Fixlet Site - PatchesforWindows(Japanese) Current Version: 226 Published: Thu, 15 May 2008 22:43:58 GMT New Fixlets: ============ *************************************************************** Title: UPDATE: Windows Vista Service Pack 1 Available (Japanese) Severity: Critical Fixlet ID: 44601 Fixlet Link: http://technet2.microsoft.com/WindowsVista/en/library/5cf710a1-1414-4d11-97de-0748abdcec651033.mspx Fixlet Description: Microsoft has released a service pack for Windows Vista. Windows Vista Service Pack 1 provides enhanced security, increased reliability, and improved performance. Microsoft recommends that all Windows Vista users download and install this service pack. Important Note: The Service Pack Installer will restart the computer up to 3 times after the first restart, during which time the deployed action may report back as failed, and this Fixlet message will become relevant again. However, once the Service Pack has fully installed, the action will report back as fixed. Please check " & (link "Fixlet Message #44605" of fixlet 44605 of (bes site whose (name of it = "Patches for Windows (Japanese)")) as string) & " before redeploying."');}catch (e){fixletLink.innerHTML = ' ';}} Important Note: This service pack includes several changes that may impair functionality of existing applications. BigFix strongly recommends that you fully test the deployment of this update prior to rolling out the update in your production environment. *************************************************************** Title: UPDATE: Windows Vista Service Pack 1 Available (x64) (Japanese) Severity: Critical Fixlet ID: 44602 Fixlet Link: http://technet2.microsoft.com/WindowsVista/en/library/5cf710a1-1414-4d11-97de-0748abdcec651033.mspx Fixlet Description: Microsoft has released a service pack for Windows Vista. Windows Vista Service Pack 1 provides enhanced security, increased reliability, and improved performance. Microsoft recommends that all Windows Vista users download and install this service pack. Important Note: The Service Pack Installer will restart the computer up to 3 times after the first restart, during which time the deployed action may report back as failed, and this Fixlet message will become relevant again. However, once the Service Pack has fully installed, the action will report back as fixed. Please check " & (link "Fixlet Message #44606" of fixlet 44606 of (bes site whose (name of it = "Patches for Windows (Japanese)")) as string) & " before redeploying."');}catch (e){fixletLink.innerHTML = ' ';}} Important Note: This service pack includes several changes that may impair functionality of existing applications. BigFix strongly recommends that you fully test the deployment of this update prior to rolling out the update in your production environment. *************************************************************** Title: UPDATE: Windows Vista Service Pack 1 Available - Known Issues (Japanese) Severity: Fixlet ID: 44603 Fixlet Link: http://technet2.microsoft.com/WindowsVista/en/library/5cf710a1-1414-4d11-97de-0748abdcec651033.mspx Fixlet Description: Microsoft has released a service pack for Windows Vista. Windows Vista Service Pack 1 provides enhanced security, increased reliability, and improved performance. Microsoft recommends that all Windows Vista users download and install this service pack. The listed computers have less than 2.5 GB of free hard drive space. Microsoft recommends having at least 2.5 GB of available space before attempting the installation of Service Pack 1. Please see the deployment guide for Windows Vista Service Pack 1 linked below for more information. document.body.onload = SetEnterpriseSecurityCLSFixletLink; function SetEnterpriseSecurityCLSFixletLink(){try {fixletLink.innerHTML = EvaluateRelevance('" Important Note: This service pack includes several changes that may impair functionality of existing applications. BigFix strongly recommends that you fully test the deployment of this update prior to rolling out the update in your production environment. *************************************************************** Title: UPDATE: Windows Vista Service Pack 1 Available (x64) - Known Issues (Japanese) Severity: Fixlet ID: 44604 Fixlet Link: http://technet2.microsoft.com/WindowsVista/en/library/5cf710a1-1414-4d11-97de-0748abdcec651033.mspx Fixlet Description: Microsoft has released a service pack for Windows Vista. Windows Vista Service Pack 1 provides enhanced security, increased reliability, and improved performance. Microsoft recommends that all Windows Vista users download and install this service pack. The listed computers have less than 4.1 GB of free hard drive space. Microsoft recommends having at least 4.1 GB of available space before attempting the installation of Service Pack 1. Please see the deployment guide for Windows Vista Service Pack 1 linked below for more information. document.body.onload = SetEnterpriseSecurityCLSFixletLink; function SetEnterpriseSecurityCLSFixletLink(){try {fixletLink.innerHTML = EvaluateRelevance('" Important Note: This service pack includes several changes that may impair functionality of existing applications. BigFix strongly recommends that you fully test the deployment of this update prior to rolling out the update in your production environment. *************************************************************** Title: UPDATE: Windows Vista Service Pack 1 Available - Installation Not Complete (Japanese) Severity: Fixlet ID: 44605 Fixlet Link: http://technet2.microsoft.com/WindowsVista/en/library/5cf710a1-1414-4d11-97de-0748abdcec651033.mspx Fixlet Description: Microsoft has released a service pack for Windows Vista. Windows Vista Service Pack 1 provides enhanced security, increased reliability, and improved performance. Microsoft recommends that all Windows Vista users download