Fixlet Site - PatchesforWindows(Japanese) Current Version: 236 Published: Fri, 15 Aug 2008 23:14:47 GMT New Fixlets: ============ *************************************************************** Title: MS08-022: CORRUPT PATCH - Windows Server 2003 SP1/SP2 (v2, re-released 8/12/2008) (Japanese) Severity: Critical Fixlet ID: 802211 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-022.mspx *************************************************************** Title: MS08-022: Vulnerability in VBScript and JScript Scripting Engines Could Allow Remote Code Execution - Windows XP SP2 (v2, re-released 8/12/2008) (Japanese) Severity: Critical Fixlet ID: 802212 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-022.mspx Fixlet Description: Important Note: This patch was re-released on August 12, 2008 to address known issues with the original patch. Customers who have successfully updated their systems do not need to reinstall this update. Microsoft has released a security update that resolves a privately reported vulnerability in the VBScript and JScript scripting engines in Windows. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-022: Vulnerability in VBScript and JScript Scripting Engines Could Allow Remote Code Execution - Windows Server 2003 SP1/SP2 (v2, re-released 8/12/2008) (Japanese) Severity: Critical Fixlet ID: 802213 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-022.mspx Fixlet Description: Important Note: This patch was re-released on August 12, 2008 to address known issues with the original patch. Customers who have successfully updated their systems do not need to reinstall this update. Microsoft has released a security update that resolves a privately reported vulnerability in the VBScript and JScript scripting engines in Windows. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-022: CORRUPT PATCH - Windows XP SP2 (v2, re-released 8/12/2008) (Japanese) Severity: Critical Fixlet ID: 802214 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-022.mspx *************************************************************** Title: MS08-022: CORRUPT PATCH - Windows Server 2003 (x64) (v2, re-released 8/12/2008) (Japanese) Severity: Critical Fixlet ID: 802215 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-022.mspx *************************************************************** Title: MS08-022: Vulnerability in VBScript and JScript Scripting Engines Could Allow Remote Code Execution - Windows Server 2003 (x64) (v2, re-released 8/12/2008) (Japanese) Severity: Critical Fixlet ID: 802216 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-022.mspx Fixlet Description: Important Note: This patch was re-released on August 12, 2008 to address known issues with the original patch. Customers who have successfully updated their systems do not need to reinstall this update. Microsoft has released a security update that resolves a privately reported vulnerability in the VBScript and JScript scripting engines in Windows. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-022: Vulnerability in VBScript and JScript Scripting Engines Could Allow Remote Code Execution - Windows XP (x64) (v2, re-released 8/12/2008) (Japanese) Severity: Critical Fixlet ID: 802217 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-022.mspx Fixlet Description: Important Note: This patch was re-released on August 12, 2008 to address known issues with the original patch. Customers who have successfully updated their systems do not need to reinstall this update. Microsoft has released a security update that resolves a privately reported vulnerability in the VBScript and JScript scripting engines in Windows. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-022: CORRUPT PATCH - Windows XP (x64) (v2, re-released 8/12/2008) (Japanese) Severity: Critical Fixlet ID: 802218 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-022.mspx *************************************************************** Title: MS08-041: Vulnerability in the ActiveX Control for the Snapshot Viewer for Microsoft Access Could Allow Remote Code Execution - Office XP SP3 (Local/Network Install) (Japanese) Severity: Critical Fixlet ID: 804111 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-041.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the ActiveX control for the Snapshot Viewer for Microsoft Access. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-041: Vulnerability in the ActiveX Control for the Snapshot Viewer for Microsoft Access Could Allow Remote Code Execution - Office XP SP3 (Administrative Install) (Japanese) Severity: Critical Fixlet ID: 804113 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-041.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the ActiveX control for the Snapshot Viewer for Microsoft Access. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-041: Vulnerability in the ActiveX Control for the Snapshot Viewer for Microsoft Access Could Allow Remote Code Execution - Office 2003 SP2/SP3 (Local/Network Install) (Japanese) Severity: Critical Fixlet ID: 804116 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-041.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the ActiveX control for the Snapshot Viewer for Microsoft Access. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-041: Vulnerability in the ActiveX Control for the Snapshot Viewer for Microsoft Access Could Allow Remote Code Execution - Office 2003 SP2/SP3 (Administrative Install) (Japanese) Severity: Critical Fixlet ID: 804118 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-041.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the ActiveX control for the Snapshot Viewer for Microsoft Access. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-042: Vulnerability in Microsoft Word Could Allow Remote Code Execution - Office XP SP3 (Local/Network Install) (Japanese) Severity: Important Fixlet ID: 804201 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-042.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves a publicly reported vulnerability in Microsoft Word. This vulnerability could allow remote code execution if a user opens a specially crafted Word file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-042: Vulnerability in Microsoft Word Could Allow Remote Code Execution - Office XP SP3 (Administrative Install) (Japanese) Severity: Important Fixlet ID: 804203 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-042.