Fixlet Site - PatchesforWindows(Japanese) Current Version: 247 Published: Fri, 17 Oct 2008 20:30:03 GMT New Fixlets: ============ *************************************************************** Title: UPDATE: SQL Server 2005 Service Pack 2 (Client Tools Only) (x64) (Japanese) Severity: Fixlet ID: 20324 Fixlet Link: http://www.microsoft.com/downloads/details.aspx?FamilyID=d07219b2-1e23-49c8-8f0c-63fa18f26d3a&DisplayLang=en Fixlet Link: http://download.microsoft.com/download/2/B/5/2B5E5D37-9B17-423D-BC8F-B11ECD4195B4/ReadmeSQL2005SP2.htm Fixlet Description: Microsoft has released Service Pack 2 (SP2) for SQL Server 2005 Client Tools. The listed computers have SQL Server 2005 Client Tools installed and are not running the database components of SQL Server 2005. The action below will update the SQL Server 2005 Client Tools to SP2. Important Note: There are known issues associated with the installation of this update. See Microsoft Knowledge Base article 933508 for more information. *************************************************************** Title: MS08-041: Vulnerability in the ActiveX Control for the Snapshot Viewer for Microsoft Access Could Allow Remote Code Execution - Standalone Snapshot Viewer (Japanese) Severity: Critical Fixlet ID: 804121 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-041.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the ActiveX control for the Snapshot Viewer for Microsoft Access. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-056: Vulnerability in Microsoft Office Could Allow Information Disclosure - Office XP SP3 (Local/Network Install) (Japanese) Severity: Moderate Fixlet ID: 805601 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-056.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Office. The vulnerability could allow information disclosure if a user clicks a specially crafted CDO URL. An attacker who successfully exploited this vulnerability could inject a client side script in the user's browser that could spoof content, disclose information, or take any action that the user could take on the affected Web site. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-056: Vulnerability in Microsoft Office Could Allow Information Disclosure - Office XP SP3 (Administrative Install) (Japanese) Severity: Moderate Fixlet ID: 805603 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-056.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Office. The vulnerability could allow information disclosure if a user clicks a specially crafted CDO URL. An attacker who successfully exploited this vulnerability could inject a client side script in the user's browser that could spoof content, disclose information, or take any action that the user could take on the affected Web site. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-057: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution - Office XP SP3 (Local/Network Install) (Japanese) Severity: Important Fixlet ID: 805706 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-057.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Office Excel that could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-057: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution - Office XP SP3 (Administrative Install) (Japanese) Severity: Important Fixlet ID: 805708 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-057.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Office Excel that could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-057: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution - Office 2003 SP2/SP3 (Local/Network Install) (Japanese) Severity: Important Fixlet ID: 805711 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-057.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Office Excel that could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-057: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution - Office 2003 SP2/SP3 (Administrative Install) (Japanese) Severity: Important Fixlet ID: 805713 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-057.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Office Excel that could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-057: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution - Office 2007 Gold/SP1 (Japanese) Severity: Important Fixlet ID: 805721 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-057.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Office Excel that could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-057: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution - Excel Viewer 2003 Gold/SP3 (Japanese) Severity: Important Fixlet ID: 805726 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-057.mspx Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Office Excel that could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-057: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution - Excel Viewer 2007 (Japanese) Severity: Important Fixlet ID: 805736 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-057.mspx Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Office Excel that could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-057: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution - Office Compatibility Pack 2007 Gold/SP1 (Japanese) Severity: Important Fixlet ID: 805741 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-057.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Office Excel that could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-057: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution - Sharepoint Server 2007 Gold/SP1 (Japanese) Severity: Important Fixlet ID: 805746 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-057.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Office Excel that could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-057: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution - Sharepoint Server 2007 Gold/SP1 (x64) (Japanese) Severity: Important Fixlet ID: 805756 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-057.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Office Excel that could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-058: Cumulative Security Update for Internet Explorer - IE 5.01 - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 805801 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-058.mspx Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability. The vulnerabilities could allow information disclosure or remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-058: Cumulative Security Update for Internet Explorer - IE 5.01 - Windows 2000 SP4 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 805802 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-058.mspx *************************************************************** Title: MS08-058: Cumulative Security Update for Internet Explorer - IE 6 SP1 - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 805803 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-058.mspx Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability. The vulnerabilities could allow information disclosure or remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-058: Cumulative Security Update for Internet Explorer - IE 6 SP1 - Windows 2000 SP4 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 