Fixlet Site - PatchesforWindows(Japanese) Current Version: 289 Published: Fri, 12 Jun 2009 17:55:19 GMT New Fixlets: ============ *************************************************************** Title: UPDATE: Windows Server 2003 Service Pack 2 Available - Windows XP/2003 (x64) (Japanese) Severity: Critical Fixlet ID: 45204 Fixlet Link: http://www.microsoft.com/technet/windowsserver/sp2.mspx Fixlet Description: Microsoft has released Service Pack 2 for Windows Server 2003. Windows Server 2003 SP2 is a collection of updates and security enhancements. Please use the links below for more information. Important Note: This service pack includes several changes that may impair functionality of existing applications. More information on this can found here. BigFix strongly recommends that you fully test the deployment of this update prior to rolling out the update in your production environment. *************************************************************** Title: UPDATE: Windows Server 2003 Service Pack 2 Available - Known Issues - Free Space - Windows XP/2003 (x64) (Japanese) Severity: Fixlet ID: 45205 Fixlet Link: http://support.microsoft.com/kb/Q914961 Fixlet Link: http://technet2.microsoft.com/WindowsServer/en/library/ed5382af-e819-4d33-ace0-225d31b7ab751033.mspx?mfr=true Fixlet Description: Microsoft has released Service Pack 2 for Windows Server 2003. Windows Server 2003 SP2 is a collection of updates and security enhancements. Please use the links below for more information. The listed computers have less than 1.2 GB of free hard drive space. Microsoft recommends having at least 1.2 GB of available space before attempting the installation of Service Pack 2. Please see the release notes for Windows Server 2003 Service Pack 2 linked below for more information. Important Note:This service pack includes several changes that may impair functionality of existing applications. More information on this can found here. BigFix strongly recommends that you fully test the deployment of this update prior to rolling out the update in your production environment. *************************************************************** Title: UPDATE: Windows Server 2003 Service Pack 2 Available - Pending Restart - Windows XP/2003 (x64) (Japanese) Severity: Critical Fixlet ID: 45206 Fixlet Link: http://www.microsoft.com/technet/windowsserver/sp2.mspx Fixlet Description: The listed computers are in a 'Pending Restart' state and do not have Windows Server 2003 SP2 installed. BigFix recommends rebooting affected computers before applying the update through Fixlet #45204. The update should only be deployed through this fixlet as a last resort if computers in your environment are constantly in a 'Pending Restart' state. Click here for more information on how the BES Client determines if a restart is required. Microsoft has released Service Pack 2 for Windows Server 2003. Windows Server 2003 SP2 is a collection of updates and security enhancements. Please use the links below for more information. Important Note: This service pack includes several changes that may impair functionality of existing applications. More information on this can found here. BigFix strongly recommends that you fully test the deployment of this update prior to rolling out the update in your production environment. *************************************************************** Title: UPDATE: Windows Server 2003 Service Pack 2 Available - Known Issues - MSDTC - Windows XP/2003 (x64) (Japanese) Severity: Fixlet ID: 45207 Fixlet Link: http://support.microsoft.com/kb/Q914961 Fixlet Link: http://technet2.microsoft.com/WindowsServer/en/library/ed5382af-e819-4d33-ace0-225d31b7ab751033.mspx?mfr=true Fixlet Description: Microsoft has released Service Pack 2 for Windows Server 2003. Windows Server 2003 SP2 is a collection of updates and security enhancements. Please use the links below for more information. The Distributed Transaction Coordinator (MSDTC) service, which is required for the successful installation of Windows Server 2003 SP2, is disabled. Please use the action below to enabled MSDTC. Important Note:This service pack includes several changes that may impair functionality of existing applications. More information on this can found here. BigFix strongly recommends that you fully test the deployment of this update prior to rolling out the update in your production environment. *************************************************************** Title: MS09-018: Vulnerabilities in Active Directory Could Allow Remote Code Execution - AD - Windows 2000 Server SP4 (Japanese) Severity: Critical Fixlet ID: 901801 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-018.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in implementations of Active Directory on Microsoft Windows 2000 Server and Windows Server 2003, and Active Directory Application Mode (ADAM) when installed on Windows XP Professional and Windows Server 2003. The more severe vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could take complete control of an affected system remotely. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-018: Vulnerabilities in Active Directory Could Allow Remote Code Execution - AD - Windows 2000 Server SP4 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 901802 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-018.mspx *************************************************************** Title: MS09-018: Vulnerabilities in Active Directory Could Allow Remote Code Execution - ADAM - Windows XP SP2/SP3 (Japanese) Severity: Important Fixlet ID: 901803 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-018.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in implementations of Active Directory on Microsoft Windows 2000 Server and Windows Server 2003, and Active Directory Application Mode (ADAM) when installed on Windows XP Professional and Windows Server 2003. The more severe vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could take complete control of an affected system remotely. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-018: Vulnerabilities in Active Directory Could Allow Remote Code Execution - ADAM - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 901804 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-018.mspx *************************************************************** Title: MS09-018: Vulnerabilities in Active Directory Could Allow Remote Code Execution - ADAM - Windows XP SP2 (x64) (Japanese) Severity: Important Fixlet ID: 901805 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-018.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in implementations of Active Directory on Microsoft Windows 2000 Server and Windows Server 2003, and Active Directory Application Mode (ADAM) when installed on Windows XP Professional and Windows Server 2003. The more severe vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could take complete control of an affected system remotely. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-018: Vulnerabilities in Active Directory Could Allow Remote Code Execution - ADAM - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 901806 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-018.mspx *************************************************************** Title: MS09-018: Vulnerabilities in Active Directory Could Allow Remote Code Execution - AD - Windows Server 2003 SP2 (Japanese) Severity: Important Fixlet ID: 901807 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-018.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in implementations of Active Directory on Microsoft Windows 2000 Server and Windows Server 2003, and Active Directory Application Mode (ADAM) when installed on Windows XP Professional and Windows Server 2003. The more severe vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could take complete control of an affected system remotely. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-018: Vulnerabilities in Active Directory Could Allow Remote Code Execution - AD - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 901808 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-018.mspx *************************************************************** Title: MS09-018: Vulnerabilities in Active Directory Could Allow Remote Code Execution - ADAM - Windows Server 2003 SP2 (Japanese) Severity: Important Fixlet ID: 901809 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-018.