Fixlet Site - PatchesforWindows(Japanese) Current Version: 308 Published: Sat, 12 Sep 2009 01:34:51 GMT New Fixlets: ============ *************************************************************** Title: UPDATE: Windows Installer 4.5 for Windows XP SP2/SP3 (Japanese) Severity: Fixlet ID: 25215 Fixlet Link: http://www.microsoft.com/downloads/details.aspx?FamilyID=5a58b56f-60b6-4412-95b9-54d056d6f9f4&displaylang=en Fixlet Description: Microsoft has released Windows Installer version 4.5. The Windows Installer is an installation and configuration service that is required to setup numerous new software products on Microsoft operating systems. The listed computers either have no Windows Installer installed or have an earlier version of the Windows Installer. *************************************************************** Title: UPDATE: Windows Installer 4.5 for Windows XP SP2/SP3 - CORRUPT PATCH (Japanese) Severity: Fixlet ID: 25216 Fixlet Link: http://www.microsoft.com/downloads/details.aspx?FamilyID=5a58b56f-60b6-4412-95b9-54d056d6f9f4&displaylang=en *************************************************************** Title: UPDATE: Windows Installer 4.5 for Windows XP (x64) (Japanese) Severity: Fixlet ID: 25217 Fixlet Link: http://www.microsoft.com/downloads/details.aspx?FamilyID=5a58b56f-60b6-4412-95b9-54d056d6f9f4&displaylang=en Fixlet Description: Microsoft has released Windows Installer version 4.5. The Windows Installer is an installation and configuration service that is required to setup numerous new software products on Microsoft operating systems. The listed computers either have no Windows Installer installed or have an earlier version of the Windows Installer. *************************************************************** Title: UPDATE: Windows Installer 4.5 for Windows XP (x64) - CORRUPT PATCH (Japanese) Severity: Fixlet ID: 25218 Fixlet Link: http://www.microsoft.com/downloads/details.aspx?FamilyID=5a58b56f-60b6-4412-95b9-54d056d6f9f4&displaylang=en *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - HtmlInput Object ActiveX Control - Windows Vista Gold/SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 903773 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - HtmlInput Object ActiveX Control - Windows Vista Gold/SP1/SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 903775 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - HtmlInput Object ActiveX Control - Windows Media Center Edition 2005 (Japanese) Severity: Critical Fixlet ID: 903777 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. *************************************************************** Title: MS09-037: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution - HtmlInput Object ActiveX Control - Windows Media Center Edition 2005 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 903778 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspx *************************************************************** Title: MS09-045: Vulnerability in JScript Scripting Engine Could Allow Remote Code Execution - JScript 5.1/5.6 - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 904501 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-045.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the JScript scripting engine that could allow remote code execution if a user opened a specially crafted file or visited a specially crafted Web site and invoked a malformed script. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-045: Vulnerability in JScript Scripting Engine Could Allow Remote Code Execution - JScript 5.1/5.6 - Windows 2000 SP4 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 904502 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-045.mspx *************************************************************** Title: MS09-045: Vulnerability in JScript Scripting Engine Could Allow Remote Code Execution - JScript 5.6 - Windows XP SP2 (Japanese) Severity: Critical Fixlet ID: 904503 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-045.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the JScript scripting engine that could allow remote code execution if a user opened a specially crafted file or visited a specially crafted Web site and invoked a malformed script. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-045: Vulnerability in JScript Scripting Engine Could Allow Remote Code Execution - JScript 5.6 - Windows XP SP2 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 904504 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-045.mspx *************************************************************** Title: MS09-045: Vulnerability in JScript Scripting Engine Could Allow Remote Code Execution - JScript 5.7 - Windows XP SP2/SP3 (Japanese) Severity: Critical Fixlet ID: 904505 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-045.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the JScript scripting engine that could allow remote code execution if a user opened a specially crafted file or visited a specially crafted Web site and invoked a malformed script. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-045: Vulnerability in JScript Scripting Engine Could Allow Remote Code Execution - JScript 5.7 - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 904506 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-045.mspx *************************************************************** Title: MS09-045: Vulnerability in JScript Scripting Engine Could Allow Remote Code Execution - JScript 5.8 - Windows XP SP2/SP3 (Japanese) Severity: Critical Fixlet ID: 904507 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-045.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the JScript scripting engine that could allow remote code execution if a user opened a specially crafted file or visited a specially crafted Web site and invoked a malformed script. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-045: Vulnerability in JScript Scripting Engine Could Allow Remote Code Execution - JScript 5.8 - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 904508 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-045.mspx *************************************************************** Title: MS09-045: Vulnerability in JScript Scripting Engine Could Allow Remote Code Execution - JScript 5.6 - Windows XP SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 904509 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-045.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the JScript scripting engine that could allow remote code execution if a user opened a specially crafted file or visited a specially crafted Web site and invoked a malformed script. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-045: Vulnerability in JScript Scripting Engine Could Allow Remote Code Execution - JScript 5.6 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 904510 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-045.mspx *************************************************************** Title: MS09-045: Vulnerability in JScript Scripting Engine Could Allow Remote Code Execution - JScript 5.7 - Windows XP SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 904511 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-045.