Fixlet Site - PatchesforWindows(Japanese) Current Version: 196 Published: Sat, 13 Oct 2007 01:13:47 GMT *************************************************************** Title: MS07-055: Vulnerability in Kodak Image Viewer Could Allow Remote Code Execution - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 705501 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-055.mspx Fixlet Description: Microsoft has released a critical security update that resolves a privately reported vulnerability. A remote code execution vulnerability exists in the way that the Kodak Image Viewer, formerly known as Wang Image Viewer, handles specially crafted images files. The vulnerability could allow an attacker to remotely execute code on the affected system. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS07-055: CORRUPT PATCH - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 705502 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-055.mspx *************************************************************** Title: MS07-055: Vulnerability in Kodak Image Viewer Could Allow Remote Code Execution - Windows XP SP2 (Japanese) Severity: Critical Fixlet ID: 705503 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-055.mspx Fixlet Description: Microsoft has released a critical security update that resolves a privately reported vulnerability. A remote code execution vulnerability exists in the way that the Kodak Image Viewer, formerly known as Wang Image Viewer, handles specially crafted images files. The vulnerability could allow an attacker to remotely execute code on the affected system. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS07-055: CORRUPT PATCH - Windows XP SP2 (Japanese) Severity: Critical Fixlet ID: 705504 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-055.mspx *************************************************************** Title: MS07-055: Vulnerability in Kodak Image Viewer Could Allow Remote Code Execution - Windows Server 2003 SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 705505 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-055.mspx Fixlet Description: Microsoft has released a critical security update that resolves a privately reported vulnerability. A remote code execution vulnerability exists in the way that the Kodak Image Viewer, formerly known as Wang Image Viewer, handles specially crafted images files. The vulnerability could allow an attacker to remotely execute code on the affected system. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS07-055: CORRUPT PATCH - Windows Server 2003 SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 705506 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-055.mspx *************************************************************** Title: MS07-056: Security Update for Outlook Express and Windows Mail - Outlook Express 5.5 SP2 - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 705601 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-056.mspx Fixlet Description: Microsoft has released a critical security update that resolves one privately reported vulnerability. The vulnerability could allow remote code execution due to an incorrectly handled malformed NNTP response. An attacker could exploit the vulnerability by constructing a specially crafted Web page. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS07-056: CORRUPT PATCH - Outlook Express 5.5 SP2 - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 705602 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-056.mspx *************************************************************** Title: MS07-056: Security Update for Outlook Express and Windows Mail - Outlook Express 6 SP1 - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 705603 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-056.mspx Fixlet Description: Microsoft has released a critical security update that resolves one privately reported vulnerability. The vulnerability could allow remote code execution due to an incorrectly handled malformed NNTP response. An attacker could exploit the vulnerability by constructing a specially crafted Web page. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS07-056: CORRUPT PATCH - Outlook Express 6 SP1 - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 705604 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-056.mspx *************************************************************** Title: MS07-056: Security Update for Outlook Express and Windows Mail - Outlook Express 6 - Windows XP SP2 (Japanese) Severity: Critical Fixlet ID: 705605 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-056.mspx Fixlet Description: Microsoft has released a critical security update that resolves one privately reported vulnerability. The vulnerability could allow remote code execution due to an incorrectly handled malformed NNTP response. An attacker could exploit the vulnerability by constructing a specially crafted Web page. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS07-056: CORRUPT PATCH - Outlook Express 6 - Windows XP SP2 (Japanese) Severity: Critical Fixlet ID: 705606 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-056.mspx *************************************************************** Title: MS07-056: Security Update for Outlook Express and Windows Mail - Outlook Express 6 - Windows Server 2003 SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 705609 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-056.mspx Fixlet Description: Microsoft has released a critical security update that resolves one privately reported vulnerability. The vulnerability could allow remote code execution due to an incorrectly handled malformed NNTP response. An attacker could exploit the vulnerability by constructing a specially crafted Web page. