Fixlet Site - PatchesforWindows(Japanese) Current Version: 229 Published: Sat, 14 Jun 2008 02:17:04 GMT New Fixlets: ============ *************************************************************** Title: MS08-030: Vulnerability in Bluetooth Stack Could Allow Remote Code Execution - Windows XP SP2/SP3 (Japanese) Severity: Critical Fixlet ID: 803001 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-030.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Bluetooth stack in Windows that could allow remote code execution. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-030: CORRUPT PATCH - Windows XP SP2/SP3 (Japanese) Severity: Critical Fixlet ID: 803002 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-030.mspx *************************************************************** Title: MS08-030: Vulnerability in Bluetooth Stack Could Allow Remote Code Execution - Windows XP (x64) (Japanese) Severity: Critical Fixlet ID: 803003 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-030.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Bluetooth stack in Windows that could allow remote code execution. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-030: CORRUPT PATCH - Windows XP (x64) (Japanese) Severity: Critical Fixlet ID: 803004 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-030.mspx *************************************************************** Title: MS08-030: Vulnerability in Bluetooth Stack Could Allow Remote Code Execution - Windows Vista Gold/SP1 (Japanese) Severity: Critical Fixlet ID: 803005 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-030.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Bluetooth stack in Windows that could allow remote code execution. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-030: Vulnerability in Bluetooth Stack Could Allow Remote Code Execution - Windows Vista (x64) (Japanese) Severity: Critical Fixlet ID: 803009 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-030.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Bluetooth stack in Windows that could allow remote code execution. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-031: Cumulative Security Update for Internet Explorer - IE 5.01 SP4 - Windows 2000 SP4 (Japanese) Severity: Important Fixlet ID: 803101 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-031.mspx Fixlet Description: Microsoft has released a security update that resolves one privately reported and one publicly disclosed vulnerability. The privately reported vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The publicly disclosed vulnerability could allow information disclosure if a user viewed a specially crafted Web page using Internet Explorer. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-031: CORRUPT PATCH - Windows 2000 SP4 (Japanese) Severity: Important Fixlet ID: 803102 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-031.mspx *************************************************************** Title: MS08-031: Cumulative Security Update for Internet Explorer - IE 6 SP1 - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 803103 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-031.mspx Fixlet Description: Microsoft has released a security update that resolves one privately reported and one publicly disclosed vulnerability. The privately reported vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The publicly disclosed vulnerability could allow information disclosure if a user viewed a specially crafted Web page using Internet Explorer. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-031: CORRUPT PATCH - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 803104 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-031.mspx *************************************************************** Title: MS08-031: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2/SP3 (Japanese) Severity: Critical Fixlet ID: 803105 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-031.mspx Fixlet Description: Microsoft has released a security update that resolves one privately reported and one publicly disclosed vulnerability. The privately reported vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The publicly disclosed vulnerability could allow information disclosure if a user viewed a specially crafted Web page using Internet Explorer. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-031: CORRUPT PATCH - Windows XP SP2/SP3 (Japanese) Severity: Critical Fixlet ID: 803106 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-031.mspx *************************************************************** Title: MS08-031: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP (x64) (Japanese) Severity: Critical Fixlet ID: 803107 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-031.mspx Fixlet Description: Microsoft has released a security update that resolves one privately reported and one publicly disclosed vulnerability. The privately reported vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The publicly disclosed vulnerability could allow information disclosure if a user viewed a specially crafted Web page using Internet Explorer. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-031: CORRUPT PATCH - Windows XP (x64) (Japanese) Severity: Critical Fixlet ID: 803108 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-031.mspx *************************************************************** Title: MS08-031: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP1/SP2 (Japanese) Severity: Moderate Fixlet ID: 803109 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-031.mspx Fixlet Description: Microsoft has released a security update that resolves one privately reported and one publicly disclosed vulnerability. The privately reported vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The publicly disclosed vulnerability could allow information disclosure if a user viewed a specially crafted Web page using Internet Explorer. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-031: CORRUPT PATCH - Windows Server 2003 SP1/SP2 (Japanese) Severity: Moderate Fixlet ID: 803110 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-031.mspx *************************************************************** Title: MS08-031: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 (x64) (Japanese) Severity: Moderate Fixlet ID: 803111 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-031.mspx Fixlet Description: Microsoft has released a security update that resolves one privately reported and one publicly disclosed vulnerability. The privately reported vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The publicly disclosed vulnerability could allow information disclosure if a user viewed a specially crafted Web page using Internet Explorer. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-031: CORRUPT PATCH - Windows Server 2003 (x64) (Japanese) Severity: Moderate Fixlet ID: 803112 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-031.mspx *************************************************************** Title: MS08-031: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2/SP3 (Japanese) Severity: Critical Fixlet ID: 803113 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-031.mspx Fixlet Description: Microsoft has released a security update that resolves one privately reported and one publicly disclosed vulnerability. The privately reported vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The publicly disclosed vulnerability could allow information disclosure if a user viewed a specially crafted Web page using Internet Explorer. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-031: CORRUPT PATCH - Windows XP SP2/SP3 (Japanese) Severity: Critical Fixlet ID: 803114 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-031.mspx *************************************************************** Title: MS08-031: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP (x64) (Japanese) Severity: Critical Fixlet ID: 803115 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-031.mspx Fixlet Description: Microsoft has released a security update that resolves one privately reported and one publicly disclosed vulnerability. The privately reported vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The publicly disclosed vulnerability could allow information disclosure if a user viewed a specially crafted Web page using Internet Explorer. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-031: CORRUPT PATCH - Windows XP (x64) (Japanese) Severity: Critical Fixlet ID: 803116 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-031.mspx *************************************************************** Title: MS08-031: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP1/SP2 (Japanese) Severity: Moderate Fixlet ID: 803117 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-031.mspx Fixlet Description: Microsoft has released a security update that resolves one privately reported and one publicly disclosed vulnerability. The privately reported vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The publicly disclosed vulnerability could allow information disclosure if a user viewed a specially crafted Web page using Internet Explorer. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-031: CORRUPT PATCH - Windows Server 2003 SP1/SP2 (Japanese) Severity: Moderate Fixlet ID: 803118 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-031.mspx *************************************************************** Title: MS08-031: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 (x64) (Japanese) Severity: Moderate Fixlet ID: 803119 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-031.mspx Fixlet Description: Microsoft has released a security update that resolves one privately reported and one publicly disclosed vulnerability. The privately reported vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The publicly disclosed vulnerability could allow information disclosure if a user viewed a specially crafted Web page using Internet Explorer. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-031: CORRUPT PATCH - Windows Server 2003 (x64) (Japanese) Severity: Moderate Fixlet ID: 803120 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-031.mspx *************************************************************** Title: MS08-031: Cumulative Security Update for Internet Explorer - IE 7 - Windows Vista Gold/SP1 (Japanese) Severity: Critical Fixlet ID: 803121 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-031.mspx Fixlet Description: Microsoft has released a security update that resolves one privately reported and one publicly disclosed vulnerability. The privately reported vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The publicly disclosed vulnerability could allow information disclosure if a user viewed a specially crafted Web page using Internet Explorer. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-031: Cumulative Security Update for Internet Explorer - Windows Vista (x64) (Japanese) Severity: Critical Fixlet ID: 803123 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-031.mspx Fixlet Description: Microsoft has released a security update that resolves one privately reported and one publicly disclosed vulnerability. The privately reported vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The publicly disclosed vulnerability could allow information disclosure if a user viewed a specially crafted Web page using Internet Explorer. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-031: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2008 (Japanese) Severity: Moderate Fixlet ID: 803125 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-031.mspx Fixlet Description: Microsoft has released a security update that resolves one privately reported and one publicly disclosed vulnerability. The privately reported vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The publicly disclosed vulnerability could allow information disclosure if a user viewed a specially crafted Web page using Internet Explorer. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-031: Cumulative Security Update for Internet Explorer - Windows Server 2008 (x64) (Japanese) Severity: Moderate Fixlet ID: 803127 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-031.mspx Fixlet Description: Microsoft has released a security update that resolves one privately reported and one publicly disclosed vulnerability. The privately reported vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The publicly disclosed vulnerability could allow information disclosure if a user viewed a specially crafted Web page using Internet Explorer. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-032: Cumulative Security Update of ActiveX Kill Bits - Windows 2000 SP4 (Japanese) Severity: Moderate Fixlet ID: 803201 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-032.mspx Fixlet Description: Microsoft has released a security update that resolves a publicly reported vulnerability for the Microsoft Speech API. The vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer and has the Speech Recognition feature in Windows enabled. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. This update also includes a kill bit for software produced by BackWeb. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-032: CORRUPT PATCH - Windows 2000 SP4 (Japanese) Severity: Moderate Fixlet ID: 803202 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-032.mspx *************************************************************** Title: MS08-032: Cumulative Security Update of ActiveX Kill Bits - Windows XP SP2/SP3 (Japanese) Severity: Moderate Fixlet ID: 803203 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-032.mspx Fixlet Description: Microsoft has released a security update that resolves a publicly reported vulnerability for the Microsoft Speech API. The vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer and has the Speech Recognition feature in Windows enabled. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. This update also includes a kill bit for software produced by BackWeb. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-032: CORRUPT PATCH - Windows XP SP2/SP3 (Japanese) Severity: Moderate Fixlet ID: 803204 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-032.mspx *************************************************************** Title: MS08-032: Cumulative Security Update of ActiveX Kill Bits - Windows XP (x64) (Japanese) Severity: Moderate Fixlet ID: 803205 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-032.mspx Fixlet Description: Microsoft has released a security update that resolves a publicly reported vulnerability for the Microsoft Speech API. The vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer and has the Speech Recognition feature in Windows enabled. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. This update also includes a kill bit for software produced by BackWeb. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-032: CORRUPT PATCH - Windows XP (x64) (Japanese) Severity: Moderate Fixlet ID: 803206 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-032.mspx *************************************************************** Title: MS08-032: Cumulative Security Update of ActiveX Kill Bits - Windows Server 2003 SP1/SP2 (Japanese) Severity: Low Fixlet ID: 803207 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-032.mspx Fixlet Description: Microsoft has released a security update that resolves a publicly reported vulnerability for the Microsoft Speech API. The vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer and has the Speech Recognition feature in Windows enabled. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. This update also includes a kill bit for software produced by BackWeb. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-032: CORRUPT PATCH - Windows Server 2003 SP1/SP2 (Japanese) Severity: Low Fixlet ID: 803208 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-032.mspx *************************************************************** Title: MS08-032: Cumulative Security Update of ActiveX Kill Bits - Windows Server 2003 (x64) (Japanese) Severity: Low Fixlet ID: 803209 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-032.mspx Fixlet Description: Microsoft has released a security update that resolves a publicly reported vulnerability for the Microsoft Speech API. The vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer and has the Speech Recognition feature in Windows enabled. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. This update also includes a kill bit for software produced by BackWeb. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-032: CORRUPT PATCH - Windows Server 2003 (x64) (Japanese) Severity: Low Fixlet ID: 803210 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-032.mspx *************************************************************** Title: MS08-032: Cumulative Security Update of ActiveX Kill Bits - Windows Vista Gold/SP1 (Japanese) Severity: Moderate Fixlet ID: 803211 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-032.mspx Fixlet Description: Microsoft has released a security update that resolves a publicly reported vulnerability for the Microsoft Speech API. The vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer and has the Speech Recognition feature in Windows enabled. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. This update also includes a kill bit for software produced by BackWeb. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-032: Cumulative Security Update of ActiveX Kill Bits - Windows Vista (x64) (Japanese) Severity: Moderate Fixlet ID: 803213 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-032.mspx Fixlet Description: Microsoft has released a security update that resolves a publicly reported vulnerability for the Microsoft Speech API. The vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer and has the Speech Recognition feature in Windows enabled. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. This update also includes a kill bit for software produced by BackWeb. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-032: Cumulative Security Update of ActiveX Kill Bits - Windows Server 2008 (Japanese) Severity: Low Fixlet ID: 803215 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-032.mspx Fixlet Description: Microsoft has released a security update that resolves a publicly reported vulnerability for the Microsoft Speech API. The vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer and has the Speech Recognition feature in Windows enabled. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. This update also includes a kill bit for software produced by BackWeb. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-032: Cumulative Security Update of ActiveX Kill Bits - Windows Server 2008 (x64) (Japanese) Severity: Low Fixlet ID: 803217 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-032.mspx Fixlet Description: Microsoft has released a security update that resolves a publicly reported vulnerability for the Microsoft Speech API. The vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer and has the Speech Recognition feature in Windows enabled. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. This update also includes a kill bit for software produced by BackWeb. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-033: Vulnerabilities in DirectX Could Allow Remote Code Execution - DirectX 7.0 - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 803301 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-033.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft DirectX that could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited either of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-033: CORRUPT PATCH - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 803302 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-033.mspx *************************************************************** Title: MS08-033: Vulnerabilities in DirectX Could Allow Remote Code Execution - DirectX 8.1 - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 803303 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-033.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft DirectX that could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited either of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-033: CORRUPT PATCH - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 803304 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-033.mspx *************************************************************** Title: MS08-033: Vulnerabilities in DirectX Could Allow Remote Code Execution - DirectX 9.0 - Windows XP SP2/SP3 (Japanese) Severity: Critical Fixlet ID: 803307 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-033.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft DirectX that could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited either of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-033: CORRUPT PATCH - Windows XP SP2/SP3 (Japanese) Severity: Critical Fixlet ID: 803308 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-033.mspx *************************************************************** Title: MS08-033: Vulnerabilities in DirectX Could Allow Remote Code Execution - DirectX 9.0 - Windows XP (x64) (Japanese) Severity: Critical Fixlet ID: 803309 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-033.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft DirectX that could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited either of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-033: CORRUPT PATCH - Windows XP Gold/SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 803310 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-033.mspx *************************************************************** Title: MS08-033: Vulnerabilities in DirectX Could Allow Remote Code Execution - DirectX 9.0 - Windows Server 2003 SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 803311 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-033.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft DirectX that could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited either of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-033: CORRUPT PATCH - Windows Server 2003 SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 803312 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-033.mspx *************************************************************** Title: MS08-033: Vulnerabilities in DirectX Could Allow Remote Code Execution - DirectX 9.0 - Windows Server 2003 (x64) (Japanese) Severity: Critical Fixlet ID: 803313 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-033.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft DirectX that could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited either of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-033: CORRUPT PATCH - Windows Server 2003 (x64) (Japanese) Severity: Critical Fixlet ID: 803314 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-033.mspx *************************************************************** Title: MS08-033: Vulnerabilities in DirectX Could Allow Remote Code Execution - DirectX 10.0 - Windows Vista Gold/SP1 (Japanese) Severity: Critical Fixlet ID: 803315 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-033.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft DirectX that could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited either of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-033: Vulnerabilities in DirectX Could Allow Remote Code Execution - DirectX 10.0 - Windows Vista (x64) (Japanese) Severity: Critical Fixlet ID: 803317 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-033.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft DirectX that could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited either of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-033: Vulnerabilities in DirectX Could Allow Remote Code Execution - DirectX 10.0 - Windows Server 2008 (Japanese) Severity: Critical Fixlet ID: 803319 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-033.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft DirectX that could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited either of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-033: Vulnerabilities in DirectX Could Allow Remote Code Execution - DirectX 10.0 - Windows Server 2008 (x64) (Japanese) Severity: Critical Fixlet ID: 803321 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-033.