Fixlet Site - PatchesforWindows(Japanese) Current Version: 261 Published: Wed, 14 Jan 2009 18:32:34 GMT New Fixlets: ============ *************************************************************** Title: MS08-076: Vulnerabilities in Windows Media Components Could Allow Remote Code Execution - Windows Media Format Runtime 9.0/9.5/11 - Windows XP SP2 (v2, re-released 1/13/2009) (Japanese) Severity: Important Fixlet ID: 807645 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-076.mspx Fixlet Description: Important Note: This patch was re-released on January 13, 2009 to address known issues with the original patch. Customers who have successfully updated their systems do not need to reinstall this update. Microsoft has released a security update that resolves two privately reported vulnerabilities in the following Windows Media components: Windows Media Player, Windows Media Format Runtime, and Windows Media Services. The most severe vulnerability could allow remote code execution. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-076: Vulnerabilities in Windows Media Components Could Allow Remote Code Execution - Windows Media Format Runtime 9.0/9.5/11 - Windows XP SP2 (v2, re-released 1/13/2009) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 807646 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-076.mspx *************************************************************** Title: MS08-076: Vulnerabilities in Windows Media Components Could Allow Remote Code Execution - Windows Media Format Runtime 9.0/9.5/11 - Windows XP SP3 (v2, re-released 1/13/2009) (Japanese) Severity: Important Fixlet ID: 807647 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-076.mspx Fixlet Description: Important Note: This patch was re-released on January 13, 2009 to address known issues with the original patch. Customers who have successfully updated their systems do not need to reinstall this update. Microsoft has released a security update that resolves two privately reported vulnerabilities in the following Windows Media components: Windows Media Player, Windows Media Format Runtime, and Windows Media Services. The most severe vulnerability could allow remote code execution. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS08-076: Vulnerabilities in Windows Media Components Could Allow Remote Code Execution - Windows Media Format Runtime 9.0/9.5/11 - Windows XP SP3 (v2, re-released 1/13/2009) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 807648 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS08-076.mspx *************************************************************** Title: MS09-001: Vulnerabilities in SMB Could Allow Remote Code Execution - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 900101 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-001.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Server Message Block (SMB) Protocol. The vulnerabilities could allow remote code execution on affected systems. An attacker who successfully exploited these vulnerabilities could install programs; view, change, or delete data; or create new accounts with full user rights. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-001: Vulnerabilities in SMB Could Allow Remote Code Execution - Windows 2000 SP4 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 900102 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-001.mspx *************************************************************** Title: MS09-001: Vulnerabilities in SMB Could Allow Remote Code Execution - Windows XP SP2/SP3 (Japanese) Severity: Critical Fixlet ID: 900103 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-001.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Server Message Block (SMB) Protocol. The vulnerabilities could allow remote code execution on affected systems. An attacker who successfully exploited these vulnerabilities could install programs; view, change, or delete data; or create new accounts with full user rights. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-001: Vulnerabilities in SMB Could Allow Remote Code Execution - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 900104 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-001.mspx *************************************************************** Title: MS09-001: Vulnerabilities in SMB Could Allow Remote Code Execution - Windows XP Gold/SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 900105 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-001.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Server Message Block (SMB) Protocol. The vulnerabilities could allow remote code execution on affected systems. An attacker who successfully exploited these vulnerabilities could install programs; view, change, or delete data; or create new accounts with full user rights. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-001: Vulnerabilities in SMB Could Allow Remote Code Execution - Windows XP Gold/SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 900106 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-001.mspx *************************************************************** Title: MS09-001: Vulnerabilities in SMB Could Allow Remote Code Execution - Windows Server 2003 SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 900107 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-001.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Server Message Block (SMB) Protocol. The vulnerabilities could allow remote code execution on affected systems. An attacker who successfully exploited these vulnerabilities could install programs; view, change, or delete data; or create new accounts with full user rights. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-001: Vulnerabilities in SMB Could Allow Remote Code Execution - Windows Server 2003 SP1/SP2 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 900108 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-001.mspx *************************************************************** Title: MS09-001: Vulnerabilities in SMB Could Allow Remote Code Execution - Windows Server 2003 Gold/SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 900109 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-001.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Server Message Block (SMB) Protocol. The vulnerabilities could allow remote code execution on affected systems. An attacker who successfully exploited these vulnerabilities could install programs; view, change, or delete data; or create new accounts with full user rights. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-001: Vulnerabilities in SMB Could Allow Remote Code Execution - Windows Server 2003 Gold/SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 900110 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-001.mspx *************************************************************** Title: MS09-001: Vulnerabilities in SMB Could Allow Remote Code Execution - Windows Vista Gold/SP1 (Japanese) Severity: Moderate Fixlet ID: 900111 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-001.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Server Message Block (SMB) Protocol. The vulnerabilities could allow remote code execution on affected systems. An attacker who successfully exploited these vulnerabilities could install programs; view, change, or delete data; or create new accounts with full user rights. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-001: Vulnerabilities in SMB Could Allow Remote Code Execution - Windows Vista Gold/SP1 (x64) (Japanese) Severity: Moderate Fixlet ID: 900113 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-001.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Server Message Block (SMB) Protocol. The vulnerabilities could allow remote code execution on affected systems. An attacker who successfully exploited these vulnerabilities could install programs; view, change, or delete data; or create new accounts with full user rights. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-001: Vulnerabilities in SMB Could Allow Remote Code Execution - Windows Server 2008 (Japanese) Severity: Moderate Fixlet ID: 900115 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-001.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Server Message Block (SMB) Protocol. The vulnerabilities could allow remote code execution on affected systems. An attacker who successfully exploited these vulnerabilities could install programs; view, change, or delete data; or create new accounts with full user rights. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-001: Vulnerabilities in SMB Could Allow Remote Code Execution - Windows Server 2008 (x64) (Japanese) Severity: Moderate Fixlet ID: 900117 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-001.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Server Message Block (SMB) Protocol. The vulnerabilities could allow remote code execution on affected systems. An attacker who successfully exploited these vulnerabilities could install programs; view, change, or delete data; or create new accounts with full user rights. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.