixlet Description: This security update resolves a privately reported vulnerability in the Vector Markup Language (VML) implementation in Windows. The vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The security update addresses the vulnerability by strengthening the validation of requests to render VML within Internet Explorer. After downloading and installing this patch, affected computers will no longer be susceptible to this vulnerability. Important Note: There are several known issues associated with the installation of this patch. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-050: CORRUPT PATCH - IE 7 - Windows XP SP2 (Japanese) Severity: Critical Fixlet ID: 705010 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-050.mspx *************************************************************** Title: MS07-050: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 7 - Windows Server 2003 SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 705011 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-050.mspx Fixlet Description: This security update resolves a privately reported vulnerability in the Vector Markup Language (VML) implementation in Windows. The vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The security update addresses the vulnerability by strengthening the validation of requests to render VML within Internet Explorer. After downloading and installing this patch, affected computers will no longer be susceptible to this vulnerability. Important Note: There are several known issues associated with the installation of this patch. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-050: CORRUPT PATCH - IE 7 - Windows Server 2003 SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 705012 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-050.mspx *************************************************************** Title: MS07-050: Vulnerability in Vector Markup Language Could Allow Remote Code Execution - IE 7 - Windows Vista (Japanese) Severity: Critical Fixlet ID: 705013 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-050.mspx Fixlet Description: This security update resolves a privately reported vulnerability in the Vector Markup Language (VML) implementation in Windows. The vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The security update addresses the vulnerability by strengthening the validation of requests to render VML within Internet Explorer. After downloading and installing this patch, affected computers will no longer be susceptible to this vulnerability. Important Note: There are several known issues associated with the installation of this patch. See the Known Issues section of the security bulletin for more information.