805804 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-058.mspx *************************************************************** Title: MS08-058: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2/SP3 (Japanese) Severity: Critical Fixlet ID: 805805 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-058.mspx Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability. The vulnerabilities could allow information disclosure or remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-058: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 805806 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-058.mspx *************************************************************** Title: MS08-058: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP Gold/SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 805807 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-058.mspx Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability. The vulnerabilities could allow information disclosure or remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-058: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP Gold/SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 805808 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-058.mspx *************************************************************** Title: MS08-058: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP1/SP2 (Japanese) Severity: Moderate Fixlet ID: 805809 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-058.mspx Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability. The vulnerabilities could allow information disclosure or remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-058: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP1/SP2 - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 805810 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-058.mspx *************************************************************** Title: MS08-058: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 Gold/SP2 (x64) (Japanese) Severity: Moderate Fixlet ID: 805811 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-058.mspx Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability. The vulnerabilities could allow information disclosure or remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-058: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 Gold/SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 805812 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-058.mspx *************************************************************** Title: MS08-058: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2/SP3 (Japanese) Severity: Important Fixlet ID: 805813 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-058.mspx Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability. The vulnerabilities could allow information disclosure or remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-058: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 805814 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-058.mspx *************************************************************** Title: MS08-058: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP Gold/SP2 (x64) (Japanese) Severity: Important Fixlet ID: 805815 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-058.mspx Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability. The vulnerabilities could allow information disclosure or remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-058: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP Gold/SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 805816 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-058.mspx *************************************************************** Title: MS08-058: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP1/SP2 (Japanese) Severity: Low Fixlet ID: 805817 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-058.mspx Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability. The vulnerabilities could allow information disclosure or remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-058: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP1/SP2 - CORRUPT PATCH (Japanese) Severity: Low Fixlet ID: 805818 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-058.mspx *************************************************************** Title: MS08-058: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 Gold/SP2 (x64) (Japanese) Severity: Low Fixlet ID: 805819 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-058.mspx Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability. The vulnerabilities could allow information disclosure or remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-058: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 Gold/SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Low Fixlet ID: 805820 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-058.mspx *************************************************************** Title: MS08-058: Cumulative Security Update for Internet Explorer - IE 7 - Windows Vista Gold/SP1 (Japanese) Severity: Important Fixlet ID: 805821 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-058.mspx Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability. The vulnerabilities could allow information disclosure or remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-058: Cumulative Security Update for Internet Explorer - IE 7 - Windows Vista Gold/SP1 (x64) (Japanese) Severity: Important Fixlet ID: 805823 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-058.mspx Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability. The vulnerabilities could allow information disclosure or remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-058: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2008 (Japanese) Severity: Low Fixlet ID: 805825 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-058.mspx Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability. The vulnerabilities could allow information disclosure or remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-058: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2008 (x64) (Japanese) Severity: Low Fixlet ID: 805827 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-058.mspx Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability. The vulnerabilities could allow information disclosure or remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-059: Vulnerability in Host Integration Server RPC Service Could Allow Remote Code Execution - Host Integration Server 2000 SP2 (Server) (Japanese) Severity: Critical Fixlet ID: 805901 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-059.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Host Integration Server. The vulnerability could allow remote code execution if an attacker sent a specially crafted Remote Procedure Call (RPC) request to an affected system. Customers who follow best practices and configure the SNA RPC service account to have fewer user rights on the system could be less impacted than customers who configure the SNA RPC service account to have administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-059: Vulnerability in Host Integration Server RPC Service Could Allow Remote Code Execution - Host Integration Server 2000 SP2 (Server) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 805902 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-059.mspx *************************************************************** Title: MS08-059: Vulnerability in Host Integration Server RPC Service Could Allow Remote Code Execution - Host Integration Server 2000 SP2 (Administrator Client) (Japanese) Severity: Critical Fixlet ID: 805903 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-059.