Fixlet Site - PatchesforWindows(Japanese) Current Version: 294 Published: Wed, 08 Jul 2009 21:17:51 GMT New Fixlets: ============ *************************************************************** Title: UPDATE: SQL Server 2008 Service Pack 1 Available (Japanese) Severity: Fixlet ID: 68101 Fixlet Link: http://go.microsoft.com/fwlink/?LinkId=147331 Fixlet Description: Microsoft has released SQL Server 2008 Service Pack 1. SQL Server 2008 Service Pack 1 is primarily a Roll-up of Cumulative Update 1 to 3, Quick Fix Engineering (QFE) updates, and fixes to issues reported through the SQL Server community. Several new features have also been added: Slipstream – You are now able to integrate the base installation with service packs (or Hotfixes) and install in a single step Service Pack Uninstall – You are now able to uninstall only the Service Pack (without removing the whole instance) Report Builder 2.0 Click Once capability Important Note: SQL Server instances operating in a non-Microsoft cluster environment should be upgraded using the CLUSTERPASSIVE option. Please use the second action below to upgrade in these environments. *************************************************************** Title: UPDATE: SQL Server 2008 Service Pack 1 Available (x64) (Japanese) Severity: Fixlet ID: 68103 Fixlet Link: http://go.microsoft.com/fwlink/?LinkId=147331 Fixlet Description: Microsoft has released SQL Server 2008 Service Pack 1. SQL Server 2008 Service Pack 1 is primarily a Roll-up of Cumulative Update 1 to 3, Quick Fix Engineering (QFE) updates, and fixes to issues reported through the SQL Server community. Several new features have also been added: Slipstream – You are now able to integrate the base installation with service packs (or Hotfixes) and install in a single step Service Pack Uninstall – You are now able to uninstall only the Service Pack (without removing the whole instance) Report Builder 2.0 Click Once capability Important Note: SQL Server instances operating in a non-Microsoft cluster environment should be upgraded using the CLUSTERPASSIVE option. Please use the second action below to upgrade in these environments. *************************************************************** Title: Security Advisory 972890: Vulnerability in Microsoft Video ActiveX Control Could Allow Remote Code Execution - Windows Server 2003 SP2 (Japanese) Severity: Fixlet ID: 97289001 Fixlet Link: http://www.microsoft.com/technet/security/advisory/972890.mspx Fixlet Description: Microsoft has released a security advisory to inform users about a "zero day" attack involving a reported vulnerability in Microsoft ActiveX Control. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. When using Internet Explorer, code execution is remote and does not require any user intervention. Microsoft recommends removing support for this ActiveX Control within Internet Explorer. *************************************************************** Title: Security Advisory 972890: Vulnerability in Microsoft Video ActiveX Control Could Allow Remote Code Execution - Windows XP SP2/SP3 (Japanese) Severity: Fixlet ID: 97289003 Fixlet Link: http://www.microsoft.com/technet/security/advisory/972890.mspx Fixlet Description: Microsoft has released a security advisory to inform users about a "zero day" attack involving a reported vulnerability in Microsoft ActiveX Control. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. When using Internet Explorer, code execution is remote and does not require any user intervention. Microsoft recommends removing support for this ActiveX Control within Internet Explorer. *************************************************************** Title: Security Advisory 972890: Vulnerability in Microsoft Video ActiveX Control Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (Japanese) Severity: Fixlet ID: 97289005 Fixlet Link: http://www.microsoft.com/technet/security/advisory/972890.mspx Fixlet Description: Microsoft has released a security advisory to inform users about a "zero day" attack involving a reported vulnerability in Microsoft ActiveX Control. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. When using Internet Explorer, code execution is remote and does not require any user intervention. Microsoft recommends removing support for this ActiveX Control within Internet Explorer. *************************************************************** Title: Security Advisory 972890: Vulnerability in Microsoft Video ActiveX Control Could Allow Remote Code Execution - Windows XP SP2 (x64) (Japanese) Severity: Fixlet ID: 97289007 Fixlet Link: http://www.microsoft.com/technet/security/advisory/972890.mspx Fixlet Description: Microsoft has released a security advisory to inform users about a "zero day" attack involving a reported vulnerability in Microsoft ActiveX Control. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. When using Internet Explorer, code execution is remote and does not require any user intervention. Microsoft recommends removing support for this ActiveX Control within Internet Explorer.