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS07-056: CORRUPT PATCH - Outlook Express 6 - Windows Server 2003 SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 705610 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-056.mspx *************************************************************** Title: MS07-056: Security Update for Outlook Express and Windows Mail - Windows Mail - Windows Vista (Japanese) Severity: Important Fixlet ID: 705613 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-056.mspx Fixlet Description: Microsoft has released a critical security update that resolves one privately reported vulnerability. The vulnerability could allow remote code execution due to an incorrectly handled malformed NNTP response. An attacker could exploit the vulnerability by constructing a specially crafted Web page. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS07-057: Cumulative Security Update for Internet Explorer - IE 5.01 SP4 - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 705701 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-057.mspx Fixlet Description: Microsoft has released a critical security update that resolves three privately reported vulnerabilities and one publicly disclosed vulnerability. The vulnerability with the most serious security impact could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-057: CORRUPT PATCH - IE 5.01 SP4 - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 705702 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-057.mspx *************************************************************** Title: MS07-057: Cumulative Security Update for Internet Explorer - IE 6 SP1 - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 705703 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-057.mspx Fixlet Description: Microsoft has released a critical security update that resolves three privately reported vulnerabilities and one publicly disclosed vulnerability. The vulnerability with the most serious security impact could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-057: CORRUPT PATCH - IE 6 SP1 - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 705704 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-057.mspx *************************************************************** Title: MS07-057: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2 (Japanese) Severity: Critical Fixlet ID: 705705 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-057.mspx Fixlet Description: Microsoft has released a critical security update that resolves three privately reported vulnerabilities and one publicly disclosed vulnerability. The vulnerability with the most serious security impact could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-057: CORRUPT PATCH - IE 6 - Windows XP SP2 (Japanese) Severity: Critical Fixlet ID: 705706 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-057.mspx *************************************************************** Title: MS07-057: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP1/SP2 (Japanese) Severity: Moderate Fixlet ID: 705709 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-057.mspx Fixlet Description: Microsoft has released a critical security update that resolves three privately reported vulnerabilities and one publicly disclosed vulnerability. The vulnerability with the most serious security impact could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-057: CORRUPT PATCH - IE 6 - Windows Server 2003 SP1/SP2 (Japanese) Severity: Moderate Fixlet ID: 705710 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-057.mspx *************************************************************** Title: MS07-057: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2 (Japanese) Severity: Critical Fixlet ID: 705713 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-057.mspx Fixlet Description: Microsoft has released a critical security update that resolves three privately reported vulnerabilities and one publicly disclosed vulnerability. The vulnerability with the most serious security impact could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-057: CORRUPT PATCH - IE 7 - Windows XP SP2 (Japanese) Severity: Critical Fixlet ID: 705714 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-057.mspx *************************************************************** Title: MS07-057: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP1/SP2 (Japanese) Severity: Moderate Fixlet ID: 705717 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-057.mspx Fixlet Description: Microsoft has released a critical security update that resolves three privately reported vulnerabilities and one publicly disclosed vulnerability. The vulnerability with the most serious security impact could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-057: CORRUPT PATCH - IE 7 - Windows Server 2003 SP1/SP2 (Japanese) Severity: Moderate Fixlet ID: 705718 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-057.mspx *************************************************************** Title: MS07-057: Cumulative Security Update for Internet Explorer - IE 7 - Windows Vista (Japanese) Severity: Critical Fixlet ID: 705721 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-057.mspx Fixlet Description: Microsoft has released a critical security update that resolves three privately reported vulnerabilities and one publicly disclosed vulnerability. The vulnerability with the most serious security impact could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-058: Vulnerability in RPC Could Allow Denial of Service - Windows 2000 SP4 (Japanese) Severity: Low Fixlet ID: 705801 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-058.mspx Fixlet Description: Microsoft has released an update that resolves a privately reported vulnerability. A denial of service vulnerability exists in the remote procedure call (RPC) facility due to a failure in communicating with the NTLM security provider when performing authentication of RPC requests. The vulnerability is documented in its own subsection in the Vulnerability Details section of this bulletin. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS07-058: CORRUPT PATCH - Windows 2000 SP4 (Japanese) Severity: Low Fixlet ID: 705802 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-058.mspx *************************************************************** Title: MS07-058: Vulnerability in RPC Could Allow Denial of Service - Windows XP SP2 (Japanese) Severity: Important Fixlet ID: 705803 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-058.mspx Fixlet Description: Microsoft has released an update that resolves a privately reported vulnerability. A denial of service vulnerability exists in the remote procedure call (RPC) facility due to a failure in communicating with the NTLM security provider when performing authentication of RPC requests. The vulnerability is documented in its own subsection in the Vulnerability Details section of this bulletin. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS07-058: CORRUPT PATCH - Windows XP SP2 (Japanese) Severity: Important Fixlet ID: 705804 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-058.mspx *************************************************************** Title: MS07-058: Vulnerability in RPC Could Allow Denial of Service - Windows Server 2003 SP1/SP2 (Japanese) Severity: Important Fixlet ID: 705807 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-058.mspx Fixlet Description: Microsoft has released an update that resolves a privately reported vulnerability. A denial of service vulnerability exists in the remote procedure call (RPC) facility due to a failure in communicating with the NTLM security provider when performing authentication of RPC requests. The vulnerability is documented in its own subsection in the Vulnerability Details section of this bulletin. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS07-058: CORRUPT PATCH - Windows Server 2003 SP1/SP2 (Japanese) Severity: Important Fixlet ID: 705808 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-058.mspx *************************************************************** Title: MS07-058: Vulnerability in RPC Could Allow Denial of Service - Windows Vista (Japanese) Severity: Important Fixlet ID: 705811 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-058.mspx Fixlet Description: Microsoft has released an update that resolves a privately reported vulnerability. A denial of service vulnerability exists in the remote procedure call (RPC) facility due to a failure in communicating with the NTLM security provider when performing authentication of RPC requests. The vulnerability is documented in its own subsection in the Vulnerability Details section of this bulletin. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS07-059: Vulnerability in Windows SharePoint Services 3.0 Could Result in Elevation of Privilege Within the SharePoint Site - Windows Server 2003 SP1/SP2 (Japanese) Severity: Important Fixlet ID: 705901 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-059.mspx Fixlet Description: Microsoft has released a security update that resolves a publicly reported vulnerability in Microsoft Windows SharePoint Services 3.0. The vulnerability could allow an attacker to run arbitrary script that could result in elevation of privilege within the SharePoint site, as opposed to elevation of privilege within the workstation or server environment. The vulnerability could also allow an attacker to run arbitrary script to modify a user's cache, resulting in information disclosure at the workstation After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-059: Vulnerability in Office SharePoint Server 2007 Could Result in Elevation of Privilege Within the SharePoint Site - Windows Server 2003 SP1/SP2 (Japanese) Severity: Important Fixlet ID: 705905 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS07-059.mspx Fixlet Description: Microsoft has released a security update that resolves a publicly reported vulnerability in Microsoft Office SharePoint Server 2007. The vulnerability could allow an attacker to run arbitrary script that could result in elevation of privilege within the SharePoint site, as opposed to elevation of privilege within the workstation or server environment. The vulnerability could also allow an attacker to run arbitrary script to modify a user's cache, resulting in information disclosure at the workstation. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS07-060: Vulnerability in Microsoft Word Could Allow Remote Code Execution - Word 2002 (Network/Local Install) (Japanese) Severity: Important Fixlet ID: 706011 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms07-060.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security patch for Word 2002. A remote code execution vulnerability exists if a user opens a specially crafted Word file with a malformed string. A specially crafted file might be included as an e-mail attachment or hosted on a malicious Web site. This security update addresses the vulnerability by modifying the way that Microsoft Word handles specially crafted Word files. After downloading and installing this patch, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS07-060: Vulnerability in Microsoft Word Could Allow Remote Code Execution - Word 2002 - Windows NT/2000/XP/2003 (Administrative Install) (Japanese) Severity: Important Fixlet ID: 706013 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/ms07-060.