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in implementations of Active Directory on Microsoft Windows 2000 Server and Windows Server 2003, and Active Directory Application Mode (ADAM) when installed on Windows XP Professional and Windows Server 2003. The more severe vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could take complete control of an affected system remotely. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-018: Vulnerabilities in Active Directory Could Allow Remote Code Execution - ADAM - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 901810 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-018.mspx *************************************************************** Title: MS09-018: Vulnerabilities in Active Directory Could Allow Remote Code Execution - AD - Windows Server 2003 SP2 (x64) (Japanese) Severity: Important Fixlet ID: 901811 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-018.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in implementations of Active Directory on Microsoft Windows 2000 Server and Windows Server 2003, and Active Directory Application Mode (ADAM) when installed on Windows XP Professional and Windows Server 2003. The more severe vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could take complete control of an affected system remotely. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-018: Vulnerabilities in Active Directory Could Allow Remote Code Execution - AD - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 901812 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-018.mspx *************************************************************** Title: MS09-018: Vulnerabilities in Active Directory Could Allow Remote Code Execution - ADAM - Windows Server 2003 SP2 (x64) (Japanese) Severity: Important Fixlet ID: 901813 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-018.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in implementations of Active Directory on Microsoft Windows 2000 Server and Windows Server 2003, and Active Directory Application Mode (ADAM) when installed on Windows XP Professional and Windows Server 2003. The more severe vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could take complete control of an affected system remotely. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-018: Vulnerabilities in Active Directory Could Allow Remote Code Execution - ADAM - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 901814 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-018.mspx *************************************************************** Title: MS09-019: Cumulative Security Update for Internet Explorer - IE 5.01 SP4 - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 901901 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-019.mspx Fixlet Description: Microsoft has released a security update that resolves seven privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The more severe of the vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-019: Cumulative Security Update for Internet Explorer - IE 5.01 SP4 - Windows 2000 SP4 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 901902 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-019.mspx *************************************************************** Title: MS09-019: Cumulative Security Update for Internet Explorer - IE 6 SP1 - Windows 2000 SP4 (Japanese) Severity: Important Fixlet ID: 901903 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-019.mspx Fixlet Description: Microsoft has released a security update that resolves seven privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The more severe of the vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-019: Cumulative Security Update for Internet Explorer - IE 6 SP1 - Windows 2000 SP4 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 901904 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-019.mspx *************************************************************** Title: MS09-019: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2/SP3 (Japanese) Severity: Critical Fixlet ID: 901905 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-019.mspx Fixlet Description: Microsoft has released a security update that resolves seven privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The more severe of the vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-019: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 901906 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-019.mspx *************************************************************** Title: MS09-019: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 901907 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-019.mspx Fixlet Description: Microsoft has released a security update that resolves seven privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The more severe of the vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-019: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 901908 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-019.mspx *************************************************************** Title: MS09-019: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (Japanese) Severity: Moderate Fixlet ID: 901909 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-019.mspx Fixlet Description: Microsoft has released a security update that resolves seven privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The more severe of the vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-019: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 901910 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-019.mspx *************************************************************** Title: MS09-019: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (x64) (Japanese) Severity: Moderate Fixlet ID: 901911 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-019.mspx Fixlet Description: Microsoft has released a security update that resolves seven privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The more severe of the vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-019: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 901912 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-019.mspx *************************************************************** Title: MS09-019: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2/SP3 (Japanese) Severity: Critical Fixlet ID: 901913 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-019.mspx Fixlet Description: Microsoft has released a security update that resolves seven privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The more severe of the vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-019: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 901914 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-019.mspx *************************************************************** Title: MS09-019: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 901915 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-019.mspx Fixlet Description: Microsoft has released a security update that resolves seven privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The more severe of the vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-019: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 901916 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-019.mspx *************************************************************** Title: MS09-019: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (Japanese) Severity: Moderate Fixlet ID: 901917 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-019.mspx Fixlet Description: Microsoft has released a security update that resolves seven privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The more severe of the vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-019: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 901918 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-019.mspx *************************************************************** Title: MS09-019: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (x64) (Japanese) Severity: Moderate Fixlet ID: 901919 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-019.mspx Fixlet Description: Microsoft has released a security update that resolves seven privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The