Fixlet Site - PatchesforWindows(Japanese) Current Version: 255 Published: Sat, 13 Dec 2008 02:54:14 GMT New Fixlets: ============ *************************************************************** Title: MS07-017: Vulnerabilities in GDI Could Allow Remote Code Execution - Windows Server 2003 (v2, re-released 12/9/2008) (Japanese) Severity: Critical Fixlet ID: 701713 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-017.mspx Fixlet Description: Important Note: This patch was re-released on December 9, 2008 to address minor issues unrelated to the stability of the update or the security of the intended target systems. The action below deploys the revised version of the patch. Customers who have already successfully applied this update need not take any action. Microsoft has released a patch resolving several newly discovered, publicly disclosed and privately reported vulnerabilities as well as additional issues discovered through internal investigations. If a user is logged on with administrative user rights, an attacker who successfully exploited the most severe of these vulnerabilities could take complete control of the affected workstation. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this patch, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are several known issues associated with the installation of this patch. See the Caveats section of the security bulletin for more information. *************************************************************** Title: MS07-017: Vulnerabilities in GDI Could Allow Remote Code Execution - Windows Server 2003 (v2, re-released 12/9/2008) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 701714 Fixlet Link: http://www.microsoft.com/technet/security/bulletin/MS07-017.mspx *************************************************************** Title: MS08-052: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Gold/SP1 (Japanese) Severity: Important Fixlet ID: 805293 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-052.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows GDI+. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-052: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Expression Web 1, 2 (Japanese) Severity: Important Fixlet ID: 805295 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-052.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows GDI+. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-052: Vulnerabilities in GDI+ Could Allow Remote Code Execution - Groove 2007 Gold/SP1 (Japanese) Severity: Important Fixlet ID: 805297 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-052.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Windows GDI+. These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-070: Vulnerabilities in Visual Basic 6.0 Runtime Extended Files (ActiveX Controls) Could Allow Remote Code Execution - Visual Basic 6.0 SP6 (Japanese) Severity: Critical Fixlet ID: 807006 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-070.mspx Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability in the ActiveX controls for the Microsoft Visual Basic 6.0 Runtime Extended Files. These vulnerabilities could allow remote code execution if a user browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-070: Vulnerabilities in Visual Basic 6.0 Runtime Extended Files (ActiveX Controls) Could Allow Remote Code Execution - Visual Basic 6.0 SP6 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 807008 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-070.mspx *************************************************************** Title: MS08-070: Vulnerabilities in Visual Basic 6.0 Runtime Extended Files (ActiveX Controls) Could Allow Remote Code Execution - Visual Studio .NET 2002 SP1 (Japanese) Severity: Critical Fixlet ID: 807011 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-070.mspx Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability in the ActiveX controls for the Microsoft Visual Basic 6.0 Runtime Extended Files. These vulnerabilities could allow remote code execution if a user browses to a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-070: Vulnerabilities in Visual Basic 6.0 Runtime Extended Files (ActiveX Controls) Could Allow Remote Code Execution - Visual Studio .NET 2002 SP1 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 807012 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-070.mspx *************************************************************** Title: MS08-070: Vulnerabilities in Visual Basic 6.0 Runtime Extended Files (ActiveX Controls) Could Allow Remote Code Execution - Visual Studio .NET 2003 SP1 (Japanese) Severity: Critical Fixlet ID: 807016 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-070.mspx Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability in the ActiveX controls for the Microsoft Visual Basic 6.0 Runtime Extended Files. These vulnerabilities could allow remote code execution if a user browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-070: Vulnerabilities in Visual Basic 6.0 Runtime Extended Files (ActiveX Controls) Could Allow Remote Code Execution - Visual Studio .NET 2003 SP1 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 807017 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-070.mspx *************************************************************** Title: MS08-070: Vulnerabilities in Visual Basic 6.0 Runtime Extended Files (ActiveX Controls) Could Allow Remote Code Execution - Project 2003 SP3 (Japanese) Severity: Critical Fixlet ID: 807041 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-070.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability in the ActiveX controls for the Microsoft Visual Basic 6.0 Runtime Extended Files. These vulnerabilities could allow remote code execution if a user browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-070: Vulnerabilities in Visual Basic 6.0 Runtime Extended Files (ActiveX Controls) Could Allow Remote Code Execution - Project 2007 Gold/SP1 (Japanese) Severity: Critical Fixlet ID: 807046 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-070.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities and one publicly disclosed vulnerability in the ActiveX controls for the Microsoft Visual Basic 6.0 Runtime Extended Files. These vulnerabilities could allow remote code execution if a user browsed a Web site that contains specially crafted content. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-071: Vulnerabilities in GDI Could Allow Remote Code Execution - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 807101 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-071.