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves a publicly reported vulnerability in Microsoft Word. This vulnerability could allow remote code execution if a user opens a specially crafted Word file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-042: Vulnerability in Microsoft Word Could Allow Remote Code Execution - Office 2003 SP2/SP3 (Local/Network Install) (Japanese) Severity: Important Fixlet ID: 804206 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-042.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves a publicly reported vulnerability in Microsoft Word. This vulnerability could allow remote code execution if a user opens a specially crafted Word file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-042: Vulnerability in Microsoft Word Could Allow Remote Code Execution - Office 2003 SP2/SP3 (Administrative Install) (Japanese) Severity: Important Fixlet ID: 804208 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-042.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves a publicly reported vulnerability in Microsoft Word. This vulnerability could allow remote code execution if a user opens a specially crafted Word file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-043: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution - Office XP SP3 (Local/Network Install) (Japanese) Severity: Important Fixlet ID: 804306 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-043.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Office Excel that could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-043: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution - Office XP SP3 (Administrative Install) (Japanese) Severity: Important Fixlet ID: 804308 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-043.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Office Excel that could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-043: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution - Office 2003 SP2/SP3 (Local/Network Install) (Japanese) Severity: Important Fixlet ID: 804311 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-043.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Office Excel that could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-043: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution - Office 2003 SP2/SP3 (Administrative Install) (Japanese) Severity: Important Fixlet ID: 804313 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-043.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Office Excel that could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-043: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution - Office 2007 Gold/SP1 (Japanese) Severity: Important Fixlet ID: 804316 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-043.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Office Excel that could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-043: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution - Excel Viewer 2003 (Japanese) Severity: Important Fixlet ID: 804326 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-043.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Office Excel that could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-043: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution - Excel Viewer 2007 (Japanese) Severity: Important Fixlet ID: 804336 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-043.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Office Excel that could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-043: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution - Office Compatibility Pack for Excel 2007 File Formats (Japanese) Severity: Important Fixlet ID: 804341 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-043.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Office Excel that could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-043: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution - SharePoint Server 2007 Gold/SP1 (Japanese) Severity: Important Fixlet ID: 804346 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-043.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Office Excel that could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-043: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution - SharePoint Server 2007 Gold/SP1 (x64) (Japanese) Severity: Important Fixlet ID: 804356 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-043.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Office Excel that could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-044: Vulnerabilities in Microsoft Office Filters Could Allow Remote Code Execution - Office XP SP3 (Local/Network Install) (Japanese) Severity: Important Fixlet ID: 804406 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-044.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using Microsoft Office. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-044: Vulnerabilities in Microsoft Office Filters Could Allow Remote Code Execution - Office XP SP3 (Administrative Install) (Japanese) Severity: Important Fixlet ID: 804408 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-044.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using Microsoft Office. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-044: Vulnerabilities in Microsoft Office Filters Could Allow Remote Code Execution - Office 2003 SP2 (Local/Network Install) (Japanese) Severity: Important Fixlet ID: 804411 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-044.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using Microsoft Office. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-044: Vulnerabilities in Microsoft Office Filters Could Allow Remote Code Execution - Office 2003 SP2 (Administrative Install) (Japanese) Severity: Important Fixlet ID: 804413 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-044.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using Microsoft Office. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-044: Vulnerabilities in Microsoft Office Filters Could Allow Remote Code Execution - Project 2002 SP1 (Local/Network Install) (Japanese) Severity: Important Fixlet ID: 804416 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-044.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using Microsoft Office. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-045: Cumulative Security Update for Internet Explorer - IE 5.01 - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 804501 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-045.mspx Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability. All of the vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-045: CORRUPT PATCH - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 804502 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-045.mspx *************************************************************** Title: MS08-045: Cumulative Security Update for Internet Explorer - IE 6 - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 804503 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-045.mspx Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability. All of the vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-045: CORRUPT PATCH - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 804504 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-045.mspx *************************************************************** Title: MS08-045: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2/SP3 (Japanese) Severity: Critical Fixlet ID: 804505 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-045.mspx Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability. All of the vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-045: CORRUPT PATCH - Windows XP SP2/SP3 (Japanese) Severity: Critical Fixlet ID: 804506 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-045.mspx *************************************************************** Title: MS08-045: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP Gold/SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 804507 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-045.mspx Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability. All of the vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-045: CORRUPT PATCH - Windows XP Gold/SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 804508 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-045.mspx *************************************************************** Title: MS08-045: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 804509 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-045.mspx Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability. All of the vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-045: CORRUPT PATCH - Windows Server 2003 SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 804510 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-045.mspx *************************************************************** Title: MS08-045: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 Gold/SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 804511 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-045.mspx Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability. All of the vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-045: CORRUPT PATCH - Windows Server 2003 Gold/SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 804512 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-045.mspx *************************************************************** Title: MS08-045: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2/SP3 (Japanese) Severity: Critical Fixlet ID: 804513 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-045.mspx Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability. All of the vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-045: CORRUPT PATCH - Windows XP SP2/SP3 (Japanese) Severity: Critical Fixlet ID: 804514 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-045.mspx *************************************************************** Title: MS08-045: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP Gold/SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 804515 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-045.mspx Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability. All of the vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-045: CORRUPT PATCH - Windows XP Gold/SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 804516 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-045.mspx *************************************************************** Title: MS08-045: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 804517 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-045.mspx Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability. All of the vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-045: CORRUPT PATCH - Windows Server 2003 SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 804518 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-045.mspx *************************************************************** Title: MS08-045: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 Gold/SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 804519 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-045.mspx Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability. All of the vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-045: CORRUPT PATCH - Windows Server 2003 Gold/SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 804520 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-045.mspx *************************************************************** Title: MS08-045: Cumulative Security Update for Internet Explorer - IE 7 - Windows Vista Gold/SP1 (Japanese) Severity: Critical Fixlet ID: 804521 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-045.mspx Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability. All of the vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-045: Cumulative Security Update for Internet Explorer - IE 7 - Windows Vista Gold/SP1 (x64) (Japanese) Severity: Critical Fixlet ID: 804523 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-045.mspx Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability. All of the vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-045: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2008 (Japanese) Severity: Critical Fixlet ID: 804525 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-045.mspx Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability. All of the vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-045: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2008 (x64) (Japanese) Severity: Critical Fixlet ID: 804527 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-045.mspx Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability. All of the vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-046: Vulnerability in Microsoft Windows Image Color Management System Could Allow Remote Code Execution - Windows XP Gold/SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 804601 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-046.mspx Fixlet Description: Microsoft has released an update that resolves a privately reported vulnerability in the Microsoft Image Color Management (ICM) system that could allow remote code execution in the context of the current user. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-046: CORRUPT PATCH - Windows XP Gold/SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 804602 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-046.mspx *************************************************************** Title: MS08-046: Vulnerability in Microsoft Windows Image Color Management System Could Allow Remote Code Execution - Windows XP SP2/SP3 (Japanese) Severity: Critical Fixlet ID: 804603 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-046.mspx Fixlet Description: Microsoft has released an update that resolves a privately reported vulnerability in the Microsoft Image Color Management (ICM) system that could allow remote code execution in the context of the current user. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-046: CORRUPT PATCH - Windows XP SP2/SP3 (Japanese) Severity: Critical Fixlet ID: 804604 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-046.mspx *************************************************************** Title: MS08-046: Vulnerability in Microsoft Windows Image Color Management System Could Allow Remote Code Execution - Windows Server 2003 SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 804605 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-046.mspx Fixlet Description: Microsoft has released an update that resolves a privately reported vulnerability in the Microsoft Image Color Management (ICM) system that could allow remote code execution in the context of the current user. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-046: CORRUPT PATCH - Windows Server 2003 SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 804606 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-046.mspx *************************************************************** Title: MS08-046: Vulnerability in Microsoft Windows Image Color Management System Could Allow Remote Code Execution - Windows Server 2003 Gold/SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 804607 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-046.mspx Fixlet Description: Microsoft has released an update that resolves a privately reported vulnerability in the Microsoft Image Color Management (ICM) system that could allow remote code execution in the context of the current user. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-046: CORRUPT PATCH - Windows Server 2003 Gold/SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 804608 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-046.mspx *************************************************************** Title: MS08-046: Vulnerability in Microsoft Windows Image Color Management System Could Allow Remote Code Execution - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 804609 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-046.mspx Fixlet Description: Microsoft has released an update that resolves a privately reported vulnerability in the Microsoft Image Color Management (ICM) system that could allow remote code execution in the context of the current user. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-046: CORRUPT PATCH - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 804610 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-046.mspx *************************************************************** Title: MS08-047: Vulnerability in IPsec Policy Processing Could Allow Information Disclosure - Windows Vista Gold/SP1 (Japanese) Severity: Important Fixlet ID: 804701 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-047.mspx Fixlet Description: Microsoft has released an update that resolves a privately reported vulnerability in the way certain Windows Internet Protocol Security (IPsec) rules are applied. This vulnerability could cause systems to ignore IPsec policies and transmit network traffic in clear text. This, in turn, would disclose information intended to be encrypted on the network. An attacker viewing the traffic on the network would be able to view and possibly modify the contents of the traffic. Note that this vulnerability would not allow an attacker to execute code or to elevate their user rights directly. It could be used to collect useful information to try to further compromise the affected system or network. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-047: Vulnerability in IPsec Policy Processing Could Allow Information Disclosure - Windows Vista Gold/SP1 (x64) (Japanese) Severity: Important Fixlet ID: 804703 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-047.mspx Fixlet Description: Microsoft has released an update that resolves a privately reported vulnerability in the way certain Windows Internet Protocol Security (IPsec) rules are applied. This vulnerability could cause systems to ignore IPsec policies and transmit network traffic in clear text. This, in turn, would disclose information intended to be encrypted on the network. An attacker viewing the traffic on the network would be able to view and possibly modify the contents of the traffic. Note that this vulnerability would not allow an attacker to execute code or to elevate their user rights directly. It could be used to collect useful information to try to further compromise the affected system or network. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-047: Vulnerability in IPsec Policy Processing Could Allow Information Disclosure - Windows Server 2008 (Japanese) Severity: Important Fixlet ID: 804705 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-047.mspx Fixlet Description: Microsoft has released an update that resolves a privately reported vulnerability in the way certain Windows Internet Protocol Security (IPsec) rules are applied. This vulnerability could cause systems to ignore IPsec policies and transmit network traffic in clear text. This, in turn, would disclose information intended to be encrypted on the network. An attacker viewing the traffic on the network would be able to view and possibly modify the contents of the traffic. Note that this vulnerability would not allow an attacker to execute code or to elevate their user rights directly. It could be used to collect useful information to try to further compromise the affected system or network. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-047: Vulnerability in IPsec Policy Processing Could Allow Information Disclosure - Windows Server 2008 (x64) (Japanese) Severity: Important Fixlet ID: 804707 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-047.mspx Fixlet Description: Microsoft has released an update that resolves a privately reported vulnerability in the way certain Windows Internet Protocol Security (IPsec) rules are applied. This vulnerability could cause systems to ignore IPsec policies and transmit network traffic in clear text. This, in turn, would disclose information intended to be encrypted on the network. An attacker viewing the traffic on the network would be able to view and possibly modify the contents of the traffic. Note that this vulnerability would not allow an attacker to execute code or to elevate their user rights directly. It could be used to collect useful information to try to further compromise the affected system or network. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-048: Security Update for Outlook Express and Windows Mail - OE 5.5 SP2 - Windows 2000 SP4 (Japanese) Severity: Important Fixlet ID: 804803 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-048.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Outlook Express and Windows Mail. The vulnerability could allow information disclosure if a user visits a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-048: CORRUPT PATCH - Windows 2000 SP4 (Japanese) Severity: Important Fixlet ID: 804804 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-048.mspx *************************************************************** Title: MS08-048: Security Update for Outlook Express and Windows Mail - OE 6 SP1 - Windows 2000 SP4 (Japanese) Severity: Important Fixlet ID: 804805 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-048.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Outlook Express and Windows Mail. The vulnerability could allow information disclosure if a user visits a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-048: CORRUPT PATCH - Windows 2000 SP4 (Japanese) Severity: Important Fixlet ID: 804806 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-048.mspx *************************************************************** Title: MS08-048: Security Update for Outlook Express and Windows Mail - OE 6 - Windows XP SP2/SP3 (Japanese) Severity: Important Fixlet ID: 804807 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-048.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Outlook Express and Windows Mail. The vulnerability could allow information disclosure if a user visits a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-048: CORRUPT PATCH - Windows XP SP2/SP3 (Japanese) Severity: Important Fixlet ID: 804808 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-048.mspx *************************************************************** Title: MS08-048: Security Update for Outlook Express and Windows Mail - OE 6 - Windows XP Gold/SP2 (x64) (Japanese) Severity: Important Fixlet ID: 804809 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-048.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Outlook Express and Windows Mail. The vulnerability could allow information disclosure if a user visits a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-048: CORRUPT PATCH - Windows XP Gold/SP2 (x64) (Japanese) Severity: Important Fixlet ID: 804810 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-048.mspx *************************************************************** Title: MS08-048: Security Update for Outlook Express and Windows Mail - OE 6 - Windows Server 2003 SP1/SP2 (Japanese) Severity: Low Fixlet ID: 804811 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-048.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Outlook Express and Windows Mail. The vulnerability could allow information disclosure if a user visits a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-048: CORRUPT PATCH - Windows Server 2003 SP1/SP2 (Japanese) Severity: Low Fixlet ID: 804812 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-048.mspx *************************************************************** Title: MS08-048: Security Update for Outlook Express and Windows Mail - OE 6 - Windows Server 2003 Gold/SP2 (x64) (Japanese) Severity: Low Fixlet ID: 804813 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-048.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Outlook Express and Windows Mail. The vulnerability could allow information disclosure if a user visits a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-048: CORRUPT PATCH - Windows Server 2003 Gold/SP2 (x64) (Japanese) Severity: Low Fixlet ID: 804814 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-048.mspx *************************************************************** Title: MS08-048: Security Update for Outlook Express and Windows Mail - WM - Windows Vista Gold/SP1 (Japanese) Severity: Important Fixlet ID: 804815 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-048.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Outlook Express and Windows Mail. The vulnerability could allow information disclosure if a user visits a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-048: Security Update for Outlook Express and Windows Mail - WM - Windows Vista Gold/SP1 (x64) (Japanese) Severity: Important Fixlet ID: 804817 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-048.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Outlook Express and Windows Mail. The vulnerability could allow information disclosure if a user visits a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-048: Security Update for Outlook Express and Windows Mail - WM - Windows Server 2008 (Japanese) Severity: Low Fixlet ID: 804819 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-048.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Outlook Express and Windows Mail. The vulnerability could allow information disclosure if a user visits a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-048: Security Update for Outlook Express and Windows Mail - WM - Windows Server 2008 (x64) (Japanese) Severity: Low Fixlet ID: 804821 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-048.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Outlook Express and Windows Mail. The vulnerability could allow information disclosure if a user visits a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-049: Vulnerabilities in Event System Could Allow Remote Code Execution - Windows 2000 SP4 (Japanese) Severity: Important Fixlet ID: 804901 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-049.mspx Fixlet Description: Microsoft has released an update that resolves two privately reported vulnerabilities in Microsoft Windows Event System that could allow remote code execution. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-049: CORRUPT PATCH - Windows 2000 SP4 (Japanese) Severity: Important Fixlet ID: 804902 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-049.mspx *************************************************************** Title: MS08-049: Vulnerabilities in Event System Could Allow Remote Code Execution - Windows XP SP2/SP3 (Japanese) Severity: Important Fixlet ID: 804903 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-049.mspx Fixlet Description: Microsoft has released an update that resolves two privately reported vulnerabilities in Microsoft Windows Event System that could allow remote code execution. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-049: CORRUPT PATCH - Windows XP SP2/SP3 (Japanese) Severity: Important Fixlet ID: 804904 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-049.mspx *************************************************************** Title: MS08-049: Vulnerabilities in Event System Could Allow Remote Code Execution - Windows XP Gold/SP2 (x64) (Japanese) Severity: Important Fixlet ID: 804905 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-049.mspx Fixlet Description: Microsoft has released an update that resolves two privately reported vulnerabilities in Microsoft Windows Event System that could allow remote code execution. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-049: CORRUPT PATCH - Windows XP Gold/SP2 (x64) (Japanese) Severity: Important Fixlet ID: 804906 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-049.mspx *************************************************************** Title: MS08-049: Vulnerabilities in Event System Could Allow Remote Code Execution - Windows Server 2003 SP1/SP2 (Japanese) Severity: Important Fixlet ID: 804907 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-049.mspx Fixlet Description: Microsoft has released an update that resolves two privately reported vulnerabilities in Microsoft Windows Event System that could allow remote code execution. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-049: CORRUPT PATCH - Windows Server 2003 SP1/SP2 (Japanese) Severity: Important Fixlet ID: 804908 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-049.mspx *************************************************************** Title: MS08-049: Vulnerabilities in Event System Could Allow Remote Code Execution - Windows Server 2003 Gold/SP2 (x64) (Japanese) Severity: Important Fixlet ID: 804909 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-049.mspx Fixlet Description: Microsoft has released an update that resolves two privately reported vulnerabilities in Microsoft Windows Event System that could allow remote code execution. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-049: CORRUPT PATCH - Windows Server 2003 Gold/SP2 (x64) (Japanese) Severity: Important Fixlet ID: 804910 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-049.mspx *************************************************************** Title: MS08-049: Vulnerabilities in Event System Could Allow Remote Code Execution - Windows Vista Gold/SP1 (Japanese) Severity: Important Fixlet ID: 804911 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-049.mspx Fixlet Description: Microsoft has released an update that resolves two privately reported vulnerabilities in Microsoft Windows Event System that could allow remote code execution. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-049: Vulnerabilities in Event System Could Allow Remote Code Execution - Windows Vista Gold/SP1 (x64) (Japanese) Severity: Important Fixlet ID: 804913 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-049.mspx Fixlet Description: Microsoft has released an update that resolves two privately reported vulnerabilities in Microsoft Windows Event System that could allow remote code execution. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-049: Vulnerabilities in Event System Could Allow Remote Code Execution - Windows Server 2008 (Japanese) Severity: Important Fixlet ID: 804915 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-049.mspx Fixlet Description: Microsoft has released an update that resolves two privately reported vulnerabilities in Microsoft Windows Event System that could allow remote code execution. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-049: Vulnerabilities in Event System Could Allow Remote Code Execution - Windows Server 2008 (x64) (Japanese) Severity: Important Fixlet ID: 804917 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-049.mspx Fixlet Description: Microsoft has released an update that resolves two privately reported vulnerabilities in Microsoft Windows Event System that could allow remote code execution. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-050: Vulnerability in Windows Messenger Could Allow Information Disclosure - Windows Messenger 4.7 - Windows XP SP2/SP3 (Japanese) Severity: Important Fixlet ID: 805001 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-050.mspx Fixlet Description: Microsoft has released a security update that resolves a publicly reported vulnerability in supported versions of Windows Messenger. As a result of this vulnerability, scripting of an ActiveX control could allow information disclosure in the context of the logged-on user. An attacker could change state, get contact information, and initiate audio and video chat sessions without the knowledge of the logged-on user. An attacker could also capture the user’s logon ID and remotely log on to the user’s Messenger client impersonating that user. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-050: CORRUPT PATCH - Windows XP SP2/SP3 (Japanese) Severity: Important Fixlet ID: 805002 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-050.mspx *************************************************************** Title: MS08-050: Vulnerability in Windows Messenger Could Allow Information Disclosure - Windows Messenger 4.7 - Windows XP Gold/SP2 (x64) (Japanese) Severity: Important Fixlet ID: 805003 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-050.mspx Fixlet Description: Microsoft has released a security update that resolves a publicly reported vulnerability in supported versions of Windows Messenger. As a result of this vulnerability, scripting of an ActiveX control could allow information disclosure in the context of the logged-on user. An attacker could change state, get contact information, and initiate audio and video chat sessions without the knowledge of the logged-on user. An attacker could also capture the user’s logon ID and remotely log on to the user’s Messenger client impersonating that user. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-050: CORRUPT PATCH - Windows XP Gold/SP2 (x64) (Japanese) Severity: Important Fixlet ID: 805004 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-050.mspx *************************************************************** Title: MS08-050: Vulnerability in Windows Messenger Could Allow Information Disclosure - Windows Messenger 4.7 - Windows Server 2003 SP1/SP2 (Japanese) Severity: Moderate Fixlet ID: 805005 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-050.mspx Fixlet Description: Microsoft has released a security update that resolves a publicly reported vulnerability in supported versions of Windows Messenger. As a result of this vulnerability, scripting of an ActiveX control could allow information disclosure in the context of the logged-on user. An attacker could change state, get contact information, and initiate audio and video chat sessions without the knowledge of the logged-on user. An attacker could also capture the user’s logon ID and remotely log on to the user’s Messenger client impersonating that user. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-050: CORRUPT PATCH - Windows Server 2003 SP1/SP2 (Japanese) Severity: Moderate Fixlet ID: 805006 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-050.mspx *************************************************************** Title: MS08-050: Vulnerability in Windows Messenger Could Allow Information Disclosure - Windows Messenger 4.7 - Windows Server 2003 Gold/SP2 (x64) (Japanese) Severity: Moderate Fixlet ID: 805007 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-050.mspx Fixlet Description: Microsoft has released a security update that resolves a publicly reported vulnerability in supported versions of Windows Messenger. As a result of this vulnerability, scripting of an ActiveX control could allow information disclosure in the context of the logged-on user. An attacker could change state, get contact information, and initiate audio and video chat sessions without the knowledge of the logged-on user. An attacker could also capture the user’s logon ID and remotely log on to the user’s Messenger client impersonating that user. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-050: CORRUPT PATCH - Windows Server 2003 Gold/SP2 (x64) (Japanese) Severity: Moderate Fixlet ID: 805008 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-050.mspx *************************************************************** Title: MS08-050: Vulnerability in Windows Messenger Could Allow Information Disclosure - Windows Messenger 5.1 (Japanese) Severity: Important Fixlet ID: 805011 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-050.mspx Fixlet Description: Microsoft has released a security update that resolves a publicly reported vulnerability in supported versions of Windows Messenger. As a result of this vulnerability, scripting of an ActiveX control could allow information disclosure in the context of the logged-on user. An attacker could change state, get contact information, and initiate audio and video chat sessions without the knowledge of the logged-on user. An attacker could also capture the user’s logon ID and remotely log on to the user’s Messenger client impersonating that user. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: This action will fail if Windows Messenger 5.0 is running. To prevent this behavior, you may want to deploy this action with the user constraint "Run only when no user is present" or display a message box before action execution instructing the user to shutdown Windows Messenger before applying the update. *************************************************************** Title: MS08-050: CORRUPT PATCH - Windows Messenger 5.1 (Japanese) Severity: Important Fixlet ID: 805012 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-050.mspx *************************************************************** Title: MS08-051: Vulnerabilities in Microsoft PowerPoint Could Allow Remote Code Execution - Office XP SP3 (Local/Network Install) (Japanese) Severity: Important Fixlet ID: 805106 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-051.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Office PowerPoint and Microsoft Office PowerPoint Viewer that could allow remote code execution if a user opens a specially crafted PowerPoint file. An attacker who successfully exploited any of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-051: Vulnerabilities in Microsoft PowerPoint Could Allow Remote Code Execution - Office XP SP3 (Administrative Install) (Japanese) Severity: Important Fixlet ID: 805108 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-051.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Office PowerPoint and Microsoft Office PowerPoint Viewer that could allow remote code execution if a user opens a specially crafted PowerPoint file. An attacker who successfully exploited any of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-051: Vulnerabilities in Microsoft PowerPoint Could Allow Remote Code Execution - Office 2003 SP2/SP3 (Local/Network Install) (Japanese) Severity: Important Fixlet ID: 805111 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-051.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Office PowerPoint and Microsoft Office PowerPoint Viewer that could allow remote code execution if a user opens a specially crafted PowerPoint file. An attacker who successfully exploited any of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-051: Vulnerabilities in Microsoft PowerPoint Could Allow Remote Code Execution - Office 2003 SP2/SP3 (Administrative Install) (Japanese) Severity: Important Fixlet ID: 805113 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-051.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Office PowerPoint and Microsoft Office PowerPoint Viewer that could allow remote code execution if a user opens a specially crafted PowerPoint file. An attacker who successfully exploited any of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-051: Vulnerabilities in Microsoft PowerPoint Could Allow Remote Code Execution - Office 2007 (Japanese) Severity: Important Fixlet ID: 805121 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-051.