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Host Integration Server. The vulnerability could allow remote code execution if an attacker sent a specially crafted Remote Procedure Call (RPC) request to an affected system. Customers who follow best practices and configure the SNA RPC service account to have fewer user rights on the system could be less impacted than customers who configure the SNA RPC service account to have administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-059: Vulnerability in Host Integration Server RPC Service Could Allow Remote Code Execution - Host Integration Server 2000 SP2 (Administrator Client) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 805904 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-059.mspx *************************************************************** Title: MS08-059: Vulnerability in Host Integration Server RPC Service Could Allow Remote Code Execution - Host Integration Server 2004 (Server) (Japanese) Severity: Critical Fixlet ID: 805905 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-059.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Host Integration Server. The vulnerability could allow remote code execution if an attacker sent a specially crafted Remote Procedure Call (RPC) request to an affected system. Customers who follow best practices and configure the SNA RPC service account to have fewer user rights on the system could be less impacted than customers who configure the SNA RPC service account to have administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-059: Vulnerability in Host Integration Server RPC Service Could Allow Remote Code Execution - Host Integration Server 2004 (Server) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 805906 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-059.mspx *************************************************************** Title: MS08-059: Vulnerability in Host Integration Server RPC Service Could Allow Remote Code Execution - Host Integration Server 2004 SP1 (Server) (Japanese) Severity: Critical Fixlet ID: 805907 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-059.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Host Integration Server. The vulnerability could allow remote code execution if an attacker sent a specially crafted Remote Procedure Call (RPC) request to an affected system. Customers who follow best practices and configure the SNA RPC service account to have fewer user rights on the system could be less impacted than customers who configure the SNA RPC service account to have administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-059: Vulnerability in Host Integration Server RPC Service Could Allow Remote Code Execution - Host Integration Server 2004 SP1 (Server) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 805908 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-059.mspx *************************************************************** Title: MS08-059: Vulnerability in Host Integration Server RPC Service Could Allow Remote Code Execution - Host Integration Server 2004 (Client) (Japanese) Severity: Critical Fixlet ID: 805909 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-059.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Host Integration Server. The vulnerability could allow remote code execution if an attacker sent a specially crafted Remote Procedure Call (RPC) request to an affected system. Customers who follow best practices and configure the SNA RPC service account to have fewer user rights on the system could be less impacted than customers who configure the SNA RPC service account to have administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-059: Vulnerability in Host Integration Server RPC Service Could Allow Remote Code Execution - Host Integration Server 2004 (Client) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 805910 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-059.mspx *************************************************************** Title: MS08-059: Vulnerability in Host Integration Server RPC Service Could Allow Remote Code Execution - Host Integration Server 2004 SP1 (Client) (Japanese) Severity: Critical Fixlet ID: 805911 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-059.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Host Integration Server. The vulnerability could allow remote code execution if an attacker sent a specially crafted Remote Procedure Call (RPC) request to an affected system. Customers who follow best practices and configure the SNA RPC service account to have fewer user rights on the system could be less impacted than customers who configure the SNA RPC service account to have administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-059: Vulnerability in Host Integration Server RPC Service Could Allow Remote Code Execution - Host Integration Server 2004 SP1 (Client) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 805912 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-059.mspx *************************************************************** Title: MS08-060: Vulnerability in Active Directory Could Allow Remote Code Execution - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 806003 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-060.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in implementations of Active Directory on Microsoft Windows 2000 Server. The vulnerability could allow remote code execution if an attacker gains access to an affected network. This vulnerability only affects Microsoft Windows 2000 servers configured to be domain controllers. If a Microsoft Windows 2000 server has not been promoted to a domain controller, it will not be listening to Lightweight Directory Access Protocol (LDAP) or LDAP over SSL (LDAPS) queries, and will not be exposed to this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-060: Vulnerability in Active Directory Could Allow Remote Code Execution - Windows 2000 SP4 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 806004 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-060.mspx *************************************************************** Title: MS08-061: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows 2000 SP4 (Japanese) Severity: Important Fixlet ID: 806101 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-061.mspx Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed and two privately reported vulnerabilities in the Windows kernel. A local attacker who successfully exploited these vulnerabilities could take complete control of an affected system. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-061: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows 2000 SP4 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 806102 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-061.mspx *************************************************************** Title: MS08-061: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows XP SP2/SP3 (Japanese) Severity: Important Fixlet ID: 806103 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-061.mspx Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed and two privately reported vulnerabilities in the Windows kernel. A local attacker who successfully exploited these vulnerabilities could take complete control of an affected system. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-061: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 806104 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-061.mspx *************************************************************** Title: MS08-061: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows XP Gold/SP2 (x64) (Japanese) Severity: Important Fixlet ID: 806105 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-061.mspx Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed and two privately reported vulnerabilities in the Windows kernel. A local attacker who successfully exploited these vulnerabilities could take complete control of an affected system. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-061: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows XP Gold/SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 806106 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-061.mspx *************************************************************** Title: MS08-061: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2003 SP1/SP2 (Japanese) Severity: Important Fixlet ID: 806107 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-061.mspx Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed and two privately reported vulnerabilities in the Windows kernel. A local attacker who successfully exploited these vulnerabilities could take complete control of an affected system. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-061: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2003 SP1/SP2 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 806108 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-061.mspx *************************************************************** Title: MS08-061: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2003 Gold/SP2 (x64) (Japanese) Severity: Important Fixlet ID: 806109 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-061.mspx Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed and two privately reported vulnerabilities in the Windows kernel. A local attacker who successfully exploited these vulnerabilities could take complete control of an affected system. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-061: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2003 Gold/SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 806110 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-061.mspx *************************************************************** Title: MS08-061: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Vista Gold/SP1 (Japanese) Severity: Important Fixlet ID: 806111 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-061.mspx Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed and two privately reported vulnerabilities in the Windows kernel. A local attacker who successfully exploited these vulnerabilities could take complete control of an affected system. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-061: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Vista Gold/SP1 (x64) (Japanese) Severity: Important Fixlet ID: 806113 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-061.mspx Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed and two privately reported vulnerabilities in the Windows kernel. A local attacker who successfully exploited these vulnerabilities could take complete control of an affected system. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-061: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2008 (Japanese) Severity: Important Fixlet ID: 806115 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-061.mspx Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed and two privately reported vulnerabilities in the Windows kernel. A local attacker who successfully exploited these vulnerabilities could take complete control of an affected system. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-061: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2008 (x64) (Japanese) Severity: Important Fixlet ID: 806117 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-061.mspx Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed and two privately reported vulnerabilities in the Windows kernel. A local attacker who successfully exploited these vulnerabilities could take complete control of an affected system. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-062: Vulnerability in Windows Internet Printing Service Could Allow Remote Code Execution - Windows 2000 SP4 (Japanese) Severity: Important Fixlet ID: 806201 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-062.mspx Fixlet Description: Microsoft has released an update that resolves a privately reported vulnerability in the Windows Internet Printing Service that could allow remote code execution in the context of the current user. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-062: Vulnerability in Windows Internet Printing Service Could Allow Remote Code Execution - Windows 2000 SP4 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 806202 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-062.mspx *************************************************************** Title: MS08-062: Vulnerability in Windows Internet Printing Service Could Allow Remote Code Execution - Windows XP SP2/SP3 (Japanese) Severity: Important Fixlet ID: 806203 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-062.mspx Fixlet Description: Microsoft has released an update that resolves a privately reported vulnerability in the Windows Internet Printing Service that could allow remote code execution in the context of the current user. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-062: Vulnerability in Windows Internet Printing Service Could Allow Remote Code Execution - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 806204 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-062.mspx *************************************************************** Title: MS08-062: Vulnerability in Windows Internet Printing Service Could Allow Remote Code Execution - Windows XP Gold/SP2 (x64) (Japanese) Severity: Important Fixlet ID: 806205 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-062.mspx Fixlet Description: Microsoft has released an update that resolves a privately reported vulnerability in the Windows Internet Printing Service that could allow remote code execution in the context of the current user. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-062: Vulnerability in Windows Internet Printing Service Could Allow Remote Code Execution - Windows XP Gold/SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 806206 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-062.mspx *************************************************************** Title: MS08-062: Vulnerability in Windows Internet Printing Service Could Allow Remote Code Execution - Windows Server 2003 SP1/SP2 (Japanese) Severity: Important Fixlet ID: 806207 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-062.mspx Fixlet Description: Microsoft has released an update that resolves a privately reported vulnerability in the Windows Internet Printing Service that could allow remote code execution in the context of the current user. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-062: Vulnerability in Windows Internet Printing Service Could Allow Remote Code Execution - Windows Server 2003 SP1/SP2 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 806208 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-062.mspx *************************************************************** Title: MS08-062: Vulnerability in Windows Internet Printing Service Could Allow Remote Code Execution - Windows Server 2003 Gold/SP2 (x64) (Japanese) Severity: Important Fixlet ID: 806209 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-062.mspx Fixlet Description: Microsoft has released an update that resolves a privately reported vulnerability in the Windows Internet Printing Service that could allow remote code execution in the context of the current user. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-062: Vulnerability in Windows Internet Printing Service Could Allow Remote Code Execution - Windows Server 2003 Gold/SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 806210 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-062.mspx *************************************************************** Title: MS08-062: Vulnerability in Windows Internet Printing Service Could Allow Remote Code Execution - Windows Vista Gold/SP1 (Japanese) Severity: None Fixlet ID: 806211 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-062.mspx Fixlet Description: Microsoft has released an update that resolves a privately reported vulnerability in the Windows Internet Printing Service that could allow remote code execution in the context of the current user. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-062: Vulnerability in Windows Internet Printing Service Could Allow Remote Code Execution - Windows Vista Gold/SP1 (x64) (Japanese) Severity: None Fixlet ID: 806213 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-062.mspx Fixlet Description: Microsoft has released an update that resolves a privately reported vulnerability in the Windows Internet Printing Service that could allow remote code execution in the context of the current user. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-062: Vulnerability in Windows Internet Printing Service Could Allow Remote Code Execution - Windows Server 2008 (Japanese) Severity: Important Fixlet ID: 806215 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-062.mspx Fixlet Description: Microsoft has released an update that resolves a privately reported vulnerability in the Windows Internet Printing Service that could allow remote code execution in the context of the current user. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-062: Vulnerability in Windows Internet Printing Service Could Allow Remote Code Execution - Windows Server 2008 (x64) (Japanese) Severity: Important Fixlet ID: 806217 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-062.mspx Fixlet Description: Microsoft has released an update that resolves a privately reported vulnerability in the Windows Internet Printing Service that could allow remote code execution in the context of the current user. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-063: Vulnerability in SMB Could Allow Remote Code Execution - Windows 2000 SP4 (Japanese) Severity: Important Fixlet ID: 806301 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-063.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Server Message Block (SMB) Protocol. The vulnerability could allow remote code execution on a server that is sharing files or folders. An attacker who successfully exploited this vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-063: Vulnerability in SMB Could Allow Remote Code Execution - Windows 2000 SP4 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 806302 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-063.mspx *************************************************************** Title: MS08-063: Vulnerability in SMB Could Allow Remote Code Execution - Windows XP SP2/SP3 (Japanese) Severity: Important Fixlet ID: 806303 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-063.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Server Message Block (SMB) Protocol. The vulnerability could allow remote code execution on a server that is sharing files or folders. An attacker who successfully exploited this vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-063: Vulnerability in SMB Could Allow Remote Code Execution - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 806304 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-063.mspx *************************************************************** Title: MS08-063: Vulnerability in SMB Could Allow Remote Code Execution - Windows XP Gold/SP2 (x64) (Japanese) Severity: Important Fixlet ID: 806305 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-063.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Server Message Block (SMB) Protocol. The vulnerability could allow remote code execution on a server that is sharing files or folders. An attacker who successfully exploited this vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-063: Vulnerability in SMB Could Allow Remote Code Execution - Windows XP Gold/SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 806306 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-063.mspx *************************************************************** Title: MS08-063: Vulnerability in SMB Could Allow Remote Code Execution - Windows Server 2003 SP1/SP2 (Japanese) Severity: Important Fixlet ID: 806307 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-063.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Server Message Block (SMB) Protocol. The vulnerability could allow remote code execution on a server that is sharing files or folders. An attacker who successfully exploited this vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-063: Vulnerability in SMB Could Allow Remote Code Execution - Windows Server 2003 SP1/SP2 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 806308 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-063.mspx *************************************************************** Title: MS08-063: Vulnerability in SMB Could Allow Remote Code Execution - Windows Server 2003 Gold/SP2 (x64) (Japanese) Severity: Important Fixlet ID: 806309 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-063.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Server Message Block (SMB) Protocol. The vulnerability could allow remote code execution on a server that is sharing files or folders. An attacker who successfully exploited this vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-063: Vulnerability in SMB Could Allow Remote Code Execution - Windows Server 2003 Gold/SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 806310 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-063.mspx *************************************************************** Title: MS08-063: Vulnerability in SMB Could Allow Remote Code Execution - Windows Vista Gold/SP1 (Japanese) Severity: Important Fixlet ID: 806311 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-063.