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the JScript scripting engine that could allow remote code execution if a user opened a specially crafted file or visited a specially crafted Web site and invoked a malformed script. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-045: Vulnerability in JScript Scripting Engine Could Allow Remote Code Execution - JScript 5.7 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 904512 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-045.mspx *************************************************************** Title: MS09-045: Vulnerability in JScript Scripting Engine Could Allow Remote Code Execution - JScript 5.8 - Windows XP SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 904513 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-045.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the JScript scripting engine that could allow remote code execution if a user opened a specially crafted file or visited a specially crafted Web site and invoked a malformed script. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-045: Vulnerability in JScript Scripting Engine Could Allow Remote Code Execution - JScript 5.8 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 904514 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-045.mspx *************************************************************** Title: MS09-045: Vulnerability in JScript Scripting Engine Could Allow Remote Code Execution - JScript 5.6 - Windows Server 2003 SP2 (Japanese) Severity: Critical Fixlet ID: 904515 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-045.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the JScript scripting engine that could allow remote code execution if a user opened a specially crafted file or visited a specially crafted Web site and invoked a malformed script. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-045: Vulnerability in JScript Scripting Engine Could Allow Remote Code Execution - JScript 5.6 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 904516 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-045.mspx *************************************************************** Title: MS09-045: Vulnerability in JScript Scripting Engine Could Allow Remote Code Execution - JScript 5.7 - Windows Server 2003 SP2 (Japanese) Severity: Critical Fixlet ID: 904517 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-045.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the JScript scripting engine that could allow remote code execution if a user opened a specially crafted file or visited a specially crafted Web site and invoked a malformed script. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-045: Vulnerability in JScript Scripting Engine Could Allow Remote Code Execution - JScript 5.7 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 904518 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-045.mspx *************************************************************** Title: MS09-045: Vulnerability in JScript Scripting Engine Could Allow Remote Code Execution - JScript 5.8 - Windows Server 2003 SP2 (Japanese) Severity: Critical Fixlet ID: 904519 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-045.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the JScript scripting engine that could allow remote code execution if a user opened a specially crafted file or visited a specially crafted Web site and invoked a malformed script. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-045: Vulnerability in JScript Scripting Engine Could Allow Remote Code Execution - JScript 5.8 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 904520 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-045.mspx *************************************************************** Title: MS09-045: Vulnerability in JScript Scripting Engine Could Allow Remote Code Execution - JScript 5.6 - Windows Server 2003 SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 904521 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-045.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the JScript scripting engine that could allow remote code execution if a user opened a specially crafted file or visited a specially crafted Web site and invoked a malformed script. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-045: Vulnerability in JScript Scripting Engine Could Allow Remote Code Execution - JScript 5.6 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 904522 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-045.mspx *************************************************************** Title: MS09-045: Vulnerability in JScript Scripting Engine Could Allow Remote Code Execution - JScript 5.7 - Windows Server 2003 SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 904523 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-045.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the JScript scripting engine that could allow remote code execution if a user opened a specially crafted file or visited a specially crafted Web site and invoked a malformed script. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-045: Vulnerability in JScript Scripting Engine Could Allow Remote Code Execution - JScript 5.7 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 904524 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-045.mspx *************************************************************** Title: MS09-045: Vulnerability in JScript Scripting Engine Could Allow Remote Code Execution - JScript 5.8 - Windows Server 2003 SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 904525 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-045.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the JScript scripting engine that could allow remote code execution if a user opened a specially crafted file or visited a specially crafted Web site and invoked a malformed script. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-045: Vulnerability in JScript Scripting Engine Could Allow Remote Code Execution - JScript 5.8 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 904526 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-045.mspx *************************************************************** Title: MS09-045: Vulnerability in JScript Scripting Engine Could Allow Remote Code Execution - JScript 5.7 - Windows Vista Gold/SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 904527 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-045.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the JScript scripting engine that could allow remote code execution if a user opened a specially crafted file or visited a specially crafted Web site and invoked a malformed script. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-045: Vulnerability in JScript Scripting Engine Could Allow Remote Code Execution - JScript 5.7 - Windows Vista Gold/SP1/SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 904529 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-045.