and install this service pack. document.body.onload = SetEnterpriseSecurityCLSFixletLink;function SetEnterpriseSecurityCLSFixletLink(){try {fixletLink.innerHTML = EvaluateRelevance('" The listed computers have not yet completed the Vista Service Pack 1 Installation. Although actions deployed through " & (link "Fixlet Message #44601" of fixlet 44601 of (bes site whose (name of it = "Patches for Windows (Japanese)")) as string) & " may have reported back as failed, please wait for this fixlet to become non-relevant, at which point the Service Pack installation will have completed."');}catch (e){fixletLink.innerHTML = ' The listed computers have not yet completed the Vista Service Pack 1 Installation. Although actions deployed through Fixlet message #44601 may have reported back as failed, please wait for this fixlet to become non-relevant, at which point the Service Pack installation will have completed.';}} This service pack includes several changes that may impair functionality of existing applications. BigFix strongly recommends that you fully test the deployment of this update prior to rolling out the update in your production environment. *************************************************************** Title: UPDATE: Windows Vista Service Pack 1 Available (x64) - Installation Not Complete (Japanese) Severity: Fixlet ID: 44606 Fixlet Link: http://technet2.microsoft.com/WindowsVista/en/library/5cf710a1-1414-4d11-97de-0748abdcec651033.mspx Fixlet Description: Microsoft has released a service pack for Windows Vista. Windows Vista Service Pack 1 provides enhanced security, increased reliability, and improved performance. Microsoft recommends that all Windows Vista users download and install this service pack. document.body.onload = SetEnterpriseSecurityCLSFixletLink;function SetEnterpriseSecurityCLSFixletLink(){try {fixletLink.innerHTML = EvaluateRelevance('" The listed computers have not yet completed the Vista Service Pack 1 Installation. Although actions deployed through " & (link "Fixlet Message #44602" of fixlet 44602 of (bes site whose (name of it = "Patches for Windows (Japanese)")) as string) & " may have reported back as failed, please wait for this fixlet to become non-relevant, at which point the Service Pack installation will have completed."');}catch (e){fixletLink.innerHTML = ' The listed computers have not yet completed the Vista Service Pack 1 Installation. Although actions deployed through Fixlet message #44602 may have reported back as failed, please wait for this fixlet to become non-relevant, at which point the Service Pack installation will have completed.';}} Important Note: This service pack includes several changes that may impair functionality of existing applications. BigFix strongly recommends that you fully test the deployment of this update prior to rolling out the update in your production environment. *************************************************************** Title: MS08-026: Vulnerabilities in Microsoft Word Could Allow Remote Code Execution - Office XP SP3 (Local/Network Install) (Japanese) Severity: Important Fixlet ID: 802606 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-026.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Word that could allow remote code execution if a user opens a specially crafted Word file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-026: Vulnerabilities in Microsoft Word Could Allow Remote Code Execution - Office XP SP3 - Windows NT/2000/XP/2003 (Administrative Install) (Japanese) Severity: Important Fixlet ID: 802610 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-026.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Word that could allow remote code execution if a user opens a specially crafted Word file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-026: Vulnerabilities in Microsoft Word Could Allow Remote Code Execution - Office 2003 SP2/SP3 (Local/Network Install) (Japanese) Severity: Important Fixlet ID: 802611 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-026.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Word that could allow remote code execution if a user opens a specially crafted Word file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-026: Vulnerabilities in Microsoft Word Could Allow Remote Code Execution - Office 2003 SP2/SP3 (Administrative Install) (Japanese) Severity: Important Fixlet ID: 802613 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-026.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Word that could allow remote code execution if a user opens a specially crafted Word file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-026: Vulnerabilities in Microsoft Word Could Allow Remote Code Execution - Office 2007 (Japanese) Severity: Important Fixlet ID: 802616 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-026.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Word that could allow remote code execution if a user opens a specially crafted Word file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-026: Vulnerabilities in Microsoft Word Could Allow Remote Code Execution - Office Word Viewer 2003 (Japanese) Severity: Important Fixlet ID: 802626 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-026.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Word that could allow remote code execution if a user opens a specially crafted Word file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-026: Vulnerabilities in Microsoft Word Could Allow Remote Code Execution - Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats (Japanese) Severity: Important Fixlet ID: 802636 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-026.