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Office PowerPoint and Microsoft Office PowerPoint Viewer that could allow remote code execution if a user opens a specially crafted PowerPoint file. An attacker who successfully exploited any of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-051: Vulnerabilities in Microsoft PowerPoint Could Allow Remote Code Execution - PowerPoint Viewer 2003 (Japanese) Severity: Important Fixlet ID: 805126 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-051.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Office PowerPoint and Microsoft Office PowerPoint Viewer that could allow remote code execution if a user opens a specially crafted PowerPoint file. An attacker who successfully exploited any of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-051: Vulnerabilities in Microsoft PowerPoint Could Allow Remote Code Execution - Office Compatibility Pack for PowerPoint 2007 File Formats (Japanese) Severity: Important Fixlet ID: 805131 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-051.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Office PowerPoint and Microsoft Office PowerPoint Viewer that could allow remote code execution if a user opens a specially crafted PowerPoint file. An attacker who successfully exploited any of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: 951072: Aug. 2008 Time Zone Update - Windows XP SP2/SP3 (Japanese) Severity: Fixlet ID: 95107201 Fixlet Link: http://support.microsoft.com/kb/951072 Fixlet Description: Starting in the spring of 2007, daylight saving time (DST) start and end dates for the United States will transition to comply with the Energy Policy Act of 2005. DST dates in the United States will start three weeks earlier (2:00 A.M. on the second Sunday in March) and will end one week later (2:00 A.M. on the first Sunday in November). This patch will change affected computers' time zone data to account for the 2007 US DST change. This update will also include changes for other related DST changes, time zone behavior, and settings. Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates. See the Microsoft web page on the 2007 DST changes here for more information. *************************************************************** Title: 951072: CORRUPT PATCH - Windows XP SP2/SP3 (Japanese) Severity: Fixlet ID: 95107202 Fixlet Link: http://support.microsoft.com/kb/951072 *************************************************************** Title: 951072: Aug. 2008 Time Zone Update - Windows Server 2003 SP1/SP2 (Japanese) Severity: Fixlet ID: 95107203 Fixlet Link: http://support.microsoft.com/kb/951072 Fixlet Description: Starting in the spring of 2007, daylight saving time (DST) start and end dates for the United States will transition to comply with the Energy Policy Act of 2005. DST dates in the United States will start three weeks earlier (2:00 A.M. on the second Sunday in March) and will end one week later (2:00 A.M. on the first Sunday in November). This patch will change affected computers' time zone data to account for the 2007 US DST change. This update will also include changes for other related DST changes, time zone behavior, and settings. Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates. See the Microsoft web page on the 2007 DST changes here for more information. *************************************************************** Title: 951072: CORRUPT PATCH - Windows Server 2003 SP1/SP2 (Japanese) Severity: Fixlet ID: 95107204 Fixlet Link: http://support.microsoft.com/kb/951072 *************************************************************** Title: 951072: Aug. 2008 Time Zone Update - Windows Server 2008/Windows Vista Gold/SP1 (Japanese) Severity: Fixlet ID: 95107205 Fixlet Link: http://support.microsoft.com/kb/951072 Fixlet Description: Starting in the spring of 2007, daylight saving time (DST) start and end dates for the United States will transition to comply with the Energy Policy Act of 2005. DST dates in the United States will start three weeks earlier (2:00 A.M. on the second Sunday in March) and will end one week later (2:00 A.M. on the first Sunday in November). This patch will change affected computers' time zone data to account for the 2007 US DST change. This update will also include changes for other related DST changes, time zone behavior, and settings. Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates. See the Microsoft web page on the 2007 DST changes here for more information. *************************************************************** Title: 951072: Aug. 2008 Time Zone Update - Windows XP/Windows 2003 Gold/SP2 (x64) (Japanese) Severity: Fixlet ID: 95107207 Fixlet Link: http://support.microsoft.com/kb/951072 Fixlet Description: Starting in the spring of 2007, daylight saving time (DST) start and end dates for the United States will transition to comply with the Energy Policy Act of 2005. DST dates in the United States will start three weeks earlier (2:00 A.M. on the second Sunday in March) and will end one week later (2:00 A.M. on the first Sunday in November). This patch will change affected computers' time zone data to account for the 2007 US DST change. This update will also include changes for other related DST changes, time zone behavior, and settings. Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates. See the Microsoft web page on the 2007 DST changes here for more information. *************************************************************** Title: 951072: CORRUPT PATCH - Windows XP/Windows 2003 Gold/SP2 (x64) (Japanese) Severity: Fixlet ID: 95107208 Fixlet Link: http://support.microsoft.com/kb/951072 *************************************************************** Title: 951072: Aug. 2008 Time Zone Update - Windows Vista Gold/SP1/ Windows Server 2008 (x64) (Japanese) Severity: Fixlet ID: 95107209 Fixlet Link: http://support.microsoft.com/kb/951072 Fixlet Description: Starting in the spring of 2007, daylight saving time (DST) start and end dates for the United States will transition to comply with the Energy Policy Act of 2005. DST dates in the United States will start three weeks earlier (2:00 A.M. on the second Sunday in March) and will end one week later (2:00 A.M. on the first Sunday in November). This patch will change affected computers' time zone data to account for the 2007 US DST change. This update will also include changes for other related DST changes, time zone behavior, and settings. Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates. See the Microsoft web page on the 2007 DST changes here for more information.