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Server Message Block (SMB) Protocol. The vulnerability could allow remote code execution on a server that is sharing files or folders. An attacker who successfully exploited this vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-063: Vulnerability in SMB Could Allow Remote Code Execution - Windows Vista Gold/SP1 (x64) (Japanese) Severity: Important Fixlet ID: 806313 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-063.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Server Message Block (SMB) Protocol. The vulnerability could allow remote code execution on a server that is sharing files or folders. An attacker who successfully exploited this vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-063: Vulnerability in SMB Could Allow Remote Code Execution - Windows Server 2008 (Japanese) Severity: Important Fixlet ID: 806315 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-063.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Server Message Block (SMB) Protocol. The vulnerability could allow remote code execution on a server that is sharing files or folders. An attacker who successfully exploited this vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-063: Vulnerability in SMB Could Allow Remote Code Execution - Windows Server 2008 (x64) (Japanese) Severity: Important Fixlet ID: 806317 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-063.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Server Message Block (SMB) Protocol. The vulnerability could allow remote code execution on a server that is sharing files or folders. An attacker who successfully exploited this vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-064: Vulnerability in Virtual Address Descriptor Manipulation Could Allow Elevation of Privilege - Windows XP SP2/SP3 (Japanese) Severity: Important Fixlet ID: 806401 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-064.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Virtual Address Descriptor. The vulnerability could allow elevation of privilege if a user runs a specially crafted application. An authenticated attacker who successfully exploited this vulnerability could gain elevation of privilege on an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-064: Vulnerability in Virtual Address Descriptor Manipulation Could Allow Elevation of Privilege - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 806402 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-064.mspx *************************************************************** Title: MS08-064: Vulnerability in Virtual Address Descriptor Manipulation Could Allow Elevation of Privilege - Windows XP Gold/SP2 (x64) (Japanese) Severity: Important Fixlet ID: 806403 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-064.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Virtual Address Descriptor. The vulnerability could allow elevation of privilege if a user runs a specially crafted application. An authenticated attacker who successfully exploited this vulnerability could gain elevation of privilege on an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-064: Vulnerability in Virtual Address Descriptor Manipulation Could Allow Elevation of Privilege - Windows XP Gold/SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 806404 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-064.mspx *************************************************************** Title: MS08-064: Vulnerability in Virtual Address Descriptor Manipulation Could Allow Elevation of Privilege - Windows Server 2003 SP1/SP2 (Japanese) Severity: Important Fixlet ID: 806405 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-064.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Virtual Address Descriptor. The vulnerability could allow elevation of privilege if a user runs a specially crafted application. An authenticated attacker who successfully exploited this vulnerability could gain elevation of privilege on an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-064: Vulnerability in Virtual Address Descriptor Manipulation Could Allow Elevation of Privilege - Windows Server 2003 SP1/SP2 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 806406 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-064.mspx *************************************************************** Title: MS08-064: Vulnerability in Virtual Address Descriptor Manipulation Could Allow Elevation of Privilege - Windows Server 2003 Gold/SP2 (x64) (Japanese) Severity: Important Fixlet ID: 806407 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-064.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Virtual Address Descriptor. The vulnerability could allow elevation of privilege if a user runs a specially crafted application. An authenticated attacker who successfully exploited this vulnerability could gain elevation of privilege on an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-064: Vulnerability in Virtual Address Descriptor Manipulation Could Allow Elevation of Privilege - Windows Server 2003 Gold/SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 806408 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-064.mspx *************************************************************** Title: MS08-064: Vulnerability in Virtual Address Descriptor Manipulation Could Allow Elevation of Privilege - Windows Vista Gold/SP1 (Japanese) Severity: Important Fixlet ID: 806409 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-064.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Virtual Address Descriptor. The vulnerability could allow elevation of privilege if a user runs a specially crafted application. An authenticated attacker who successfully exploited this vulnerability could gain elevation of privilege on an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-064: Vulnerability in Virtual Address Descriptor Manipulation Could Allow Elevation of Privilege - Windows Vista Gold/SP1 (x64) (Japanese) Severity: Important Fixlet ID: 806411 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-064.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Virtual Address Descriptor. The vulnerability could allow elevation of privilege if a user runs a specially crafted application. An authenticated attacker who successfully exploited this vulnerability could gain elevation of privilege on an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-064: Vulnerability in Virtual Address Descriptor Manipulation Could Allow Elevation of Privilege - Windows Server 2008 (Japanese) Severity: Important Fixlet ID: 806413 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-064.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Virtual Address Descriptor. The vulnerability could allow elevation of privilege if a user runs a specially crafted application. An authenticated attacker who successfully exploited this vulnerability could gain elevation of privilege on an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-064: Vulnerability in Virtual Address Descriptor Manipulation Could Allow Elevation of Privilege - Windows Server 2008 (x64) (Japanese) Severity: Important Fixlet ID: 806415 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-064.