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft DirectX that could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited either of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-033: Vulnerabilities in DirectX Could Allow Remote Code Execution - DirectX 9.0 - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 803323 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-033.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft DirectX that could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited either of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-033: CORRUPT PATCH - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 803324 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-033.mspx *************************************************************** Title: MS08-034: Vulnerability in WINS Could Allow Elevation of Privilege - Windows 2000 Server SP4 (Japanese) Severity: Important Fixlet ID: 803401 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-034.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows Internet Name Service (WINS) that could allow elevation of privilege. A local attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-034: CORRUPT PATCH - Windows 2000 Server SP4 (Japanese) Severity: Important Fixlet ID: 803402 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-034.mspx *************************************************************** Title: MS08-034: Vulnerability in WINS Could Allow Elevation of Privilege - Windows Server 2003 SP1/SP2 (Japanese) Severity: Important Fixlet ID: 803405 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-034.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows Internet Name Service (WINS) that could allow elevation of privilege. A local attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-034: CORRUPT PATCH - Windows Server 2003 SP1/SP2 (Japanese) Severity: Important Fixlet ID: 803406 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-034.mspx *************************************************************** Title: MS08-034: Vulnerability in WINS Could Allow Elevation of Privilege - Windows Server 2003 (x64) (Japanese) Severity: Important Fixlet ID: 803407 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-034.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Windows Internet Name Service (WINS) that could allow elevation of privilege. A local attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-034: CORRUPT PATCH - Windows Server 2003 (x64) (Japanese) Severity: Important Fixlet ID: 803408 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-034.mspx *************************************************************** Title: MS08-035: Vulnerability in Active Directory Could Allow Denial of Service - Active Directory - Windows 2000 SP4 (Japanese) Severity: Important Fixlet ID: 803501 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-035.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in implementations of Active Directory on Microsoft Windows 2000 Server. The vulnerability could be exploited to allow an attacker to cause a denial of service condition. An attacker who successfully exploited this vulnerability could cause the system to stop responding or automatically restart. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-035: CORRUPT PATCH - Windows 2000 SP4 (Japanese) Severity: Important Fixlet ID: 803502 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-035.mspx *************************************************************** Title: MS08-035: Vulnerability in Active Directory Could Allow Denial of Service - ADAM - Windows XP SP2/SP3 (Japanese) Severity: Moderate Fixlet ID: 803503 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-035.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in implementations of Active Directory Application Mode (ADAM) when installed on Windows XP Professional. The vulnerability could be exploited to allow an attacker to cause a denial of service condition. On Windows XP Professional, an attacker must have valid logon credentials to exploit this vulnerability. An attacker who successfully exploited this vulnerability could cause the system to stop responding or automatically restart. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-035: CORRUPT PATCH - Windows XP SP2/SP3 (Japanese) Severity: Moderate Fixlet ID: 803504 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-035.mspx *************************************************************** Title: MS08-035: Vulnerability in Active Directory Could Allow Denial of Service - ADAM - Windows XP (x64) (Japanese) Severity: Moderate Fixlet ID: 803505 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-035.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in implementations of Active Directory Application Mode (ADAM) when installed on Windows XP Professional. The vulnerability could be exploited to allow an attacker to cause a denial of service condition. On Windows XP Professional, an attacker must have valid logon credentials to exploit this vulnerability. An attacker who successfully exploited this vulnerability could cause the system to stop responding or automatically restart. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-035: CORRUPT PATCH - Windows XP (x64) (Japanese) Severity: Moderate Fixlet ID: 803506 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-035.mspx *************************************************************** Title: MS08-035: Vulnerability in Active Directory Could Allow Denial of Service - Active Directory - Windows Server 2003 SP1/SP2 (Japanese) Severity: Moderate Fixlet ID: 803507 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-035.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in implementations of Active Directory on Microsoft Windows Server 2003. The vulnerability could be exploited to allow an attacker to cause a denial of service condition. On Windows Server 2003, an attacker must have valid logon credentials to exploit this vulnerability. An attacker who successfully exploited this vulnerability could cause the system to stop responding or automatically restart. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-035: CORRUPT PATCH - Windows Server 2003 SP1/SP2 (Japanese) Severity: Moderate Fixlet ID: 803508 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-035.mspx *************************************************************** Title: MS08-035: Vulnerability in Active Directory Could Allow Denial of Service - ADAM - Windows Server 2003 SP1/SP2 (Japanese) Severity: Moderate Fixlet ID: 803509 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-035.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in implementations of Active Directory Application Mode (ADAM) when installed on Windows XP Professional. The vulnerability could be exploited to allow an attacker to cause a denial of service condition. On Windows Server 2003, an attacker must have valid logon credentials to exploit this vulnerability. An attacker who successfully exploited this vulnerability could cause the system to stop responding or automatically restart. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-035: CORRUPT PATCH - Windows Server 2003 SP1/SP2 (Japanese) Severity: Moderate Fixlet ID: 803510 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-035.mspx *************************************************************** Title: MS08-035: Vulnerability in Active Directory Could Allow Denial of Service - Active Directory - Windows Server 2003 (x64) (Japanese) Severity: Moderate Fixlet ID: 803511 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-035.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in implementations of Active Directory on Windows Server 2003. The vulnerability could be exploited to allow an attacker to cause a denial of service condition. On Windows Server 2003, an attacker must have valid logon credentials to exploit this vulnerability. An attacker who successfully exploited this vulnerability could cause the system to stop responding or automatically restart. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-035: CORRUPT PATCH - Windows Server 2003 (x64) (Japanese) Severity: Moderate Fixlet ID: 803512 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-035.mspx *************************************************************** Title: MS08-035: Vulnerability in Active Directory Could Allow Denial of Service - ADAM - Windows Server 2003 (x64) (Japanese) Severity: Moderate Fixlet ID: 803513 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-035.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in implementations of Active Directory Application Mode (ADAM) when installed on Windows Server 2003. The vulnerability could be exploited to allow an attacker to cause a denial of service condition. On Windows Server 2003, an attacker must have valid logon credentials to exploit this vulnerability. An attacker who successfully exploited this vulnerability could cause the system to stop responding or automatically restart. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-035: CORRUPT PATCH - Windows Server 2003 (x64) (Japanese) Severity: Moderate Fixlet ID: 803514 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-035.mspx *************************************************************** Title: MS08-035: Vulnerability in Active Directory Could Allow Denial of Service - Active Directory/AD LDS - Windows Server 2008 (Japanese) Severity: Moderate Fixlet ID: 803515 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-035.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in implementations of Active Directory on Microsoft Windows Server 2008 and Active Directory Lightweight Directory Service (AD LDS) when installed on Windows Server 2008. The vulnerability could be exploited to allow an attacker to cause a denial of service condition. On Windows Server 2008, an attacker must have valid logon credentials to exploit this vulnerability. An attacker who successfully exploited this vulnerability could cause the system to stop responding or automatically restart. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-035: Vulnerability in Active Directory Could Allow Denial of Service - Active Directory/AD LDS - Windows Server 2008 (x64) (Japanese) Severity: Moderate Fixlet ID: 803517 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-035.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in implementations of Active Directory on Microsoft Windows Server 2008 and Active Directory Lightweight Directory Service (AD LDS) when installed on Windows Server 2008. The vulnerability could be exploited to allow an attacker to cause a denial of service condition. On Windows Server 2008, an attacker must have valid logon credentials to exploit this vulnerability. An attacker who successfully exploited this vulnerability could cause the system to stop responding or automatically restart. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-036: Vulnerabilities in Pragmatic General Multicast (PGM) Could Allow Denial of Service - Windows XP SP2/SP3 (Japanese) Severity: Important Fixlet ID: 803601 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-036.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in the Pragmatic General Multicast (PGM) protocol that could allow a denial of service if malformed PGM packets are received by an affected system. An attacker who successfully exploited this vulnerability could cause a user’s system to become non-responsive and to require a restart to restore functionality. Note that the denial of service vulnerability would not allow an attacker to execute code or to elevate their user rights, but it could cause the affected system to stop accepting requests. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-036: CORRUPT PATCH - Windows XP SP2/SP3 (Japanese) Severity: Important Fixlet ID: 803602 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-036.mspx *************************************************************** Title: MS08-036: Vulnerabilities in Pragmatic General Multicast (PGM) Could Allow Denial of Service - Windows XP (x64) (Japanese) Severity: Important Fixlet ID: 803603 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-036.