Fixlet Site - PatchesforWindows(Japanese) Current Version: 266 Published: Sat, 14 Feb 2009 03:24:27 GMT New Fixlets: ============ *************************************************************** Title: MS09-002: Cumulative Security Update for Internet Explorer - IE7 - Windows XP SP2/SP3 (Japanese) Severity: Critical Fixlet ID: 900201 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-002.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-002: Cumulative Security Update for Internet Explorer - IE7 - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 900202 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-002.mspx *************************************************************** Title: MS09-002: Cumulative Security Update for Internet Explorer - IE7 - Windows XP Gold/SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 900203 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-002.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-002: Cumulative Security Update for Internet Explorer - IE7 - Windows XP Gold/SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 900204 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-002.mspx *************************************************************** Title: MS09-002: Cumulative Security Update for Internet Explorer - IE7 - Windows Server 2003 SP1/SP2 (Japanese) Severity: Moderate Fixlet ID: 900205 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-002.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-002: Cumulative Security Update for Internet Explorer - IE7 - Windows Server 2003 SP1/SP2 - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 900206 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-002.mspx *************************************************************** Title: MS09-002: Cumulative Security Update for Internet Explorer - IE7 - Windows Server 2003 Gold/SP2 (x64) (Japanese) Severity: Moderate Fixlet ID: 900207 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-002.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-002: Cumulative Security Update for Internet Explorer - IE7 - Windows Server 2003 Gold/SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 900208 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-002.mspx *************************************************************** Title: MS09-002: Cumulative Security Update for Internet Explorer - IE7 - Windows Vista Gold/SP1 (Japanese) Severity: Critical Fixlet ID: 900209 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-002.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-002: Cumulative Security Update for Internet Explorer - IE7 - Windows Vista Gold/SP1 (x64) (Japanese) Severity: Critical Fixlet ID: 900211 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-002.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-002: Cumulative Security Update for Internet Explorer - IE7 - Windows Server 2008 (Japanese) Severity: Moderate Fixlet ID: 900213 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-002.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-002: Cumulative Security Update for Internet Explorer - IE7 - Windows Server 2008 (x64) (Japanese) Severity: Moderate Fixlet ID: 900215 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-002.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-003: Vulnerabilities in Microsoft Exchange Could Allow Remote Code Execution - Exchange Server 2000 SP3 w/August 2004 Update Rollup (Japanese) Severity: Critical Fixlet ID: 900301 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-003.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Exchange Server. The first vulnerability could allow remote code execution if a specially crafted TNEF message is sent to a Microsoft Exchange Server. An attacker who successfully exploited this vulnerability could take complete control of the affected system with Exchange Server service account privileges. The second vulnerability could allow denial of service if a specially crafted MAPI command is sent to a Microsoft Exchange Server. An attacker who successfully exploited this vulnerability could cause the Microsoft Exchange System Attendant service and other services that use the EMSMDB32 provider to stop responding. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-003: Vulnerabilities in Microsoft Exchange Could Allow Remote Code Execution - Exchange Server 2000 SP3 w/August 2004 Update Rollup - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 900302 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-003.mspx *************************************************************** Title: MS09-003: Vulnerabilities in Microsoft Exchange Could Allow Remote Code Execution - Exchange Server 2003 SP2 (Japanese) Severity: Critical Fixlet ID: 900303 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-003.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Exchange Server. The first vulnerability could allow remote code execution if a specially crafted TNEF message is sent to a Microsoft Exchange Server. An attacker who successfully exploited this vulnerability could take complete control of the affected system with Exchange Server service account privileges. The second vulnerability could allow denial of service if a specially crafted MAPI command is sent to a Microsoft Exchange Server. An attacker who successfully exploited this vulnerability could cause the Microsoft Exchange System Attendant service and other services that use the EMSMDB32 provider to stop responding. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-003: Vulnerabilities in Microsoft Exchange Could Allow Remote Code Execution - Exchange Server 2003 SP2 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 900304 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-003.mspx *************************************************************** Title: MS09-003: Vulnerabilities in Microsoft Exchange Could Allow Remote Code Execution - Exchange Server 2007 SP1 (Japanese) Severity: Critical Fixlet ID: 900305 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-003.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Exchange Server. The first vulnerability could allow remote code execution if a specially crafted TNEF message is sent to a Microsoft Exchange Server. An attacker who successfully exploited this vulnerability could take complete control of the affected system with Exchange Server service account privileges. The second vulnerability could allow denial of service if a specially crafted MAPI command is sent to a Microsoft Exchange Server. An attacker who successfully exploited this vulnerability could cause the Microsoft Exchange System Attendant service and other services that use the EMSMDB32 provider to stop responding. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. Important Note: Microsoft does not support the x86 version of Exchange Server 2007 SP1 for production use. Please take extra care to qualify your installation before deploying this Fixlet message. *************************************************************** Title: MS09-003: Vulnerabilities in Microsoft Exchange Could Allow Remote Code Execution - Exchange Server 2007 SP1 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 900306 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-003.mspx *************************************************************** Title: MS09-003: Vulnerabilities in Microsoft Exchange Could Allow Remote Code Execution - Exchange Server 2007 SP1 (x64) (Japanese) Severity: Critical Fixlet ID: 900307 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-003.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Exchange Server. The first vulnerability could allow remote code execution if a specially crafted TNEF message is sent to a Microsoft Exchange Server. An attacker who successfully exploited this vulnerability could take complete control of the affected system with Exchange Server service account privileges. The second vulnerability could allow denial of service if a specially crafted MAPI command is sent to a Microsoft Exchange Server. An attacker who successfully exploited this vulnerability could cause the Microsoft Exchange System Attendant service and other services that use the EMSMDB32 provider to stop responding. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-003: Vulnerabilities in Microsoft Exchange Could Allow Remote Code Execution - Exchange Server 2007 SP1 (x64) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 900308 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-003.mspx *************************************************************** Title: MS09-004: Vulnerability in Microsoft SQL Server Could Allow Remote Code Execution - SQL Server 2000 Desktop Engine (WMSDE) - Windows Server 2003 SP1/SP2 (Japanese) Severity: Important Fixlet ID: 900401 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-004.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft SQL Server. The vulnerability could allow remote code execution if untrusted users access an affected system or if a SQL injection attack occurs to an affected system. Systems with SQL Server 7.0 Service Pack 4, SQL Server 2005 Service Pack 3, and SQL Server 2008 are not affected by this issue. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: This update will only work on WMSDE installations with a blank SAPWD. Updates on non-blank SAPWD systems will fail and must be completed manually. Important Note: Due to the difficulty involved with distinguishing between instances of MSDE and WMSDE (please see this link for details), the existence of a patchable WMSDE instance can only be determined at runtime. As such, updates to systems with one or more of the applicable products (ADMT, ADS, SharePoint, UDDI, and WSUS) installed on top of a non-WMSDE database will fail silently and the action will report back as failed. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-004: Vulnerability in Microsoft SQL Server Could Allow Remote Code Execution - Windows Internal Database (WYukon) SP2 - Windows Server 2003/2008 (Japanese) Severity: Important Fixlet ID: 900403 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-004.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft SQL Server. The vulnerability could allow remote code execution if untrusted users access an affected system or if a SQL injection attack occurs to an affected system. Systems with SQL Server 7.0 Service Pack 4, SQL Server 2005 Service Pack 3, and SQL Server 2008 are not affected by this issue. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: BigFix testing has indicated that update will not work on stand-alone installations of Windows Internal Database (WYukon). Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-004: Vulnerability in Microsoft SQL Server Could Allow Remote Code Execution - SQL Server 2000 Desktop Engine (WMSDE) - Windows Server 2003 Gold/SP2 (x64) (Japanese) Severity: Important Fixlet ID: 900405 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-004.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft SQL Server. The vulnerability could allow remote code execution if untrusted users access an affected system or if a SQL injection attack occurs to an affected system. Systems with SQL Server 7.0 Service Pack 4, SQL Server 2005 Service Pack 3, and SQL Server 2008 are not affected by this issue. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. Important Note: This update will only work on WMSDE installations with a blank SAPWD. Updates on non-blank SAPWD systems will fail and must be completed manually. Important Note: Due to the difficulty involved with distinguishing between instances of MSDE and WMSDE (please see this link for details), the existence of a patchable WMSDE instance can only be determined at runtime. As such, updates to systems with one or more of the applicable products (ADMT, ADS, SharePoint, UDDI, and WSUS) installed on top of a non-WMSDE database will fail silently and the action will report back as failed. *************************************************************** Title: MS09-004: Vulnerability in Microsoft SQL Server Could Allow Remote Code Execution - Windows Internal Database (WYukon) SP2 - Windows Server 2003/2008 (x64) (Japanese) Severity: Important Fixlet ID: 900407 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-004.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft SQL Server. The vulnerability could allow remote code execution if untrusted users access an affected system or if a SQL injection attack occurs to an affected system. Systems with SQL Server 7.0 Service Pack 4, SQL Server 2005 Service Pack 3, and SQL Server 2008 are not affected by this issue. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-004: Vulnerability in Microsoft SQL Server Could Allow Remote Code Execution - SQL Server 2000 Desktop Engine (MSDE 2000) SP4 - QFE Branch (Japanese) Severity: Important Fixlet ID: 900409 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-004.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft SQL Server. The vulnerability could allow remote code execution if untrusted users access an affected system or if a SQL injection attack occurs to an affected system. Systems with SQL Server 7.0 Service Pack 4, SQL Server 2005 Service Pack 3, and SQL Server 2008 are not affected by this issue. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-004: Vulnerability in Microsoft SQL Server Could Allow Remote Code Execution - SQL Server 2000 Desktop Engine (MSDE 2000) SP4 - GDR Branch (Japanese) Severity: Important Fixlet ID: 900411 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-004.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft SQL Server. The vulnerability could allow remote code execution if untrusted users access an affected system or if a SQL injection attack occurs to an affected system. Systems with SQL Server 7.0 Service Pack 4, SQL Server 2005 Service Pack 3, and SQL Server 2008 are not affected by this issue. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-004: Vulnerability in Microsoft SQL Server Could Allow Remote Code Execution - SQL Server 2005 SP2 - QFE Branch (Japanese) Severity: Important Fixlet ID: 900413 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-004.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft SQL Server. The vulnerability could allow remote code execution if untrusted users access an affected system or if a SQL injection attack occurs to an affected system. Systems with SQL Server 7.0 Service Pack 4, SQL Server 2005 Service Pack 3, and SQL Server 2008 are not affected by this issue. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-004: Vulnerability in Microsoft SQL Server Could Allow Remote Code Execution - SQL Server 2005 SP2 - GDR Branch (Japanese) Severity: Important Fixlet ID: 900415 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-004.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft SQL Server. The vulnerability could allow remote code execution if untrusted users access an affected system or if a SQL injection attack occurs to an affected system. Systems with SQL Server 7.0 Service Pack 4, SQL Server 2005 Service Pack 3, and SQL Server 2008 are not affected by this issue. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-004: Vulnerability in Microsoft SQL Server Could Allow Remote Code Execution - SQL Server 2000 SP4 - QFE Branch (Japanese) Severity: Important Fixlet ID: 900421 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-004.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft SQL Server. The vulnerability could allow remote code execution if untrusted users access an affected system or if a SQL injection attack occurs to an affected system. Systems with SQL Server 7.0 Service Pack 4, SQL Server 2005 Service Pack 3, and SQL Server 2008 are not affected by this issue. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-004: Vulnerability in Microsoft SQL Server Could Allow Remote Code Execution - SQL Server 2000 SP4 - GDR Branch (Japanese) Severity: Important Fixlet ID: 900423 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-004.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft SQL Server. The vulnerability could allow remote code execution if untrusted users access an affected system or if a SQL injection attack occurs to an affected system. Systems with SQL Server 7.0 Service Pack 4, SQL Server 2005 Service Pack 3, and SQL Server 2008 are not affected by this issue. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-004: Vulnerability in Microsoft SQL Server Could Allow Remote Code Execution - SQL Server 2005 SP2 - QFE Branch (x64) (Japanese) Severity: Important Fixlet ID: 900425 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-004.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft SQL Server. The vulnerability could allow remote code execution if untrusted users access an affected system or if a SQL injection attack occurs to an affected system. Systems with SQL Server 7.0 Service Pack 4, SQL Server 2005 Service Pack 3, and SQL Server 2008 are not affected by this issue. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-004: Vulnerability in Microsoft SQL Server Could Allow Remote Code Execution - SQL Server 2005 SP2 - GDR Branch (x64) (Japanese) Severity: Important Fixlet ID: 900427 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-004.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft SQL Server. The vulnerability could allow remote code execution if untrusted users access an affected system or if a SQL injection attack occurs to an affected system. Systems with SQL Server 7.0 Service Pack 4, SQL Server 2005 Service Pack 3, and SQL Server 2008 are not affected by this issue. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-005: Vulnerabilities in Microsoft Office Visio Could Allow Remote Code Execution - Visio 2002 SP2 (Japanese) Severity: Important Fixlet ID: 900501 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-005.mspx Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Office Visio that could allow remote code execution if a user opens a specially crafted Visio file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-005: Vulnerabilities in Microsoft Office Visio Could Allow Remote Code Execution - Visio 2003 SP3 (Japanese) Severity: Important Fixlet ID: 900506 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-005.mspx Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Office Visio that could allow remote code execution if a user opens a specially crafted Visio file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-005: Vulnerabilities in Microsoft Office Visio Could Allow Remote Code Execution - Visio 2007 SP1 (Japanese) Severity: Important Fixlet ID: 900511 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-005.mspx Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Office Visio that could allow remote code execution if a user opens a specially crafted Visio file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: 955839: Dec. 2008 Time Zone Update - Windows XP SP2/SP3 (Japanese) Severity: Fixlet ID: 95583901 Fixlet Link: http://support.microsoft.com/kb/955839 Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates. See the Microsoft web page on the 2007 DST changes here for more information. *************************************************************** Title: 955839: Dec. 2008 Time Zone Update - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese) Severity: Fixlet ID: 95583902 Fixlet Link: http://support.microsoft.com/kb/955839 *************************************************************** Title: 955839: Dec. 2008 Time Zone Update - Windows Server 2003 SP1/SP2 (Japanese) Severity: Fixlet ID: 95583903 Fixlet Link: http://support.microsoft.com/kb/955839 Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates. See the Microsoft web page on the 2007 DST changes here for more information. *************************************************************** Title: 955839: Dec. 2008 Time Zone Update - Windows Server 2003 SP1/SP2 - CORRUPT PATCH (Japanese) Severity: Fixlet ID: 95583904 Fixlet Link: http://support.microsoft.com/kb/955839 *************************************************************** Title: 955839: Dec. 2008 Time Zone Update - Windows Vista Gold/SP1 (Japanese) Severity: Fixlet ID: 95583905 Fixlet Link: http://support.microsoft.com/kb/955839 Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates. See the Microsoft web page on the 2007 DST changes here for more information. *************************************************************** Title: 955839: Dec. 2008 Time Zone Update - Windows Server 2008 (Japanese) Severity: Fixlet ID: 95583907 Fixlet Link: http://support.microsoft.com/kb/955839 Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates. See the Microsoft web page on the 2007 DST changes here for more information. *************************************************************** Title: 955839: Dec. 2008 Time Zone Update - Windows Server 2008 (x64) (Japanese) Severity: Fixlet ID: 95583909 Fixlet Link: http://support.microsoft.com/kb/955839 Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates. See the Microsoft web page on the 2007 DST changes here for more information. *************************************************************** Title: 955839: Dec. 2008 Time Zone Update - Windows Vista Gold/SP1 (x64) (Japanese) Severity: Fixlet ID: 95583911 Fixlet Link: http://support.microsoft.com/kb/955839 Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates. See the Microsoft web page on the 2007 DST changes here for more information. *************************************************************** Title: 955839: Dec. 2008 Time Zone Update - Windows XP Gold/SP2 (x64) (Japanese) Severity: Fixlet ID: 95583913 Fixlet Link: http://support.microsoft.com/kb/955839 Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates. See the Microsoft web page on the 2007 DST changes here for more information. *************************************************************** Title: 955839: Dec. 2008 Time Zone Update - Windows XP Gold/SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Fixlet ID: 95583914 Fixlet Link: http://support.microsoft.com/kb/955839 *************************************************************** Title: 955839: Dec. 2008 Time Zone Update - Windows Server 2003 Gold/SP2 (x64) (Japanese) Severity: Fixlet ID: 95583915 Fixlet Link: http://support.microsoft.com/kb/955839 Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates. See the Microsoft web page on the 2007 DST changes here for more information. *************************************************************** Title: 955839: Dec. 2008 Time Zone Update - Windows Server 2003 Gold/SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Fixlet ID: 95583916 Fixlet Link: http://support.microsoft.com/kb/955839