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the JScript scripting engine that could allow remote code execution if a user opened a specially crafted file or visited a specially crafted Web site and invoked a malformed script. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-045: Vulnerability in JScript Scripting Engine Could Allow Remote Code Execution - JScript 5.8 - Windows Vista Gold/SP1/SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 904531 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-045.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the JScript scripting engine that could allow remote code execution if a user opened a specially crafted file or visited a specially crafted Web site and invoked a malformed script. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-045: Vulnerability in JScript Scripting Engine Could Allow Remote Code Execution - JScript 5.8 - Windows Vista Gold/SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 904533 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-045.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the JScript scripting engine that could allow remote code execution if a user opened a specially crafted file or visited a specially crafted Web site and invoked a malformed script. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-045: Vulnerability in JScript Scripting Engine Could Allow Remote Code Execution - JScript 5.7 - Windows Server 2008 Gold/SP2 (Japanese) Severity: Critical Fixlet ID: 904535 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-045.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the JScript scripting engine that could allow remote code execution if a user opened a specially crafted file or visited a specially crafted Web site and invoked a malformed script. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-045: Vulnerability in JScript Scripting Engine Could Allow Remote Code Execution - JScript 5.8 - Windows Server 2008 Gold/SP2 (Japanese) Severity: Critical Fixlet ID: 904537 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-045.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the JScript scripting engine that could allow remote code execution if a user opened a specially crafted file or visited a specially crafted Web site and invoked a malformed script. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-045: Vulnerability in JScript Scripting Engine Could Allow Remote Code Execution - JScript 5.7 - Windows Server 2008 Gold/SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 904539 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-045.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the JScript scripting engine that could allow remote code execution if a user opened a specially crafted file or visited a specially crafted Web site and invoked a malformed script. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-045: Vulnerability in JScript Scripting Engine Could Allow Remote Code Execution - JScript 5.8 - Windows Server 2008 Gold/SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 904541 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-045.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the JScript scripting engine that could allow remote code execution if a user opened a specially crafted file or visited a specially crafted Web site and invoked a malformed script. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-046: Vulnerability in DHTML Editing Component ActiveX Control Could Allow Remote Code Execution - Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 904601 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-046.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the DHTML Editing Component ActiveX control. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS09-046: Vulnerability in DHTML Editing Component ActiveX Control Could Allow Remote Code Execution - Windows 2000 SP4 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 904602 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-046.mspx *************************************************************** Title: MS09-046: Vulnerability in DHTML Editing Component ActiveX Control Could Allow Remote Code Execution - Windows XP SP2/SP3 (Japanese) Severity: Critical Fixlet ID: 904603 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-046.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the DHTML Editing Component ActiveX control. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS09-046: Vulnerability in DHTML Editing Component ActiveX Control Could Allow Remote Code Execution - Windows XP SP2/SP3 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 904604 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-046.mspx *************************************************************** Title: MS09-046: Vulnerability in DHTML Editing Component ActiveX Control Could Allow Remote Code Execution - Windows XP SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 904605 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-046.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the DHTML Editing Component ActiveX control. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS09-046: Vulnerability in DHTML Editing Component ActiveX Control Could Allow Remote Code Execution - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 904606 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-046.mspx *************************************************************** Title: MS09-046: Vulnerability in DHTML Editing Component ActiveX Control Could Allow Remote Code Execution - Windows Server 2003 SP2 (Japanese) Severity: Moderate Fixlet ID: 904607 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-046.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the DHTML Editing Component ActiveX control. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS09-046: Vulnerability in DHTML Editing Component ActiveX Control Could Allow Remote Code Execution - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 904608 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-046.mspx *************************************************************** Title: MS09-046: Vulnerability in DHTML Editing Component ActiveX Control Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (Japanese) Severity: Moderate Fixlet ID: 904609 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-046.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the DHTML Editing Component ActiveX control. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS09-046: Vulnerability in DHTML Editing Component ActiveX Control Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Moderate Fixlet ID: 904610 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-046.mspx *************************************************************** Title: MS09-047: Vulnerabilities in Windows Media Format Could Allow Remote Code Execution - Windows Media Format Runtime 9.0 - Microsoft Windows 2000 SP4 (Japanese) Severity: Critical Fixlet ID: 904701 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-047.