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security patch for Word 2002. A remote code execution vulnerability exists if a user opens a specially crafted Word file with a malformed string. A specially crafted file might be included as an e-mail attachment or hosted on a malicious Web site. This security update addresses the vulnerability by modifying the way that Microsoft Word handles specially crafted Word files. After downloading and installing this patch, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: 842773: BITS 2.0 and WinHTTP 5.1 - Windows Server 2003 (Japanese) Severity: Fixlet ID: 84277303 Fixlet Link: http://support.microsoft.com/kb/842773 Fixlet Description: Microsoft has released an update package that includes BITS 2.0 and WinHTTP 5.1. This package updates BITS to version 2.0 and updates WinHTTP 5.1. These updates help guarantee an optimal download experience when you use future versions of the Automatic Update service, of Microsoft Windows Update, and of other programs that rely on BITS to transfer files by using idle network bandwidth. These updates for BITS and for WinHTTP 5.1 are required components for the new releases of Windows Update and of Automatic Update. BITS 2.0 improves transfer speeds, improves resiliency, and reduces network bandwidth consumption when it transfers files. The new features of BITS 2.0 work with the user identity and isolation optimizations that are included in the WinHTTP 5.1 update to help improve the security and flexibility of data transfers that use BITS. Important Note: There are known issues associated with the installation of this patch. See the Known Issues section of the Knowledge Base article for more information. *************************************************************** Title: 842773: CORRUPT PATCH - Windows Server 2003 (Japanese) Severity: Fixlet ID: 84277308 Fixlet Link: http://support.microsoft.com/kb/842773 *************************************************************** Title: 842773: BITS 2.0 and WinHTTP 5.1 - Windows 2000 (Japanese) Severity: Fixlet ID: 84277309 Fixlet Link: http://support.microsoft.com/kb/842773 Fixlet Description: Microsoft has released an update package that includes BITS 2.0 and WinHTTP 5.1. This package updates BITS to version 2.0 and updates WinHTTP 5.1. These updates help guarantee an optimal download experience when you use future versions of the Automatic Update service, of Microsoft Windows Update, and of other programs that rely on BITS to transfer files by using idle network bandwidth. These updates for BITS and for WinHTTP 5.1 are required components for the new releases of Windows Update and of Automatic Update. BITS 2.0 improves transfer speeds, improves resiliency, and reduces network bandwidth consumption when it transfers files. The new features of BITS 2.0 work with the user identity and isolation optimizations that are included in the WinHTTP 5.1 update to help improve the security and flexibility of data transfers that use BITS. Important Note: There are known issues associated with the installation of this patch. See the Known Issues section of the Knowledge Base article for more information. *************************************************************** Title: 842773: CORRUPT PATCH - Windows 2000 (Japanese) Severity: Fixlet ID: 84277310 Fixlet Link: http://support.microsoft.com/kb/842773 *************************************************************** Title: 842773: BITS 2.0 and WinHTTP 5.1 - Windows XP (Japanese) Severity: Fixlet ID: 84277311 Fixlet Link: http://support.microsoft.com/kb/842773 Fixlet Description: Microsoft has released an update package that includes BITS 2.0 and WinHTTP 5.1. This package updates BITS to version 2.0 and updates WinHTTP 5.1. These updates help guarantee an optimal download experience when you use future versions of the Automatic Update service, of Microsoft Windows Update, and of other programs that rely on BITS to transfer files by using idle network bandwidth. These updates for BITS and for WinHTTP 5.1 are required components for the new releases of Windows Update and of Automatic Update. BITS 2.0 improves transfer speeds, improves resiliency, and reduces network bandwidth consumption when it transfers files. The new features of BITS 2.0 work with the user identity and isolation optimizations that are included in the WinHTTP 5.1 update to help improve the security and flexibility of data transfers that use BITS. Important Note: There are known issues associated with the installation of this patch. See the Known Issues section of the Knowledge Base article for more information. *************************************************************** Title: 842773: CORRUPT PATCH - Windows XP (Japanese) Severity: Fixlet ID: 84277312 Fixlet Link: http://support.microsoft.com/kb/842773 *************************************************************** Title: 927891: Windows Update Agent 3.0 - Windows XP/2003/2000 SP3/SP4 (x86) (Japanese) Severity: Fixlet ID: 92789111 Fixlet Link: http://support.microsoft.com/kb/927891 Fixlet Description: Microsoft has released an update for Windows Update Agent. Affected systems may appear to become unresponsive when Windows Update or Microsoft Update is scanning for updates that use Windows installer, CPU usage for the svchost process shows 100%, and/or an access violation in svchost.exe occurs that stops the Server service and Workstation service. This update is the second part of a two-part fix that is the comprehensive solution to the problem. *************************************************************** Title: 933360: Aug. 2007 Time Zone Update - Windows Vista (Japanese) Severity: Fixlet ID: 93336005 Fixlet Link: http://support.microsoft.com/kb/933360 Fixlet Description: Starting in the spring of 2007, daylight saving time (DST) start and end dates for the United States will transition to comply with the Energy Policy Act of 2005. DST dates in the United States will start three weeks earlier (2:00 A.M. on the second Sunday in March) and will end one week later (2:00 A.M. on the first Sunday in November). This patch will change affected computers' time zone data to account for the 2007 US DST change. This update will also include changes for other related DST changes, time zone behavior, and settings. Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates. See the Microsoft web page on the 2007 DST changes here for more information.