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in GDI. Exploitation of either of these vulnerabilities could allow remote code execution if a user opens a specially crafted WMF image file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-071: Vulnerabilities in GDI Could Allow Remote Code Execution - Windows 2000 SP4 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 807102 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-071.mspx *************************************************************** Title: MS08-071: Vulnerabilities in GDI Could Allow Remote Code Execution - Windows XP SP2/SP3 (Japanese) Severity: Critical Fixlet ID: 807103 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-071.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in GDI. Exploitation of either of these vulnerabilities could allow remote code execution if a user opens a specially crafted WMF image file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-071: Vulnerabilities in GDI Could Allow Remote Code Execution - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 807104 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-071.mspx *************************************************************** Title: MS08-071: Vulnerabilities in GDI Could Allow Remote Code Execution - Windows XP Gold/SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 807105 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-071.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in GDI. Exploitation of either of these vulnerabilities could allow remote code execution if a user opens a specially crafted WMF image file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-071: Vulnerabilities in GDI Could Allow Remote Code Execution - Windows XP Gold/SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 807106 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-071.mspx *************************************************************** Title: MS08-071: Vulnerabilities in GDI Could Allow Remote Code Execution - Windows Server 2003 SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 807107 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-071.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in GDI. Exploitation of either of these vulnerabilities could allow remote code execution if a user opens a specially crafted WMF image file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-071: Vulnerabilities in GDI Could Allow Remote Code Execution - Windows Server 2003 SP1/SP2 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 807108 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-071.mspx *************************************************************** Title: MS08-071: Vulnerabilities in GDI Could Allow Remote Code Execution - Windows Server 2003 Gold/SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 807109 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-071.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in GDI. Exploitation of either of these vulnerabilities could allow remote code execution if a user opens a specially crafted WMF image file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-071: Vulnerabilities in GDI Could Allow Remote Code Execution - Windows Server 2003 Gold/SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 807110 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-071.mspx *************************************************************** Title: MS08-071: Vulnerabilities in GDI Could Allow Remote Code Execution - Windows Vista Gold/SP1 (Japanese) Severity: Critical Fixlet ID: 807111 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-071.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in GDI. Exploitation of either of these vulnerabilities could allow remote code execution if a user opens a specially crafted WMF image file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-071: Vulnerabilities in GDI Could Allow Remote Code Execution - Windows Vista Gold/SP1 (x64) (Japanese) Severity: Critical Fixlet ID: 807113 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-071.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in GDI. Exploitation of either of these vulnerabilities could allow remote code execution if a user opens a specially crafted WMF image file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-071: Vulnerabilities in GDI Could Allow Remote Code Execution - Windows Server 2008 (Japanese) Severity: Critical Fixlet ID: 807115 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-071.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in GDI. Exploitation of either of these vulnerabilities could allow remote code execution if a user opens a specially crafted WMF image file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-071: Vulnerabilities in GDI Could Allow Remote Code Execution - Windows Server 2008 (x64) (Japanese) Severity: Critical Fixlet ID: 807117 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-071.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in GDI. Exploitation of either of these vulnerabilities could allow remote code execution if a user opens a specially crafted WMF image file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-072: Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution - Office XP SP3 (Local/Network Install) (Japanese) Severity: Important Fixlet ID: 807211 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-072.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves eight privately reported vulnerabilities in Microsoft Office Word and Microsoft Office Outlook that could allow remote code execution if a user opens a specially crafted Word or Rich Text Format (RTF) file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-072: Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution - Office XP SP3 (Administrative Install) (Japanese) Severity: Important Fixlet ID: 807213 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-072.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves eight privately reported vulnerabilities in Microsoft Office Word and Microsoft Office Outlook that could allow remote code execution if a user opens a specially crafted Word or Rich Text Format (RTF) file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-072: Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution - Office 2003 SP3 (Local/Network Install) (Japanese) Severity: Important Fixlet ID: 807216 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-072.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves eight privately reported vulnerabilities in Microsoft Office Word and Microsoft Office Outlook that could allow remote code execution if a user opens a specially crafted Word or Rich Text Format (RTF) file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-072: Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution - Office 2003 SP3 (Administrative Install) (Japanese) Severity: Important Fixlet ID: 807218 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-072.