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Word that could allow remote code execution if a user opens a specially crafted Word file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-027: Vulnerability in Microsoft Publisher Could Allow Remote Code Execution - Office XP SP3 (Local/Network Install) (Japanese) Severity: Important Fixlet ID: 802706 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-027.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Publisher that could allow remote code execution if a user opens a specially crafted Publisher file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-027: Vulnerability in Microsoft Publisher Could Allow Remote Code Execution - Office XP SP3 - Windows NT/2000/XP/2003 (Administrative Install) (Japanese) Severity: Important Fixlet ID: 802710 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-027.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Publisher that could allow remote code execution if a user opens a specially crafted Publisher file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-027: Vulnerability in Microsoft Publisher Could Allow Remote Code Execution - Office 2003 SP2/SP3 (Local/Network Install) (Japanese) Severity: Important Fixlet ID: 802711 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-027.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Publisher that could allow remote code execution if a user opens a specially crafted Publisher file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-027: Vulnerability in Microsoft Publisher Could Allow Remote Code Execution - Office 2003 SP2/SP3 (Administrative Install) (Japanese) Severity: Important Fixlet ID: 802713 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-027.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Publisher that could allow remote code execution if a user opens a specially crafted Publisher file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-027: Vulnerability in Microsoft Publisher Could Allow Remote Code Execution - Office 2007 (Japanese) Severity: Important Fixlet ID: 802721 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-027.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Publisher that could allow remote code execution if a user opens a specially crafted Publisher file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-028: Vulnerability in Microsoft Jet Database Engine Could Allow Remote Code Execution - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 802801 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-028.mspx Fixlet Description: Microsoft has released a security update that resolves a security vulnerability in the Microsoft Jet Database Engine (Jet) in Windows. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-028: CORRUPT PATCH - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 802802 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-028.mspx *************************************************************** Title: MS08-028: Vulnerability in Microsoft Jet Database Engine Could Allow Remote Code Execution - Windows XP SP2 (Japanese) Severity: Critical Fixlet ID: 802803 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-028.mspx Fixlet Description: Microsoft has released a security update that resolves a security vulnerability in the Microsoft Jet Database Engine (Jet) in Windows. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-028: CORRUPT PATCH - Windows XP SP2 (Japanese) Severity: Critical Fixlet ID: 802804 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-028.mspx *************************************************************** Title: MS08-028: Vulnerability in Microsoft Jet Database Engine Could Allow Remote Code Execution - Windows XP (x64) (Japanese) Severity: Critical Fixlet ID: 802805 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-028.mspx Fixlet Description: Microsoft has released a security update that resolves a security vulnerability in the Microsoft Jet Database Engine (Jet) in Windows. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-028: CORRUPT PATCH - Windows XP (x64) (Japanese) Severity: Critical Fixlet ID: 802806 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-028.mspx *************************************************************** Title: MS08-028: Vulnerability in Microsoft Jet Database Engine Could Allow Remote Code Execution - Windows Server 2003 SP1 (Japanese) Severity: Critical Fixlet ID: 802807 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-028.mspx Fixlet Description: Microsoft has released a security update that resolves a security vulnerability in the Microsoft Jet Database Engine (Jet) in Windows. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-028: CORRUPT PATCH - Windows Server 2003 SP1 (Japanese) Severity: Critical Fixlet ID: 802808 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-028.mspx *************************************************************** Title: MS08-028: Vulnerability in Microsoft Jet Database Engine Could Allow Remote Code Execution - Windows Server 2003 (x64) (Japanese) Severity: Critical Fixlet ID: 802809 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-028.mspx Fixlet Description: Microsoft has released a security update that resolves a security vulnerability in the Microsoft Jet Database Engine (Jet) in Windows. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-028: CORRUPT PATCH - Windows Server 2003 (x64) (Japanese) Severity: Critical Fixlet ID: 802810 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-028.mspx *************************************************************** Title: MS08-029: Vulnerabilities in Microsoft Malware Protection Engine Could Allow Denial of Service - Live OneCare (Japanese) Severity: Moderate Fixlet ID: 802901 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-029.