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Virtual Address Descriptor. The vulnerability could allow elevation of privilege if a user runs a specially crafted application. An authenticated attacker who successfully exploited this vulnerability could gain elevation of privilege on an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-065: Vulnerability in Message Queuing Could Allow Remote Code Execution - Windows 2000 SP4 (Japanese) Severity: Important Fixlet ID: 806501 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-065.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Message Queuing Service (MSMQ) on Microsoft Windows 2000 systems. The vulnerability could allow remote code execution on Microsoft Windows 2000 systems with the MSMQ service enabled. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-065: Vulnerability in Message Queuing Could Allow Remote Code Execution - Windows 2000 SP4 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 806502 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-065.mspx *************************************************************** Title: MS08-066: Vulnerability in the Microsoft Ancillary Function Driver Could Allow Elevation of Privilege - Windows XP SP2/SP3 (Japanese) Severity: Important Fixlet ID: 806601 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-066.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft Ancillary Function Driver. A local attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-066: Vulnerability in the Microsoft Ancillary Function Driver Could Allow Elevation of Privilege - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 806602 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-066.mspx *************************************************************** Title: MS08-066: Vulnerability in the Microsoft Ancillary Function Driver Could Allow Elevation of Privilege - Windows XP Gold/SP2 (x64) (Japanese) Severity: Important Fixlet ID: 806603 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-066.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft Ancillary Function Driver. A local attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-066: Vulnerability in the Microsoft Ancillary Function Driver Could Allow Elevation of Privilege - Windows XP Gold/SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 806604 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-066.mspx *************************************************************** Title: MS08-066: Vulnerability in the Microsoft Ancillary Function Driver Could Allow Elevation of Privilege - Windows Server 2003 SP1/SP2 (Japanese) Severity: Important Fixlet ID: 806605 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-066.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft Ancillary Function Driver. A local attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-066: Vulnerability in the Microsoft Ancillary Function Driver Could Allow Elevation of Privilege - Windows Server 2003 SP1/SP2 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 806606 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-066.mspx *************************************************************** Title: MS08-066: Vulnerability in the Microsoft Ancillary Function Driver Could Allow Elevation of Privilege - Windows Server 2003 Gold/SP2 (x64) (Japanese) Severity: Important Fixlet ID: 806607 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-066.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft Ancillary Function Driver. A local attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-066: Vulnerability in the Microsoft Ancillary Function Driver Could Allow Elevation of Privilege - Windows Server 2003 Gold/SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 806608 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-066.mspx *************************************************************** Title: 956391: Cumulative Security Update for ActiveX - Windows 2000 SP4 (Japanese) Severity: Fixlet ID: 95639101 Fixlet Link: http://www.microsoft.com/technet/security/advisory/956391.mspx Fixlet Description: Microsoft is releasing a new set of ActiveX kill bits with this advisory. This update includes kill bits for Microgaming Download Helper, System Requirements Lab, and PhotoStockPlus Uploader Tool. These kill bits prevent Internet Explorer from loading a number of ActiveX controls identified as security vunerabilities by Microgaming, Husdawg, and PhotoStockPlus. This update also sets the kill bits for ActiveX controls addressed in previous Microsoft Security Bulletins. These kill bits are being set in this update as a defense in depth measure. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: 956391: Cumulative Security Update for ActiveX - Windows 2000 SP4 - CORRUPT PATCH (Japanese) Severity: Fixlet ID: 95639102 Fixlet Link: http://www.microsoft.com/technet/security/advisory/956391.mspx *************************************************************** Title: 956391: Cumulative Security Update for ActiveX - Windows XP SP2/SP3 (Japanese) Severity: Fixlet ID: 95639103 Fixlet Link: http://www.microsoft.com/technet/security/advisory/956391.mspx Fixlet Description: Microsoft is releasing a new set of ActiveX kill bits with this advisory. This update includes kill bits for Microgaming Download Helper, System Requirements Lab, and PhotoStockPlus Uploader Tool. These kill bits prevent Internet Explorer from loading a number of ActiveX controls identified as security vunerabilities by Microgaming, Husdawg, and PhotoStockPlus. This update also sets the kill bits for ActiveX controls addressed in previous Microsoft Security Bulletins. These kill bits are being set in this update as a defense in depth measure. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: 956391: Cumulative Security Update for ActiveX - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese) Severity: Fixlet ID: 95639104 Fixlet Link: http://www.microsoft.com/technet/security/advisory/956391.mspx *************************************************************** Title: 956391: Cumulative Security Update for ActiveX - Windows 2003 SP1/SP2 (Japanese) Severity: Fixlet ID: 95639105 Fixlet Link: http://www.microsoft.com/technet/security/advisory/956391.mspx Fixlet Description: Microsoft is releasing a new set of ActiveX kill bits with this advisory. This update includes kill bits for Microgaming Download Helper, System Requirements Lab, and PhotoStockPlus Uploader Tool. These kill bits prevent Internet Explorer from loading a number of ActiveX controls identified as security vunerabilities by Microgaming, Husdawg, and PhotoStockPlus. This update also sets the kill bits for ActiveX controls addressed in previous Microsoft Security Bulletins. These kill bits are being set in this update as a defense in depth measure. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: 956391: Cumulative Security Update for ActiveX - Windows 2003 SP1/SP2 - CORRUPT PATCH (Japanese) Severity: Fixlet ID: 95639106 Fixlet Link: http://www.microsoft.com/technet/security/advisory/956391.mspx *************************************************************** Title: 956391: Cumulative Security Update for ActiveX - Windows Vista Gold/SP1 (Japanese) Severity: Fixlet ID: 95639107 Fixlet Link: http://www.microsoft.com/technet/security/advisory/956391.mspx Fixlet Description: Microsoft is releasing a new set of ActiveX kill bits with this advisory. This update includes kill bits for Microgaming Download Helper, System Requirements Lab, and PhotoStockPlus Uploader Tool. These kill bits prevent Internet Explorer from loading a number of ActiveX controls identified as security vunerabilities by Microgaming, Husdawg, and PhotoStockPlus. This update also sets the kill bits for ActiveX controls addressed in previous Microsoft Security Bulletins. These kill bits are being set in this update as a defense in depth measure. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: One of the kill bits mentioned in the Security Bulletin ({0002E510-0000-0000-C000-000000000046}) is enabled by default on Windows Vista and will not be set by the update on these systems. As such, systems with this kill bit disabled will fail for action 1 below. Action 2 will explicitly set this kill bit in addition to using the Microsoft patch.Note: There is no default action for this Fixlet message because it has multiple actions, none of which is clearly recommended over the others. For more information on default actions, see BigFix KB #474. *************************************************************** Title: 956391: Cumulative Security Update for ActiveX - Windows Server 2008 (Japanese) Severity: Fixlet ID: 95639109 Fixlet Link: http://www.microsoft.com/technet/security/advisory/956391.mspx Fixlet Description: Microsoft is releasing a new set of ActiveX kill bits with this advisory. This update includes kill bits for Microgaming Download Helper, System Requirements Lab, and PhotoStockPlus Uploader Tool. These kill bits prevent Internet Explorer from loading a number of ActiveX controls identified as security vunerabilities by Microgaming, Husdawg, and PhotoStockPlus. This update also sets the kill bits for ActiveX controls addressed in previous Microsoft Security Bulletins. These kill bits are being set in this update as a defense in depth measure. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: One of the kill bits mentioned in the Security Bulletin ({0002E510-0000-0000-C000-000000000046}) is enabled by default on Windows 2008 and will not be set by the update on these systems. As such, systems with this kill bit disabled will fail for action 1 below. Action 2 will explicitly set this kill bit in addition to using the Microsoft patch. *************************************************************** Title: 956391: Cumulative Security Update for ActiveX - Windows XP Gold/SP2 (x64) (Japanese) Severity: Fixlet ID: 95639111 Fixlet Link: http://www.microsoft.com/technet/security/advisory/956391.mspx Fixlet Description: Microsoft is releasing a new set of ActiveX kill bits with this advisory. This update includes kill bits for Microgaming Download Helper, System Requirements Lab, and PhotoStockPlus Uploader Tool. These kill bits prevent Internet Explorer from loading a number of ActiveX controls identified as security vunerabilities by Microgaming, Husdawg, and PhotoStockPlus. This update also sets the kill bits for ActiveX controls addressed in previous Microsoft Security Bulletins. These kill bits are being set in this update as a defense in depth measure. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: 956391: Cumulative Security Update for ActiveX - Windows XP Gold/SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Fixlet ID: 95639112 Fixlet Link: http://www.microsoft.com/technet/security/advisory/956391.mspx *************************************************************** Title: 956391: Cumulative Security Update for ActiveX - Windows Server 2003 Gold/SP2 (x64) (Japanese) Severity: Fixlet ID: 95639113 Fixlet Link: http://www.microsoft.com/technet/security/advisory/956391.mspx Fixlet Description: Microsoft is releasing a new set of ActiveX kill bits with this advisory. This update includes kill bits for Microgaming Download Helper, System Requirements Lab, and PhotoStockPlus Uploader Tool. These kill bits prevent Internet Explorer from loading a number of ActiveX controls identified as security vunerabilities by Microgaming, Husdawg, and PhotoStockPlus. This update also sets the kill bits for ActiveX controls addressed in previous Microsoft Security Bulletins. These kill bits are being set in this update as a defense in depth measure. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: 956391: Cumulative Security Update for ActiveX - Windows Server 2003 Gold/SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Fixlet ID: 95639114 Fixlet Link: http://www.microsoft.com/technet/security/advisory/956391.mspx *************************************************************** Title: 956391: Cumulative Security Update for ActiveX - Windows Vista Gold/SP1 (x64) (Japanese) Severity: Fixlet ID: 95639115 Fixlet Link: http://www.microsoft.com/technet/security/advisory/956391.mspx Fixlet Description: Microsoft is releasing a new set of ActiveX kill bits with this advisory. This update includes kill bits for Microgaming Download Helper, System Requirements Lab, and PhotoStockPlus Uploader Tool. These kill bits prevent Internet Explorer from loading a number of ActiveX controls identified as security vunerabilities by Microgaming, Husdawg, and PhotoStockPlus. This update also sets the kill bits for ActiveX controls addressed in previous Microsoft Security Bulletins. These kill bits are being set in this update as a defense in depth measure. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: One of the kill bits mentioned in the Security Bulletin ({0002E510-0000-0000-C000-000000000046}) is enabled by default on Windows Vista and will not be set by the update on these systems. As such, systems with this kill bit disabled will fail for action 1 below. Action 2 will explicitly set this kill bit in addition to using the Microsoft patch. *************************************************************** Title: 956391: Cumulative Security Update for ActiveX - Windows Server 2008 (x64) (Japanese) Severity: Fixlet ID: 95639117 Fixlet Link: http://www.microsoft.com/technet/security/advisory/956391.mspx Fixlet Description: Microsoft is releasing a new set of ActiveX kill bits with this advisory. This update includes kill bits for Microgaming Download Helper, System Requirements Lab, and PhotoStockPlus Uploader Tool. These kill bits prevent Internet Explorer from loading a number of ActiveX controls identified as security vunerabilities by Microgaming, Husdawg, and PhotoStockPlus. This update also sets the kill bits for ActiveX controls addressed in previous Microsoft Security Bulletins. These kill bits are being set in this update as a defense in depth measure. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: One of the kill bits mentioned in the Security Bulletin ({0002E510-0000-0000-C000-000000000046}) is enabled by default on Windows 2008 and will not be set by the update on these systems. As such, systems with this kill bit disabled will fail for action 1 below. Action 2 will explicitly set this kill bit in addition to using the Microsoft patch.