Fixlet Site - PatchesforWindows(Japanese) Current Version: 248 Published: Fri, 24 Oct 2008 01:12:33 GMT New Fixlets: ============ *************************************************************** Title: MS08-067: Vulnerability in Server Service Could Allow Remote Code Execution - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 806701 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Server service. The vulnerability could allow remote code execution if an affected system received a specially crafted RPC request. On Microsoft Windows 2000, Windows XP, and Windows Server 2003 systems, an attacker could exploit this vulnerability without authentication to run arbitrary code. It is possible that this vulnerability could be used in the crafting of a wormable exploit. Firewall best practices and standard default firewall configurations can help protect network resources from attacks that originate outside the enterprise perimeter. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-067: Vulnerability in Server Service Could Allow Remote Code Execution - Windows 2000 SP4 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 806702 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx *************************************************************** Title: MS08-067: Vulnerability in Server Service Could Allow Remote Code Execution - Windows XP SP2/SP3 (Japanese) Severity: Critical Fixlet ID: 806703 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Server service. The vulnerability could allow remote code execution if an affected system received a specially crafted RPC request. On Microsoft Windows 2000, Windows XP, and Windows Server 2003 systems, an attacker could exploit this vulnerability without authentication to run arbitrary code. It is possible that this vulnerability could be used in the crafting of a wormable exploit. Firewall best practices and standard default firewall configurations can help protect network resources from attacks that originate outside the enterprise perimeter. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-067: Vulnerability in Server Service Could Allow Remote Code Execution - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 806704 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx *************************************************************** Title: MS08-067: Vulnerability in Server Service Could Allow Remote Code Execution - Windows XP Gold/SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 806705 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Server service. The vulnerability could allow remote code execution if an affected system received a specially crafted RPC request. On Microsoft Windows 2000, Windows XP, and Windows Server 2003 systems, an attacker could exploit this vulnerability without authentication to run arbitrary code. It is possible that this vulnerability could be used in the crafting of a wormable exploit. Firewall best practices and standard default firewall configurations can help protect network resources from attacks that originate outside the enterprise perimeter. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-067: Vulnerability in Server Service Could Allow Remote Code Execution - Windows XP Gold/SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 806706 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx *************************************************************** Title: MS08-067: Vulnerability in Server Service Could Allow Remote Code Execution - Windows Server 2003 SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 806707 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Server service. The vulnerability could allow remote code execution if an affected system received a specially crafted RPC request. On Microsoft Windows 2000, Windows XP, and Windows Server 2003 systems, an attacker could exploit this vulnerability without authentication to run arbitrary code. It is possible that this vulnerability could be used in the crafting of a wormable exploit. Firewall best practices and standard default firewall configurations can help protect network resources from attacks that originate outside the enterprise perimeter. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-067: Vulnerability in Server Service Could Allow Remote Code Execution - Windows Server 2003 SP1/SP2 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 806708 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx *************************************************************** Title: MS08-067: Vulnerability in Server Service Could Allow Remote Code Execution - Windows Server 2003 Gold/SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 806709 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Server service. The vulnerability could allow remote code execution if an affected system received a specially crafted RPC request. On Microsoft Windows 2000, Windows XP, and Windows Server 2003 systems, an attacker could exploit this vulnerability without authentication to run arbitrary code. It is possible that this vulnerability could be used in the crafting of a wormable exploit. Firewall best practices and standard default firewall configurations can help protect network resources from attacks that originate outside the enterprise perimeter. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-067: Vulnerability in Server Service Could Allow Remote Code Execution - Windows Server 2003 Gold/SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 806710 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx *************************************************************** Title: MS08-067: Vulnerability in Server Service Could Allow Remote Code Execution - Windows Vista Gold/SP1 (Japanese) Severity: Important Fixlet ID: 806711 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Server service. The vulnerability could allow remote code execution if an affected system received a specially crafted RPC request. On Microsoft Windows 2000, Windows XP, and Windows Server 2003 systems, an attacker could exploit this vulnerability without authentication to run arbitrary code. It is possible that this vulnerability could be used in the crafting of a wormable exploit. Firewall best practices and standard default firewall configurations can help protect network resources from attacks that originate outside the enterprise perimeter. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-067: Vulnerability in Server Service Could Allow Remote Code Execution - Windows Vista Gold/SP1 (x64) (Japanese) Severity: Important Fixlet ID: 806713 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Server service. The vulnerability could allow remote code execution if an affected system received a specially crafted RPC request. On Microsoft Windows 2000, Windows XP, and Windows Server 2003 systems, an attacker could exploit this vulnerability without authentication to run arbitrary code. It is possible that this vulnerability could be used in the crafting of a wormable exploit. Firewall best practices and standard default firewall configurations can help protect network resources from attacks that originate outside the enterprise perimeter. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-067: Vulnerability in Server Service Could Allow Remote Code Execution - Windows Server 2008 (Japanese) Severity: Important Fixlet ID: 806715 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Server service. The vulnerability could allow remote code execution if an affected system received a specially crafted RPC request. On Microsoft Windows 2000, Windows XP, and Windows Server 2003 systems, an attacker could exploit this vulnerability without authentication to run arbitrary code. It is possible that this vulnerability could be used in the crafting of a wormable exploit. Firewall best practices and standard default firewall configurations can help protect network resources from attacks that originate outside the enterprise perimeter. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS08-067: Vulnerability in Server Service Could Allow Remote Code Execution - Windows Server 2008 (x64) (Japanese) Severity: Important Fixlet ID: 806717 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Server service. The vulnerability could allow remote code execution if an affected system received a specially crafted RPC request. On Microsoft Windows 2000, Windows XP, and Windows Server 2003 systems, an attacker could exploit this vulnerability without authentication to run arbitrary code. It is possible that this vulnerability could be used in the crafting of a wormable exploit. Firewall best practices and standard default firewall configurations can help protect network resources from attacks that originate outside the enterprise perimeter. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.