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in the Pragmatic General Multicast (PGM) protocol that could allow a denial of service if malformed PGM packets are received by an affected system. An attacker who successfully exploited this vulnerability could cause a user’s system to become non-responsive and to require a restart to restore functionality. Note that the denial of service vulnerability would not allow an attacker to execute code or to elevate their user rights, but it could cause the affected system to stop accepting requests. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-036: CORRUPT PATCH - Windows XP (x64) (Japanese) Severity: Important Fixlet ID: 803604 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-036.mspx *************************************************************** Title: MS08-036: Vulnerabilities in Pragmatic General Multicast (PGM) Could Allow Denial of Service - Windows Server 2003 SP1/SP2 (Japanese) Severity: Important Fixlet ID: 803605 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-036.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in the Pragmatic General Multicast (PGM) protocol that could allow a denial of service if malformed PGM packets are received by an affected system. An attacker who successfully exploited this vulnerability could cause a user’s system to become non-responsive and to require a restart to restore functionality. Note that the denial of service vulnerability would not allow an attacker to execute code or to elevate their user rights, but it could cause the affected system to stop accepting requests. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-036: CORRUPT PATCH - Windows Server 2003 SP1/SP2 (Japanese) Severity: Important Fixlet ID: 803606 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-036.mspx *************************************************************** Title: MS08-036: Vulnerabilities in Pragmatic General Multicast (PGM) Could Allow Denial of Service - Windows Server 2003 (x64) (Japanese) Severity: Important Fixlet ID: 803607 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-036.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in the Pragmatic General Multicast (PGM) protocol that could allow a denial of service if malformed PGM packets are received by an affected system. An attacker who successfully exploited this vulnerability could cause a user’s system to become non-responsive and to require a restart to restore functionality. Note that the denial of service vulnerability would not allow an attacker to execute code or to elevate their user rights, but it could cause the affected system to stop accepting requests. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-036: CORRUPT PATCH - Windows Server 2003 (x64) (Japanese) Severity: Important Fixlet ID: 803608 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-036.mspx *************************************************************** Title: MS08-036: Vulnerabilities in Pragmatic General Multicast (PGM) Could Allow Denial of Service - Windows Vista Gold/SP1 (Japanese) Severity: Moderate Fixlet ID: 803609 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-036.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in the Pragmatic General Multicast (PGM) protocol that could allow a denial of service if malformed PGM packets are received by an affected system. An attacker who successfully exploited this vulnerability could cause a user’s system to become non-responsive and to require a restart to restore functionality. Note that the denial of service vulnerability would not allow an attacker to execute code or to elevate their user rights, but it could cause the affected system to stop accepting requests. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-036: Vulnerabilities in Pragmatic General Multicast (PGM) Could Allow Denial of Service - Windows Vista (x64) (Japanese) Severity: Moderate Fixlet ID: 803611 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-036.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in the Pragmatic General Multicast (PGM) protocol that could allow a denial of service if malformed PGM packets are received by an affected system. An attacker who successfully exploited this vulnerability could cause a user’s system to become non-responsive and to require a restart to restore functionality. Note that the denial of service vulnerability would not allow an attacker to execute code or to elevate their user rights, but it could cause the affected system to stop accepting requests. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-036: Vulnerabilities in Pragmatic General Multicast (PGM) Could Allow Denial of Service - Windows Server 2008 (Japanese) Severity: Moderate Fixlet ID: 803613 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-036.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in the Pragmatic General Multicast (PGM) protocol that could allow a denial of service if malformed PGM packets are received by an affected system. An attacker who successfully exploited this vulnerability could cause a user’s system to become non-responsive and to require a restart to restore functionality. Note that the denial of service vulnerability would not allow an attacker to execute code or to elevate their user rights, but it could cause the affected system to stop accepting requests. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-036: Vulnerabilities in Pragmatic General Multicast (PGM) Could Allow Denial of Service - Windows Server 2008 (x64) (Japanese) Severity: Moderate Fixlet ID: 803615 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-036.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in the Pragmatic General Multicast (PGM) protocol that could allow a denial of service if malformed PGM packets are received by an affected system. An attacker who successfully exploited this vulnerability could cause a user’s system to become non-responsive and to require a restart to restore functionality. Note that the denial of service vulnerability would not allow an attacker to execute code or to elevate their user rights, but it could cause the affected system to stop accepting requests. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.