more severe of the vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-019: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 901920 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-019.mspx *************************************************************** Title: MS09-019: Cumulative Security Update for Internet Explorer - IE 7 - Windows Vista Gold/SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 901921 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-019.mspx Fixlet Description: Microsoft has released a security update that resolves seven privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The more severe of the vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-019: Cumulative Security Update for Internet Explorer - IE 7 - Windows Vista Gold/SP1/SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 901923 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-019.mspx Fixlet Description: Microsoft has released a security update that resolves seven privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The more severe of the vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-019: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2008 Gold/SP2 (Japanese) Severity: Moderate Fixlet ID: 901925 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-019.mspx Fixlet Description: Microsoft has released a security update that resolves seven privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The more severe of the vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-019: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2008 Gold/SP2 (x64) (Japanese) Severity: Moderate Fixlet ID: 901927 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-019.mspx Fixlet Description: Microsoft has released a security update that resolves seven privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The more severe of the vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-019: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP2/SP3 (Japanese) Severity: Critical Fixlet ID: 901929 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-019.mspx Fixlet Description: Microsoft has released a security update that resolves seven privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The more severe of the vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-019: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 901930 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-019.mspx *************************************************************** Title: MS09-019: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 901931 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-019.mspx Fixlet Description: Microsoft has released a security update that resolves seven privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The more severe of the vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-019: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 901932 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-019.mspx *************************************************************** Title: MS09-019: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (Japanese) Severity: Moderate Fixlet ID: 901933 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-019.mspx Fixlet Description: Microsoft has released a security update that resolves seven privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The more severe of the vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-019: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 901934 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-019.mspx *************************************************************** Title: MS09-019: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (x64) (Japanese) Severity: Moderate Fixlet ID: 901935 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-019.mspx Fixlet Description: Microsoft has released a security update that resolves seven privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The more severe of the vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-019: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 901936 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-019.mspx *************************************************************** Title: MS09-019: Cumulative Security Update for Internet Explorer - IE 8 - Windows Vista Gold/SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 901937 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-019.mspx Fixlet Description: Microsoft has released a security update that resolves seven privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The more severe of the vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-019: Cumulative Security Update for Internet Explorer - IE 8 - Windows Vista Gold/SP1/SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 901939 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-019.mspx Fixlet Description: Microsoft has released a security update that resolves seven privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The more severe of the vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-019: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2008 Gold/SP2 (Japanese) Severity: Moderate Fixlet ID: 901941 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-019.mspx Fixlet Description: Microsoft has released a security update that resolves seven privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The more severe of the vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-019: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2008 Gold/SP2 (x64) (Japanese) Severity: Moderate Fixlet ID: 901943 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-019.mspx Fixlet Description: Microsoft has released a security update that resolves seven privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The more severe of the vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-020: Vulnerabilities in Internet Information Services (IIS) Could Allow Elevation of Privilege - IIS 5.0 - Windows 2000 SP4 (Japanese) Severity: Important Fixlet ID: 902001 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-020.mspx Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft Internet Information Services (IIS). The vulnerabilities could allow elevation of privilege if an attacker sent a specially crafted HTTP request to a Web site that requires authentication. These vulnerabilities allow an attacker to bypass the IIS configuration that specifies which type of authentication is allowed, but not the file system-based access control list (ACL) check that verifies whether a file is accessible by a given user. Successful exploitation of these vulnerabilities would still restrict the attacker to the permissions granted to the anonymous user account by the file system ACLs. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS09-020: Vulnerabilities in Internet Information Services (IIS) Could Allow Elevation of Privilege - IIS 5.0 - Windows 2000 SP4 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 902002 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-020.mspx *************************************************************** Title: MS09-020: Vulnerabilities in Internet Information Services (IIS) Could Allow Elevation of Privilege - IIS 5.1 - Windows XP SP2/SP3 (Japanese) Severity: Important Fixlet ID: 902003 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-020.mspx Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft Internet Information Services (IIS). The vulnerabilities could allow elevation of privilege if an attacker sent a specially crafted HTTP request to a Web site that requires authentication. These vulnerabilities allow an attacker to bypass the IIS configuration that specifies which type of authentication is allowed, but not the file system-based access control list (ACL) check that verifies whether a file is accessible by a given user. Successful exploitation of these vulnerabilities would still restrict the attacker to the permissions granted to the anonymous user account by the file system ACLs. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS09-020: Vulnerabilities in Internet Information Services (IIS) Could Allow Elevation of Privilege - IIS 5.1 - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 902004 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-020.mspx *************************************************************** Title: MS09-020: Vulnerabilities in Internet Information Services (IIS) Could Allow Elevation of Privilege - IIS 6.0 - Windows XP SP2 (x64) (Japanese) Severity: Important Fixlet ID: 902005 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-020.mspx Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft Internet Information Services (IIS). The vulnerabilities could allow elevation of privilege if an attacker sent a specially crafted HTTP request to a Web site that requires authentication. These vulnerabilities allow an attacker to bypass the IIS configuration that specifies which type of authentication is allowed, but not the file system-based access control list (ACL) check that verifies whether a file is accessible by a given user. Successful exploitation of these vulnerabilities would still restrict the attacker to the permissions granted to the anonymous user account by the file system ACLs. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS09-020: Vulnerabilities in Internet Information Services (IIS) Could Allow Elevation of Privilege - IIS 6.0 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 902006 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-020.mspx *************************************************************** Title: MS09-020: Vulnerabilities in Internet Information Services (IIS) Could Allow Elevation of Privilege - IIS 6.0 - Windows Server 2003 SP2 (Japanese) Severity: Important Fixlet ID: 902007 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-020.mspx Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft Internet Information Services (IIS). The vulnerabilities could allow elevation of privilege if an attacker sent a specially crafted HTTP request to a Web site that requires authentication. These vulnerabilities allow an attacker to bypass the IIS configuration that specifies which type of authentication is allowed, but not the file system-based access control list (ACL) check that verifies whether a file is accessible by a given user. Successful exploitation of these vulnerabilities would still restrict the attacker to the permissions granted to the anonymous user account by the file system ACLs. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS09-020: Vulnerabilities in Internet Information Services (IIS) Could Allow Elevation of Privilege - IIS 6.0 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 902008 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-020.mspx *************************************************************** Title: MS09-020: Vulnerabilities in Internet Information Services (IIS) Could Allow Elevation of Privilege - IIS 6.0 - Windows Server 2003 SP2 (x64) (Japanese) Severity: Important Fixlet ID: 902009 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-020.mspx Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft Internet Information Services (IIS). The vulnerabilities could allow elevation of privilege if an attacker sent a specially crafted HTTP request to a Web site that requires authentication. These vulnerabilities allow an attacker to bypass the IIS configuration that specifies which type of authentication is allowed, but not the file system-based access control list (ACL) check that verifies whether a file is accessible by a given user. Successful exploitation of these vulnerabilities would still restrict the attacker to the permissions granted to the anonymous user account by the file system ACLs. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS09-020: Vulnerabilities in Internet Information Services (IIS) Could Allow Elevation of Privilege - IIS 6.0 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 902010 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-020.mspx *************************************************************** Title: MS09-021: Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution - Office XP SP3 (Local/Network Install) (Japanese) Severity: Important Fixlet ID: 902106 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-021.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities that could allow remote code execution if a user opens a specially crafted Excel file that includes a malformed record object. An attacker who successfully exploited any of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-021: Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution - Office XP SP3 (Administrative Install) (Japanese) Severity: Important Fixlet ID: 902108 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-021.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities that could allow remote code execution if a user opens a specially crafted Excel file that includes a malformed record object. An attacker who successfully exploited any of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-021: Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution - Office 2003 SP3 (Local/Network Install) (Japanese) Severity: Important Fixlet ID: 902111 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-021.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities that could allow remote code execution if a user opens a specially crafted Excel file that includes a malformed record object. An attacker who successfully exploited any of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."'); } catch (e) { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.'; } } *************************************************************** Title: MS09-021: Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution - Office 2003 SP3 (Administrative Install) (Japanese) Severity: Important Fixlet ID: 902113 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-021.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities that could allow remote code execution if a user opens a specially crafted Excel file that includes a malformed record object. An attacker who successfully exploited any of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."'); } catch (e) { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.'; } } *************************************************************** Title: MS09-021: Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution - Office 2007 SP1/SP2 (Japanese) Severity: Important Fixlet ID: 902116 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-021.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities that could allow remote code execution if a user opens a specially crafted Excel file that includes a malformed record object. An attacker who successfully exploited any of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."'); } catch (e) { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.'; } } *************************************************************** Title: MS09-021: Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution - Excel Viewer 2003 SP3 (Japanese) Severity: Important Fixlet ID: 902151 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-021.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities that could allow remote code execution if a user opens a specially crafted Excel file that includes a malformed record object. An attacker who successfully exploited any of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."'); } catch (e) { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.'; } } *************************************************************** Title: MS09-021: Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution - Excel Viewer 2007 (Japanese) Severity: Important Fixlet ID: 902156 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-021.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities that could allow remote code execution if a user opens a specially crafted Excel file that includes a malformed record object. An attacker who successfully exploited any of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."'); } catch (e) { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.'; } } *************************************************************** Title: MS09-021: Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution - Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1/SP2 (Japanese) Severity: Important Fixlet ID: 902161 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-021.