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves eight privately reported vulnerabilities in Microsoft Office Word and Microsoft Office Outlook that could allow remote code execution if a user opens a specially crafted Word or Rich Text Format (RTF) file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-072: Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution - Office 2007 Gold/SP1 (Japanese) Severity: Important Fixlet ID: 807221 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-072.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves eight privately reported vulnerabilities in Microsoft Office Word and Microsoft Office Outlook that could allow remote code execution if a user opens a specially crafted Word or Rich Text Format (RTF) file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-072: Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution - Outlook 2007 Gold/SP1 (Japanese) Severity: Critical Fixlet ID: 807222 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-072.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves eight privately reported vulnerabilities in Microsoft Office Word and Microsoft Office Outlook that could allow remote code execution if a user opens a specially crafted Word or Rich Text Format (RTF) file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-072: Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution - Word Viewer 2003 SP3 (Japanese) Severity: Important Fixlet ID: 807226 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-072.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves eight privately reported vulnerabilities in Microsoft Office Word and Microsoft Office Outlook that could allow remote code execution if a user opens a specially crafted Word or Rich Text Format (RTF) file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-072: Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution - Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Gold/SP1 (Japanese) Severity: Important Fixlet ID: 807236 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-072.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves eight privately reported vulnerabilities in Microsoft Office Word and Microsoft Office Outlook that could allow remote code execution if a user opens a specially crafted Word or Rich Text Format (RTF) file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-073: Cumulative Security Update for Internet Explorer - IE 5.01 - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 807301 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-073.mspx Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-073: Cumulative Security Update for Internet Explorer - IE 5.01 - Windows 2000 SP4 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 807302 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-073.mspx *************************************************************** Title: MS08-073: Cumulative Security Update for Internet Explorer - IE 6 SP1 - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 807303 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-073.mspx Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-073: Cumulative Security Update for Internet Explorer - IE 6 SP1 - Windows 2000 SP4 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 807304 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-073.mspx *************************************************************** Title: MS08-073: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2/SP3 (Japanese) Severity: Critical Fixlet ID: 807305 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-073.mspx Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-073: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 807306 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-073.mspx *************************************************************** Title: MS08-073: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP Gold/SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 807307 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-073.mspx Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-073: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP Gold/SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 807308 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-073.mspx *************************************************************** Title: MS08-073: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP1/SP2 (Japanese) Severity: Moderate Fixlet ID: 807309 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-073.mspx Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-073: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP1/SP2 - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 807310 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-073.mspx *************************************************************** Title: MS08-073: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 Gold/SP2 (x64) (Japanese) Severity: Moderate Fixlet ID: 807311 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-073.mspx Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-073: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 Gold/SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 807312 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-073.mspx *************************************************************** Title: MS08-073: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2/SP3 (Japanese) Severity: Critical Fixlet ID: 807313 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-073.mspx Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-073: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 807314 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-073.mspx *************************************************************** Title: MS08-073: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP Gold/SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 807315 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-073.mspx Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-073: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP Gold/SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 807316 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-073.mspx *************************************************************** Title: MS08-073: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 807317 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-073.mspx Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-073: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP1/SP2 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 807318 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-073.mspx *************************************************************** Title: MS08-073: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 Gold/SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 807319 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-073.mspx Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-073: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 Gold/SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 807320 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-073.mspx *************************************************************** Title: MS08-073: Cumulative Security Update for Internet Explorer - IE 7 - Windows Vista Gold/SP1 (Japanese) Severity: Critical Fixlet ID: 807321 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-073.mspx Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-073: Cumulative Security Update for Internet Explorer - IE 7 - Windows Vista Gold/SP1(x64) (Japanese) Severity: Critical Fixlet ID: 807323 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-073.mspx Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-073: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2008 (Japanese) Severity: Critical Fixlet ID: 807325 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-073.mspx Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-073: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2008 (x64) (Japanese) Severity: Critical Fixlet ID: 807327 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-073.mspx Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-074: Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution - Office XP SP3 (Network/Local Install) (Japanese) Severity: Important Fixlet ID: 807406 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-074.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Office Excel that could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-074: Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution - Office XP SP3 (Administrative Install) (Japanese) Severity: Important Fixlet ID: 807408 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-074.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Office Excel that could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-074: Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution - Office 2003 SP3 (Network/Local Install) (Japanese) Severity: Important Fixlet ID: 807411 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-074.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Office Excel that could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-074: Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution - Office 2003 SP3 (Administrative Install) (Japanese) Severity: Important Fixlet ID: 807413 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-074.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Office Excel that could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-074: Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution - Office 2007 Gold/SP1 (Japanese) Severity: Important Fixlet ID: 807416 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-074.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Office Excel that could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-074: Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution - Excel Viewer 2003 SP3 (Japanese) Severity: Important Fixlet ID: 807426 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-074.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Office Excel that could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-074: Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution - Excel Viewer 2007 (Japanese) Severity: Important Fixlet ID: 807436 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-074.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Office Excel that could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-074: Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution - Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Gold/SP1 (Japanese) Severity: Important Fixlet ID: 807441 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-074.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Office Excel that could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-075: Vulnerabilities in Windows Search Could Allow Remote Code Execution - Windows Search - Windows Vista (Japanese) Severity: Important Fixlet ID: 807501 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-075.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Search. These vulnerabilities could allow remote code execution if a user opens and saves a specially crafted saved-search file within Windows Explorer or if a user clicks a specially crafted search URL. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-075: Vulnerabilities in Windows Search Could Allow Remote Code Execution - Windows Explorer - Windows Vista (Japanese) Severity: Critical Fixlet ID: 807503 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-075.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Search. These vulnerabilities could allow remote code execution if a user opens and saves a specially crafted saved-search file within Windows Explorer or if a user clicks a specially crafted search URL. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-075: Vulnerabilities in Windows Search Could Allow Remote Code Execution - Windows Search - Windows Vista (x64) (Japanese) Severity: Important Fixlet ID: 807505 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-075.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Search. These vulnerabilities could allow remote code execution if a user opens and saves a specially crafted saved-search file within Windows Explorer or if a user clicks a specially crafted search URL. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-075: Vulnerabilities in Windows Search Could Allow Remote Code Execution - Windows Explorer - Windows Vista (x64) (Japanese) Severity: Critical Fixlet ID: 807507 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-075.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Search. These vulnerabilities could allow remote code execution if a user opens and saves a specially crafted saved-search file within Windows Explorer or if a user clicks a specially crafted search URL. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-075: Vulnerabilities in Windows Search Could Allow Remote Code Execution - Windows Search - Windows Server 2008 (Japanese) Severity: Important Fixlet ID: 807509 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-075.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Search. These vulnerabilities could allow remote code execution if a user opens and saves a specially crafted saved-search file within Windows Explorer or if a user clicks a specially crafted search URL. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-075: Vulnerabilities in Windows Search Could Allow Remote Code Execution - Windows Explorer - Windows Server 2008 (Japanese) Severity: Critical Fixlet ID: 807511 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-075.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Search. These vulnerabilities could allow remote code execution if a user opens and saves a specially crafted saved-search file within Windows Explorer or if a user clicks a specially crafted search URL. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-075: Vulnerabilities in Windows Search Could Allow Remote Code Execution - Windows Search - Windows Server 2008 (x64) (Japanese) Severity: Important Fixlet ID: 807513 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-075.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Search. These vulnerabilities could allow remote code execution if a user opens and saves a specially crafted saved-search file within Windows Explorer or if a user clicks a specially crafted search URL. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-075: Vulnerabilities in Windows Search Could Allow Remote Code Execution - Windows Explorer - Windows Server 2008 (x64) (Japanese) Severity: Critical Fixlet ID: 807515 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-075.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Search. These vulnerabilities could allow remote code execution if a user opens and saves a specially crafted saved-search file within Windows Explorer or if a user clicks a specially crafted search URL. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-076: Vulnerabilities in Windows Media Components Could Allow Remote Code Execution - Windows Media Player 6.4 - Windows 2000 SP4 (Japanese) Severity: Important Fixlet ID: 807601 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-076.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in the following Windows Media components: Windows Media Player, Windows Media Format Runtime, and Windows Media Services. The most severe vulnerability could allow remote code execution. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-076: Vulnerabilities in Windows Media Components Could Allow Remote Code Execution - Windows Media Player 6.4 - Windows 2000 SP4 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 807602 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-076.mspx *************************************************************** Title: MS08-076: Vulnerabilities in Windows Media Components Could Allow Remote Code Execution - Windows Media Player 6.4 - Windows XP SP2/SP3 (Japanese) Severity: Important Fixlet ID: 807603 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-076.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in the following Windows Media components: Windows Media Player, Windows Media Format Runtime, and Windows Media Services. The most severe vulnerability could allow remote code execution. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-076: Vulnerabilities in Windows Media Components Could Allow Remote Code Execution - Windows Media Player 6.4 - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 807604 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-076.mspx *************************************************************** Title: MS08-076: Vulnerabilities in Windows Media Components Could Allow Remote Code Execution - Windows Media Player 6.4 - Windows XP Gold/SP2 (x64) (Japanese) Severity: Important Fixlet ID: 807605 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-076.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in the following Windows Media components: Windows Media Player, Windows Media Format Runtime, and Windows Media Services. The most severe vulnerability could allow remote code execution. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-076: Vulnerabilities in Windows Media Components Could Allow Remote Code Execution - Windows Media Player 6.4 - Windows XP Gold/SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 807606 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-076.mspx *************************************************************** Title: MS08-076: Vulnerabilities in Windows Media Components Could Allow Remote Code Execution - Windows Media Player 6.4 - Windows Server 2003 SP1/SP2 (Japanese) Severity: Important Fixlet ID: 807607 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-076.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in the following Windows Media components: Windows Media Player, Windows Media Format Runtime, and Windows Media Services. The most severe vulnerability could allow remote code execution. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-076: Vulnerabilities in Windows Media Components Could Allow Remote Code Execution - Windows Media Player 6.4 - Windows Server 2003 SP1/SP2 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 807608 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-076.mspx *************************************************************** Title: MS08-076: Vulnerabilities in Windows Media Components Could Allow Remote Code Execution - Windows Media Player 6.4 - Windows Server 2003 Gold/SP2 (x64) (Japanese) Severity: Important Fixlet ID: 807609 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-076.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in the following Windows Media components: Windows Media Player, Windows Media Format Runtime, and Windows Media Services. The most severe vulnerability could allow remote code execution. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-076: Vulnerabilities in Windows Media Components Could Allow Remote Code Execution - Windows Media Player 6.4 - Windows Server 2003 Gold/SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 807610 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-076.mspx *************************************************************** Title: MS08-076: Vulnerabilities in Windows Media Components Could Allow Remote Code Execution - Windows Media Format Runtime 7.1/9.0 - Windows 2000 SP4 (Japanese) Severity: Important Fixlet ID: 807611 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-076.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in the following Windows Media components: Windows Media Player, Windows Media Format Runtime, and Windows Media Services. The most severe vulnerability could allow remote code execution. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-076: Vulnerabilities in Windows Media Components Could Allow Remote Code Execution - Windows Media Format Runtime 7.1/9.0 - Windows 2000 SP4 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 807612 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-076.mspx *************************************************************** Title: MS08-076: Vulnerabilities in Windows Media Components Could Allow Remote Code Execution - Windows Media Format Runtime 9.0/9.5/11 - Windows XP SP2 (Japanese) Severity: Important Fixlet ID: 807613 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-076.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in the following Windows Media components: Windows Media Player, Windows Media Format Runtime, and Windows Media Services. The most severe vulnerability could allow remote code execution. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-076: Vulnerabilities in Windows Media Components Could Allow Remote Code Execution - Windows Media Format Runtime 9.0/9.5/11 - Windows XP SP2 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 807614 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-076.mspx *************************************************************** Title: MS08-076: Vulnerabilities in Windows Media Components Could Allow Remote Code Execution - Windows Media Format Runtime 9.0/9.5/11 - Windows XP SP3 (Japanese) Severity: Important Fixlet ID: 807615 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-076.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in the following Windows Media components: Windows Media Player, Windows Media Format Runtime, and Windows Media Services. The most severe vulnerability could allow remote code execution. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-076: Vulnerabilities in Windows Media Components Could Allow Remote Code Execution - Windows Media Format Runtime 9.0/9.5/11 - Windows XP SP3 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 807616 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-076.mspx *************************************************************** Title: MS08-076: Vulnerabilities in Windows Media Components Could Allow Remote Code Execution - Windows Media Format Runtime 9.5 - Windows XP Gold/SP2 (x64) (Japanese) Severity: Important Fixlet ID: 807617 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-076.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in the following Windows Media components: Windows Media Player, Windows Media Format Runtime, and Windows Media Services. The most severe vulnerability could allow remote code execution. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-076: Vulnerabilities in Windows Media Components Could Allow Remote Code Execution - Windows Media Format Runtime 9.5 - Windows XP Gold/SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 807618 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-076.mspx *************************************************************** Title: MS08-076: Vulnerabilities in Windows Media Components Could Allow Remote Code Execution - Windows Media Format Runtime 9.5 x64 Edition - Windows XP/2003 (x64) (Japanese) Severity: Important Fixlet ID: 807619 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-076.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in the following Windows Media components: Windows Media Player, Windows Media Format Runtime, and Windows Media Services. The most severe vulnerability could allow remote code execution. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-076: Vulnerabilities in Windows Media Components Could Allow Remote Code Execution - Windows Media Format Runtime 9.5 x64 Edition - Windows XP/2003 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 807620 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-076.mspx *************************************************************** Title: MS08-076: Vulnerabilities in Windows Media Components Could Allow Remote Code Execution - Windows Media Format Runtime 11 Edition - Windows XP Gold/SP2 (x64) (Japanese) Severity: Important Fixlet ID: 807621 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-076.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in the following Windows Media components: Windows Media Player, Windows Media Format Runtime, and Windows Media Services. The most severe vulnerability could allow remote code execution. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-076: Vulnerabilities in Windows Media Components Could Allow Remote Code Execution - Windows Media Format Runtime 11 Edition - Windows XP Gold/SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 807622 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-076.mspx *************************************************************** Title: MS08-076: Vulnerabilities in Windows Media Components Could Allow Remote Code Execution - Windows Media Format Runtime 9.5 - Windows Server 2003 SP1/SP2 (Japanese) Severity: Important Fixlet ID: 807623 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-076.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in the following Windows Media components: Windows Media Player, Windows Media Format Runtime, and Windows Media Services. The most severe vulnerability could allow remote code execution. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-076: Vulnerabilities in Windows Media Components Could Allow Remote Code Execution - Windows Media Format Runtime 9.5 - Windows Server 2003 SP1/SP2 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 807624 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-076.mspx *************************************************************** Title: MS08-076: Vulnerabilities in Windows Media Components Could Allow Remote Code Execution - Windows Media Format Runtime 9.5 - Windows Server 2003 Gold/SP2 (x64) (Japanese) Severity: Important Fixlet ID: 807625 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-076.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in the following Windows Media components: Windows Media Player, Windows Media Format Runtime, and Windows Media Services. The most severe vulnerability could allow remote code execution. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-076: Vulnerabilities in Windows Media Components Could Allow Remote Code Execution - Windows Media Format Runtime 9.5 - Windows Server 2003 Gold/SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 807626 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-076.mspx *************************************************************** Title: MS08-076: Vulnerabilities in Windows Media Components Could Allow Remote Code Execution - Windows Media Format Runtime 11 - Windows Vista Gold/SP1 (Japanese) Severity: Important Fixlet ID: 807627 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-076.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in the following Windows Media components: Windows Media Player, Windows Media Format Runtime, and Windows Media Services. The most severe vulnerability could allow remote code execution. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-076: Vulnerabilities in Windows Media Components Could Allow Remote Code Execution - Windows Media Format Runtime 11 - Windows Vista Gold/SP1 (x64) (Japanese) Severity: Important Fixlet ID: 807629 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-076.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in the following Windows Media components: Windows Media Player, Windows Media Format Runtime, and Windows Media Services. The most severe vulnerability could allow remote code execution. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-076: Vulnerabilities in Windows Media Components Could Allow Remote Code Execution - Windows Media Format Runtime 11 - Windows Server 2008 (Japanese) Severity: Important Fixlet ID: 807631 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-076.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in the following Windows Media components: Windows Media Player, Windows Media Format Runtime, and Windows Media Services. The most severe vulnerability could allow remote code execution. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-076: Vulnerabilities in Windows Media Components Could Allow Remote Code Execution - Windows Media Format Runtime 11 - Windows Server 2008 (x64) (Japanese) Severity: Important Fixlet ID: 807633 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-076.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in the following Windows Media components: Windows Media Player, Windows Media Format Runtime, and Windows Media Services. The most severe vulnerability could allow remote code execution. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-076: Vulnerabilities in Windows Media Components Could Allow Remote Code Execution - Windows Media Services 4.1- Windows 2000 SP4 (Japanese) Severity: Important Fixlet ID: 807635 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-076.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in the following Windows Media components: Windows Media Player, Windows Media Format Runtime, and Windows Media Services. The most severe vulnerability could allow remote code execution. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-076: Vulnerabilities in Windows Media Components Could Allow Remote Code Execution - Windows Media Services 4.1- Windows 2000 SP4 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 807636 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-076.mspx *************************************************************** Title: MS08-076: Vulnerabilities in Windows Media Components Could Allow Remote Code Execution - Windows Media Services 9 Series - Windows Server 2003 SP1/SP2 (Japanese) Severity: Important Fixlet ID: 807637 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-076.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in the following Windows Media components: Windows Media Player, Windows Media Format Runtime, and Windows Media Services. The most severe vulnerability could allow remote code execution. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-076: Vulnerabilities in Windows Media Components Could Allow Remote Code Execution - Windows Media Services 9 Series - Windows Server 2003 SP1/SP2 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 807638 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-076.mspx *************************************************************** Title: MS08-076: Vulnerabilities in Windows Media Components Could Allow Remote Code Execution - Windows Media Services 9 Series - Windows Server 2003 Gold/SP2 (x64) (Japanese) Severity: Important Fixlet ID: 807639 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-076.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in the following Windows Media components: Windows Media Player, Windows Media Format Runtime, and Windows Media Services. The most severe vulnerability could allow remote code execution. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-076: Vulnerabilities in Windows Media Components Could Allow Remote Code Execution - Windows Media Services 9 Series - Windows Server 2003 Gold/SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 807640 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-076.mspx *************************************************************** Title: MS08-076: Vulnerabilities in Windows Media Components Could Allow Remote Code Execution - Windows Media Services 2008 - Windows Server 2008 (Japanese) Severity: Important Fixlet ID: 807641 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-076.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in the following Windows Media components: Windows Media Player, Windows Media Format Runtime, and Windows Media Services. The most severe vulnerability could allow remote code execution. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-076: Vulnerabilities in Windows Media Components Could Allow Remote Code Execution - Windows Media Services 2008 - Windows Server 2008 (x64) (Japanese) Severity: Important Fixlet ID: 807643 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-076.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in the following Windows Media components: Windows Media Player, Windows Media Format Runtime, and Windows Media Services. The most severe vulnerability could allow remote code execution. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-077: Vulnerability in Microsoft Office SharePoint Server Could Cause Elevation of Privilege - Search Server 2008/SharePoint Server 2007 Gold/SP1 (Japanese) Severity: Important Fixlet ID: 807701 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-077.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability. The vulnerability could allow elevation of privilege if an attacker bypasses authentication by browsing to an administrative URL on a SharePoint site. A successful attack leading to elevation of privilege could result in denial of service or information disclosure After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS08-077: Vulnerability in Microsoft Office SharePoint Server Could Cause Elevation of Privilege - Search Server 2008/SharePoint Server 2007 Gold/SP1 (x64) (Japanese) Severity: Important Fixlet ID: 807703 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-077.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability. The vulnerability could allow elevation of privilege if an attacker bypasses authentication by browsing to an administrative URL on a SharePoint site. A successful attack leading to elevation of privilege could result in denial of service or information disclosure After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.