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in the Microsoft Malware Protection Engine. An attacker could exploit either of the vulnerabilities by constructing a specially crafted file that could allow denial of service when received by the target computer system and scanned by the Microsoft Malware Protection Engine. An attacker who successfully exploited either vulnerability could cause the Microsoft Malware Protection Engine to stop responding and automatically restart. *************************************************************** Title: MS08-029: Vulnerabilities in Microsoft Malware Protection Engine Could Allow Denial of Service - Microsoft Antigen for Exchange (Japanese) Severity: Moderate Fixlet ID: 802903 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-029.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in the Microsoft Malware Protection Engine. An attacker could exploit either of the vulnerabilities by constructing a specially crafted file that could allow denial of service when received by the target computer system and scanned by the Microsoft Malware Protection Engine. An attacker who successfully exploited either vulnerability could cause the Microsoft Malware Protection Engine to stop responding and automatically restart. *************************************************************** Title: MS08-029: Vulnerabilities in Microsoft Malware Protection Engine Could Allow Denial of Service - Microsoft Antigen for SMTP Gateway (Japanese) Severity: Moderate Fixlet ID: 802905 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-029.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in the Microsoft Malware Protection Engine. An attacker could exploit either of the vulnerabilities by constructing a specially crafted file that could allow denial of service when received by the target computer system and scanned by the Microsoft Malware Protection Engine. An attacker who successfully exploited either vulnerability could cause the Microsoft Malware Protection Engine to stop responding and automatically restart. *************************************************************** Title: MS08-029: Vulnerabilities in Microsoft Malware Protection Engine Could Allow Denial of Service - Windows Defender (Japanese) Severity: Moderate Fixlet ID: 802907 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-029.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in the Microsoft Malware Protection Engine. An attacker could exploit either of the vulnerabilities by constructing a specially crafted file that could allow denial of service when received by the target computer system and scanned by the Microsoft Malware Protection Engine. An attacker who successfully exploited either vulnerability could cause the Microsoft Malware Protection Engine to stop responding and automatically restart. *************************************************************** Title: MS08-029: Vulnerabilities in Microsoft Malware Protection Engine Could Allow Denial of Service - Forefront Client Security (Japanese) Severity: Moderate Fixlet ID: 802909 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-029.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in the Microsoft Malware Protection Engine. An attacker could exploit either of the vulnerabilities by constructing a specially crafted file that could allow denial of service when received by the target computer system and scanned by the Microsoft Malware Protection Engine. An attacker who successfully exploited either vulnerability could cause the Microsoft Malware Protection Engine to stop responding and automatically restart. *************************************************************** Title: MS08-029: Vulnerabilities in Microsoft Malware Protection Engine Could Allow Denial of Service - Forefront Security for Exchange Server (Japanese) Severity: Moderate Fixlet ID: 802911 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-029.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in the Microsoft Malware Protection Engine. An attacker could exploit either of the vulnerabilities by constructing a specially crafted file that could allow denial of service when received by the target computer system and scanned by the Microsoft Malware Protection Engine. An attacker who successfully exploited either vulnerability could cause the Microsoft Malware Protection Engine to stop responding and automatically restart. *************************************************************** Title: MS08-029: Vulnerabilities in Microsoft Malware Protection Engine Could Allow Denial of Service - Forefront Security for SharePoint (Japanese) Severity: Moderate Fixlet ID: 802913 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-029.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in the Microsoft Malware Protection Engine. An attacker could exploit either of the vulnerabilities by constructing a specially crafted file that could allow denial of service when received by the target computer system and scanned by the Microsoft Malware Protection Engine. An attacker who successfully exploited either vulnerability could cause the Microsoft Malware Protection Engine to stop responding and automatically restart. *************************************************************** Title: MS08-029: Vulnerabilities in Microsoft Malware Protection Engine Could Allow Denial of Service - Standalone System Sweeper in MSDaRT 6.0 (Japanese) Severity: Low Fixlet ID: 802915 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-029.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in the Microsoft Malware Protection Engine. An attacker could exploit either of the vulnerabilities by constructing a specially crafted file that could allow denial of service when received by the target computer system and scanned by the Microsoft Malware Protection Engine. An attacker who successfully exploited either vulnerability could cause the Microsoft Malware Protection Engine to stop responding and automatically restart.