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities that could allow remote code execution if a user opens a specially crafted Excel file that includes a malformed record object. An attacker who successfully exploited any of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."'); } catch (e) { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.'; } } *************************************************************** Title: MS09-021: Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution - SharePoint Server 2007 SP1/SP2 (Japanese) Severity: Important Fixlet ID: 902166 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-021.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities that could allow remote code execution if a user opens a specially crafted Excel file that includes a malformed record object. An attacker who successfully exploited any of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."'); } catch (e) { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.'; } } *************************************************************** Title: MS09-021: Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution - SharePoint Server 2007 SP1/SP2 (x64) (Japanese) Severity: Important Fixlet ID: 902186 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-021.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities that could allow remote code execution if a user opens a specially crafted Excel file that includes a malformed record object. An attacker who successfully exploited any of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."'); } catch (e) { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.'; } } *************************************************************** Title: MS09-022: Vulnerabilities in Windows Print Spooler Could Allow Remote Code Execution - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 902201 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-022.mspx Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Windows Print Spooler. The most severe vulnerability could allow remote code execution if an affected server received a specially crafted RPC request. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-022: Vulnerabilities in Windows Print Spooler Could Allow Remote Code Execution - Windows 2000 SP4 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 902202 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-022.mspx *************************************************************** Title: MS09-022: Vulnerabilities in Windows Print Spooler Could Allow Remote Code Execution - Windows XP SP2/SP3 (Japanese) Severity: Moderate Fixlet ID: 902203 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-022.mspx Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Windows Print Spooler. The most severe vulnerability could allow remote code execution if an affected server received a specially crafted RPC request. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-022: Vulnerabilities in Windows Print Spooler Could Allow Remote Code Execution - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 902204 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-022.mspx *************************************************************** Title: MS09-022: Vulnerabilities in Windows Print Spooler Could Allow Remote Code Execution - Windows XP SP2 (x64) (Japanese) Severity: Moderate Fixlet ID: 902205 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-022.mspx Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Windows Print Spooler. The most severe vulnerability could allow remote code execution if an affected server received a specially crafted RPC request. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-022: Vulnerabilities in Windows Print Spooler Could Allow Remote Code Execution - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 902206 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-022.mspx *************************************************************** Title: MS09-022: Vulnerabilities in Windows Print Spooler Could Allow Remote Code Execution - Windows Server 2003 SP2 (Japanese) Severity: Moderate Fixlet ID: 902207 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-022.mspx Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Windows Print Spooler. The most severe vulnerability could allow remote code execution if an affected server received a specially crafted RPC request. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-022: Vulnerabilities in Windows Print Spooler Could Allow Remote Code Execution - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 902208 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-022.mspx *************************************************************** Title: MS09-022: Vulnerabilities in Windows Print Spooler Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (Japanese) Severity: Moderate Fixlet ID: 902209 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-022.mspx Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Windows Print Spooler. The most severe vulnerability could allow remote code execution if an affected server received a specially crafted RPC request. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-022: Vulnerabilities in Windows Print Spooler Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 902210 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-022.mspx *************************************************************** Title: MS09-022: Vulnerabilities in Windows Print Spooler Could Allow Remote Code Execution - Windows Vista Gold/SP1/SP2 (Japanese) Severity: Important Fixlet ID: 902211 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-022.mspx Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Windows Print Spooler. The most severe vulnerability could allow remote code execution if an affected server received a specially crafted RPC request. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-022: Vulnerabilities in Windows Print Spooler Could Allow Remote Code Execution - Windows Vista Gold/SP1/SP2 (x64) (Japanese) Severity: Important Fixlet ID: 902213 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-022.mspx Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Windows Print Spooler. The most severe vulnerability could allow remote code execution if an affected server received a specially crafted RPC request. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-022: Vulnerabilities in Windows Print Spooler Could Allow Remote Code Execution - Windows Server 2008 Gold/SP2 (Japanese) Severity: Important Fixlet ID: 902215 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-022.mspx Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Windows Print Spooler. The most severe vulnerability could allow remote code execution if an affected server received a specially crafted RPC request. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-022: Vulnerabilities in Windows Print Spooler Could Allow Remote Code Execution - Windows Server 2008 Gold/SP2 (x64) (Japanese) Severity: Important Fixlet ID: 902217 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-022.mspx Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Windows Print Spooler. The most severe vulnerability could allow remote code execution if an affected server received a specially crafted RPC request. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-023: Vulnerability in Windows Search Could Allow Information Disclosure - Windows Search 4.0 - Windows XP SP2/SP3 (Japanese) Severity: Moderate Fixlet ID: 902301 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-023.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Windows Search. The vulnerability could allow information disclosure if a user performs a search that returns a specially crafted file as the first result or if the user previews a specially crafted file from the search results. By default, the Windows Search component is not preinstalled on Microsoft Windows XP and Windows Server 2003. It is an optional component available for download. Windows Search installed on supported editions of Windows Vista and Windows Server 2008 is not affected by this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-023: Vulnerability in Windows Search Could Allow Information Disclosure - Windows Search 4.0 - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 902302 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-023.mspx *************************************************************** Title: MS09-023: Vulnerability in Windows Search Could Allow Information Disclosure - Windows Search 4.0 - Windows XP SP2 (x64) (Japanese) Severity: Moderate Fixlet ID: 902303 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-023.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Windows Search. The vulnerability could allow information disclosure if a user performs a search that returns a specially crafted file as the first result or if the user previews a specially crafted file from the search results. By default, the Windows Search component is not preinstalled on Microsoft Windows XP and Windows Server 2003. It is an optional component available for download. Windows Search installed on supported editions of Windows Vista and Windows Server 2008 is not affected by this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-023: Vulnerability in Windows Search Could Allow Information Disclosure - Windows Search 4.0 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 902304 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-023.mspx *************************************************************** Title: MS09-023: Vulnerability in Windows Search Could Allow Information Disclosure - Windows Search 4.0 - Windows Server 2003 SP2 (Japanese) Severity: Moderate Fixlet ID: 902305 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-023.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Windows Search. The vulnerability could allow information disclosure if a user performs a search that returns a specially crafted file as the first result or if the user previews a specially crafted file from the search results. By default, the Windows Search component is not preinstalled on Microsoft Windows XP and Windows Server 2003. It is an optional component available for download. Windows Search installed on supported editions of Windows Vista and Windows Server 2008 is not affected by this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-023: Vulnerability in Windows Search Could Allow Information Disclosure - Windows Search 4.0 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 902306 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-023.mspx *************************************************************** Title: MS09-023: Vulnerability in Windows Search Could Allow Information Disclosure - Windows Search 4.0 - Windows Server 2003 SP2 (x64) (Japanese) Severity: Moderate Fixlet ID: 902307 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-023.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Windows Search. The vulnerability could allow information disclosure if a user performs a search that returns a specially crafted file as the first result or if the user previews a specially crafted file from the search results. By default, the Windows Search component is not preinstalled on Microsoft Windows XP and Windows Server 2003. It is an optional component available for download. Windows Search installed on supported editions of Windows Vista and Windows Server 2008 is not affected by this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-023: Vulnerability in Windows Search Could Allow Information Disclosure - Windows Search 4.0 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 902308 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-023.mspx *************************************************************** Title: MS09-024: Vulnerability in Microsoft Works Converters Could Allow Remote Code Execution - Office XP SP3 (Local/Network Install) (Japanese) Severity: Important Fixlet ID: 902406 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-024.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft Works converters. The vulnerability could allow remote code execution if a user opens a specially crafted Works file. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."'); } catch (e) { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.'; } } *************************************************************** Title: MS09-024: Vulnerability in Microsoft Works Converters Could Allow Remote Code Execution - Office XP SP3 (Administrative Install) (Japanese) Severity: Important Fixlet ID: 902408 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-024.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft Works converters. The vulnerability could allow remote code execution if a user opens a specially crafted Works file. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."'); } catch (e) { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.'; } } *************************************************************** Title: MS09-024: Vulnerability in Microsoft Works Converters Could Allow Remote Code Execution - Office 2003 SP3 (Local/Network Install) (Japanese) Severity: Important Fixlet ID: 902411 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-024.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft Works converters. The vulnerability could allow remote code execution if a user opens a specially crafted Works file. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."'); } catch (e) { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.'; } } *************************************************************** Title: MS09-024: Vulnerability in Microsoft Works Converters Could Allow Remote Code Execution - Office 2003 SP3 (Administrative Install) (Japanese) Severity: Important Fixlet ID: 902413 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-024.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft Works converters. The vulnerability could allow remote code execution if a user opens a specially crafted Works file. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."'); } catch (e) { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.'; } } *************************************************************** Title: MS09-024: Vulnerability in Microsoft Works Converters Could Allow Remote Code Execution - Office 2007 SP1 (Japanese) Severity: Important Fixlet ID: 902416 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-024.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft Works converters. The vulnerability could allow remote code execution if a user opens a specially crafted Works file. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."'); } catch (e) { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.'; } } *************************************************************** Title: MS09-025: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows 2000 SP4 (Japanese) Severity: Important Fixlet ID: 902501 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-025.mspx Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed and two privately reported vulnerabilities in the Windows kernel that could allow elevation of privilege. An attacker who successfully exploited any of these vulnerabilities could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-025: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows 2000 SP4 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 902502 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-025.mspx *************************************************************** Title: MS09-025: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows XP SP2/SP3 (Japanese) Severity: Important Fixlet ID: 902503 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-025.mspx Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed and two privately reported vulnerabilities in the Windows kernel that could allow elevation of privilege. An attacker who successfully exploited any of these vulnerabilities could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-025: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 902504 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-025.mspx *************************************************************** Title: MS09-025: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows XP SP2 (x64) (Japanese) Severity: Important Fixlet ID: 902505 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-025.mspx Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed and two privately reported vulnerabilities in the Windows kernel that could allow elevation of privilege. An attacker who successfully exploited any of these vulnerabilities could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-025: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 902506 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-025.mspx *************************************************************** Title: MS09-025: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2003 SP2 (Japanese) Severity: Important Fixlet ID: 902507 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-025.mspx Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed and two privately reported vulnerabilities in the Windows kernel that could allow elevation of privilege. An attacker who successfully exploited any of these vulnerabilities could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-025: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 902508 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-025.mspx *************************************************************** Title: MS09-025: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) (Japanese) Severity: Important Fixlet ID: 902509 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-025.mspx Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed and two privately reported vulnerabilities in the Windows kernel that could allow elevation of privilege. An attacker who successfully exploited any of these vulnerabilities could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-025: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 902510 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-025.mspx *************************************************************** Title: MS09-025: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Vista Gold/SP1/SP2 (Japanese) Severity: Important Fixlet ID: 902511 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-025.mspx Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed and two privately reported vulnerabilities in the Windows kernel that could allow elevation of privilege. An attacker who successfully exploited any of these vulnerabilities could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-025: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Vista Gold/SP1/SP2 (x64) (Japanese) Severity: Important Fixlet ID: 902513 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-025.mspx Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed and two privately reported vulnerabilities in the Windows kernel that could allow elevation of privilege. An attacker who successfully exploited any of these vulnerabilities could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-025: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2008 (Japanese) Severity: Important Fixlet ID: 902515 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-025.mspx Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed and two privately reported vulnerabilities in the Windows kernel that could allow elevation of privilege. An attacker who successfully exploited any of these vulnerabilities could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-025: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege - Windows Server 2008 (x64) (Japanese) Severity: Important Fixlet ID: 902517 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-025.mspx Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed and two privately reported vulnerabilities in the Windows kernel that could allow elevation of privilege. An attacker who successfully exploited any of these vulnerabilities could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-026: Vulnerability in RPC Could Allow Elevation of Privilege - Windows 2000 SP4 (Japanese) Severity: Important Fixlet ID: 902601 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-026.mspx Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in the Windows remote procedure call (RPC) facility where the RPC Marshalling Engine does not update its internal state appropriately. The vulnerability could allow an attacker to execute arbitrary code and take complete control of an affected system. Supported editions of Microsoft Windows are not delivered with any RPC servers or clients that are subject to exploitation of this vulnerability. In a default configuration, users could not be attacked by exploitation of this vulnerability. However, the vulnerability is present in the Microsoft Windows RPC runtime and could affect third-party RPC applications. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS09-026: Vulnerability in RPC Could Allow Elevation of Privilege - Windows 2000 SP4 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 902602 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-026.mspx *************************************************************** Title: MS09-026: Vulnerability in RPC Could Allow Elevation of Privilege - Windows XP SP2/SP3 (Japanese) Severity: Important Fixlet ID: 902603 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-026.mspx Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in the Windows remote procedure call (RPC) facility where the RPC Marshalling Engine does not update its internal state appropriately. The vulnerability could allow an attacker to execute arbitrary code and take complete control of an affected system. Supported editions of Microsoft Windows are not delivered with any RPC servers or clients that are subject to exploitation of this vulnerability. In a default configuration, users could not be attacked by exploitation of this vulnerability. However, the vulnerability is present in the Microsoft Windows RPC runtime and could affect third-party RPC applications. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS09-026: Vulnerability in RPC Could Allow Elevation of Privilege - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 902604 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-026.mspx *************************************************************** Title: MS09-026: Vulnerability in RPC Could Allow Elevation of Privilege - Windows XP SP2 (x64) (Japanese) Severity: Important Fixlet ID: 902605 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-026.mspx Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in the Windows remote procedure call (RPC) facility where the RPC Marshalling Engine does not update its internal state appropriately. The vulnerability could allow an attacker to execute arbitrary code and take complete control of an affected system. Supported editions of Microsoft Windows are not delivered with any RPC servers or clients that are subject to exploitation of this vulnerability. In a default configuration, users could not be attacked by exploitation of this vulnerability. However, the vulnerability is present in the Microsoft Windows RPC runtime and could affect third-party RPC applications. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS09-026: Vulnerability in RPC Could Allow Elevation of Privilege - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 902606 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-026.mspx *************************************************************** Title: MS09-026: Vulnerability in RPC Could Allow Elevation of Privilege - Windows Server 2003 SP2 (Japanese) Severity: Important Fixlet ID: 902607 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-026.mspx Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in the Windows remote procedure call (RPC) facility where the RPC Marshalling Engine does not update its internal state appropriately. The vulnerability could allow an attacker to execute arbitrary code and take complete control of an affected system. Supported editions of Microsoft Windows are not delivered with any RPC servers or clients that are subject to exploitation of this vulnerability. In a default configuration, users could not be attacked by exploitation of this vulnerability. However, the vulnerability is present in the Microsoft Windows RPC runtime and could affect third-party RPC applications. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS09-026: Vulnerability in RPC Could Allow Elevation of Privilege - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 902608 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-026.mspx *************************************************************** Title: MS09-026: Vulnerability in RPC Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) (Japanese) Severity: Important Fixlet ID: 902609 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-026.mspx Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in the Windows remote procedure call (RPC) facility where the RPC Marshalling Engine does not update its internal state appropriately. The vulnerability could allow an attacker to execute arbitrary code and take complete control of an affected system. Supported editions of Microsoft Windows are not delivered with any RPC servers or clients that are subject to exploitation of this vulnerability. In a default configuration, users could not be attacked by exploitation of this vulnerability. However, the vulnerability is present in the Microsoft Windows RPC runtime and could affect third-party RPC applications. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS09-026: Vulnerability in RPC Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 902610 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-026.mspx *************************************************************** Title: MS09-026: Vulnerability in RPC Could Allow Elevation of Privilege - Windows Vista Gold/SP1/SP2 (Japanese) Severity: Important Fixlet ID: 902611 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-026.mspx Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in the Windows remote procedure call (RPC) facility where the RPC Marshalling Engine does not update its internal state appropriately. The vulnerability could allow an attacker to execute arbitrary code and take complete control of an affected system. Supported editions of Microsoft Windows are not delivered with any RPC servers or clients that are subject to exploitation of this vulnerability. In a default configuration, users could not be attacked by exploitation of this vulnerability. However, the vulnerability is present in the Microsoft Windows RPC runtime and could affect third-party RPC applications. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS09-026: Vulnerability in RPC Could Allow Elevation of Privilege - Windows Vista Gold/SP1/SP2 (x64) (Japanese) Severity: Important Fixlet ID: 902613 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-026.mspx Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in the Windows remote procedure call (RPC) facility where the RPC Marshalling Engine does not update its internal state appropriately. The vulnerability could allow an attacker to execute arbitrary code and take complete control of an affected system. Supported editions of Microsoft Windows are not delivered with any RPC servers or clients that are subject to exploitation of this vulnerability. In a default configuration, users could not be attacked by exploitation of this vulnerability. However, the vulnerability is present in the Microsoft Windows RPC runtime and could affect third-party RPC applications. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS09-026: Vulnerability in RPC Could Allow Elevation of Privilege - Windows Server 2008 Gold/SP2 (Japanese) Severity: Important Fixlet ID: 902615 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-026.mspx Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in the Windows remote procedure call (RPC) facility where the RPC Marshalling Engine does not update its internal state appropriately. The vulnerability could allow an attacker to execute arbitrary code and take complete control of an affected system. Supported editions of Microsoft Windows are not delivered with any RPC servers or clients that are subject to exploitation of this vulnerability. In a default configuration, users could not be attacked by exploitation of this vulnerability. However, the vulnerability is present in the Microsoft Windows RPC runtime and could affect third-party RPC applications. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS09-026: Vulnerability in RPC Could Allow Elevation of Privilege - Windows Server 2008 Gold/SP2 (x64) (Japanese) Severity: Important Fixlet ID: 902617 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-026.mspx Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in the Windows remote procedure call (RPC) facility where the RPC Marshalling Engine does not update its internal state appropriately. The vulnerability could allow an attacker to execute arbitrary code and take complete control of an affected system. Supported editions of Microsoft Windows are not delivered with any RPC servers or clients that are subject to exploitation of this vulnerability. In a default configuration, users could not be attacked by exploitation of this vulnerability. However, the vulnerability is present in the Microsoft Windows RPC runtime and could affect third-party RPC applications. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS09-027: Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution - Office XP SP3 (Local/Network Install) (Japanese) Severity: Important Fixlet ID: 902706 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-027.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities that could allow remote code execution if a user opens a specially crafted Word file. An attacker who successfully exploited either vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."'); } catch (e) { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.'; } } *************************************************************** Title: MS09-027: Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution - Office XP SP3 (Administrative Install) (Japanese) Severity: Important Fixlet ID: 902708 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-027.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities that could allow remote code execution if a user opens a specially crafted Word file. An attacker who successfully exploited either vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."'); } catch (e) { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.'; } } *************************************************************** Title: MS09-027: Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution - Office 2003 SP3 (Local/Network Install) (Japanese) Severity: Important Fixlet ID: 902711 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-027.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities that could allow remote code execution if a user opens a specially crafted Word file. An attacker who successfully exploited either vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."'); } catch (e) { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.'; } } *************************************************************** Title: MS09-027: Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution - Office 2003 SP3 (Administrative Install) (Japanese) Severity: Important Fixlet ID: 902713 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-027.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities that could allow remote code execution if a user opens a specially crafted Word file. An attacker who successfully exploited either vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."'); } catch (e) { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.'; } } *************************************************************** Title: MS09-027: Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution - Office 2007 SP1/SP2 (Japanese) Severity: Important Fixlet ID: 902716 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-027.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities that could allow remote code execution if a user opens a specially crafted Word file. An attacker who successfully exploited either vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-027: Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution - Word Viewer 2003 SP3 (Japanese) Severity: Important Fixlet ID: 902741 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-027.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities that could allow remote code execution if a user opens a specially crafted Word file. An attacker who successfully exploited either vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."'); } catch (e) { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.'; } } *************************************************************** Title: MS09-027: Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution - Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1/SP2 (Japanese) Severity: Important Fixlet ID: 902746 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-027.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities that could allow remote code execution if a user opens a specially crafted Word file. An attacker who successfully exploited either vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."'); } catch (e) { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.'; } }