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media Format. Either vulnerability could allow remote code execution if a user opened a specially crafted media file. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-047: Vulnerabilities in Windows Media Format Could Allow Remote Code Execution - Windows Media Format Runtime 9.0 - Microsoft Windows 2000 SP4 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 904702 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-047.mspx *************************************************************** Title: MS09-047: Vulnerabilities in Windows Media Format Could Allow Remote Code Execution - Windows Media Format Runtime 9/9.5/11 - Windows XP SP2 (Japanese) Severity: Critical Fixlet ID: 904703 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-047.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media Format. Either vulnerability could allow remote code execution if a user opened a specially crafted media file. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-047: Vulnerabilities in Windows Media Format Could Allow Remote Code Execution - Windows Media Format Runtime 9/9.5/11 - Windows XP SP2 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 904704 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-047.mspx *************************************************************** Title: MS09-047: Vulnerabilities in Windows Media Format Could Allow Remote Code Execution - Windows Media Format Runtime 9/9.5/11 - Windows XP SP3 (Japanese) Severity: Critical Fixlet ID: 904705 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-047.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media Format. Either vulnerability could allow remote code execution if a user opened a specially crafted media file. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-047: Vulnerabilities in Windows Media Format Could Allow Remote Code Execution - Windows Media Format Runtime 9/9.5/11 - Windows XP SP3 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 904706 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-047.mspx *************************************************************** Title: MS09-047: Vulnerabilities in Windows Media Format Could Allow Remote Code Execution - Windows Media Format Runtime 9.5 - Windows XP SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 904707 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-047.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media Format. Either vulnerability could allow remote code execution if a user opened a specially crafted media file. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-047: Vulnerabilities in Windows Media Format Could Allow Remote Code Execution - Windows Media Format Runtime 9.5 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 904708 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-047.mspx *************************************************************** Title: MS09-047: Vulnerabilities in Windows Media Format Could Allow Remote Code Execution - Windows Media Format Runtime 9.5 (x64) - Windows Server 2003 SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 904709 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-047.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media Format. Either vulnerability could allow remote code execution if a user opened a specially crafted media file. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-047: Vulnerabilities in Windows Media Format Could Allow Remote Code Execution - Windows Media Format Runtime 9.5 (x64) - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 904710 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-047.mspx *************************************************************** Title: MS09-047: Vulnerabilities in Windows Media Format Could Allow Remote Code Execution - Windows Media Format Runtime 11 - Windows XP SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 904711 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-047.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media Format. Either vulnerability could allow remote code execution if a user opened a specially crafted media file. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-047: Vulnerabilities in Windows Media Format Could Allow Remote Code Execution - Windows Media Format Runtime 11 - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 904712 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-047.mspx *************************************************************** Title: MS09-047: Vulnerabilities in Windows Media Format Could Allow Remote Code Execution - Windows Media Format Runtime 9.5 - Windows Server 2003 SP2 (Japanese) Severity: Critical Fixlet ID: 904713 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-047.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media Format. Either vulnerability could allow remote code execution if a user opened a specially crafted media file. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-047: Vulnerabilities in Windows Media Format Could Allow Remote Code Execution - Windows Media Format Runtime 9.5 - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 904714 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-047.mspx *************************************************************** Title: MS09-047: Vulnerabilities in Windows Media Format Could Allow Remote Code Execution - Windows Media Format Runtime 9.5 - Windows Server 2003 SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 904715 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-047.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media Format. Either vulnerability could allow remote code execution if a user opened a specially crafted media file. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-047: Vulnerabilities in Windows Media Format Could Allow Remote Code Execution - Windows Media Format Runtime 9.5 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 904716 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-047.mspx *************************************************************** Title: MS09-047: Vulnerabilities in Windows Media Format Could Allow Remote Code Execution - Windows Media Format Runtime 11 - Windows Vista Gold/SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 904717 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-047.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media Format. Either vulnerability could allow remote code execution if a user opened a specially crafted media file. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-047: Vulnerabilities in Windows Media Format Could Allow Remote Code Execution - Windows Media Format Runtime 11 - Windows Vista Gold/SP1/SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 904719 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-047.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media Format. Either vulnerability could allow remote code execution if a user opened a specially crafted media file. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-047: Vulnerabilities in Windows Media Format Could Allow Remote Code Execution - Windows Media Format Runtime 11 - Windows Server 2008 Gold/SP2 (Japanese) Severity: Critical Fixlet ID: 904721 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-047.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media Format. Either vulnerability could allow remote code execution if a user opened a specially crafted media file. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-047: Vulnerabilities in Windows Media Format Could Allow Remote Code Execution - Windows Media Format Runtime 11 - Windows Server 2008 Gold/SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 904723 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-047.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media Format. Either vulnerability could allow remote code execution if a user opened a specially crafted media file. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-047: Vulnerabilities in Windows Media Format Could Allow Remote Code Execution - Windows Media Services 9.1 -Windows Server 2003 SP2 (Japanese) Severity: Critical Fixlet ID: 904725 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-047.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media Format. Either vulnerability could allow remote code execution if a user opened a specially crafted media file. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-047: Vulnerabilities in Windows Media Format Could Allow Remote Code Execution - Windows Media Services 9.1 -Windows Server 2003 SP2 - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 904726 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-047.mspx *************************************************************** Title: MS09-047: Vulnerabilities in Windows Media Format Could Allow Remote Code Execution - Windows Media Services 9.1 - Windows Server 2003 (x64) (Japanese) Severity: Critical Fixlet ID: 904727 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-047.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media Format. Either vulnerability could allow remote code execution if a user opened a specially crafted media file. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-047: Vulnerabilities in Windows Media Format Could Allow Remote Code Execution - Windows Media Services 9.1 - Windows Server 2003 (x64) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 904728 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-047.mspx *************************************************************** Title: MS09-047: Vulnerabilities in Windows Media Format Could Allow Remote Code Execution - Windows Media Services 2008 - Windows Server 2008 Gold/SP2 (Japanese) Severity: Critical Fixlet ID: 904729 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-047.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media Format. Either vulnerability could allow remote code execution if a user opened a specially crafted media file. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-047: Vulnerabilities in Windows Media Format Could Allow Remote Code Execution - Windows Media Services 2008 - Windows Server 2008 Gold/SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 904731 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-047.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media Format. Either vulnerability could allow remote code execution if a user opened a specially crafted media file. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-047: Vulnerabilities in Windows Media Format Could Allow Remote Code Execution - Windows Media Format Runtime 9.5 (x64) - Windows XP SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 904733 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-047.mspx Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Windows Media Format. Either vulnerability could allow remote code execution if a user opened a specially crafted media file. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-047: Vulnerabilities in Windows Media Format Could Allow Remote Code Execution - Windows Media Format Runtime 9.5 (x64) - Windows XP SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Critical Fixlet ID: 904734 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-047.mspx *************************************************************** Title: MS09-048: Vulnerabilities in Windows TCP/IP Could Allow Remote Code Execution - Windows Server 2003 SP2 (Japanese) Severity: Important Fixlet ID: 904801 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-048.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Transmission Control Protocol/Internet Protocol (TCP/IP) processing. The vulnerabilities could allow remote code execution if an attacker sent specially crafted TCP/IP packets over the network to a computer with a listening service. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-048: Vulnerabilities in Windows TCP/IP Could Allow Remote Code Execution - Windows Server 2003 SP2 - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 904802 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-048.mspx *************************************************************** Title: MS09-048: Vulnerabilities in Windows TCP/IP Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (Japanese) Severity: Important Fixlet ID: 904803 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-048.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Transmission Control Protocol/Internet Protocol (TCP/IP) processing. The vulnerabilities could allow remote code execution if an attacker sent specially crafted TCP/IP packets over the network to a computer with a listening service. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-048: Vulnerabilities in Windows TCP/IP Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Japanese) Severity: Important Fixlet ID: 904804 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-048.mspx *************************************************************** Title: MS09-048: Vulnerabilities in Windows TCP/IP Could Allow Remote Code Execution - Windows Vista Gold/SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 904805 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-048.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Transmission Control Protocol/Internet Protocol (TCP/IP) processing. The vulnerabilities could allow remote code execution if an attacker sent specially crafted TCP/IP packets over the network to a computer with a listening service. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-048: Vulnerabilities in Windows TCP/IP Could Allow Remote Code Execution - Windows Vista Gold/SP1/SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 904807 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-048.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Transmission Control Protocol/Internet Protocol (TCP/IP) processing. The vulnerabilities could allow remote code execution if an attacker sent specially crafted TCP/IP packets over the network to a computer with a listening service. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-048: Vulnerabilities in Windows TCP/IP Could Allow Remote Code Execution - Windows Server 2008 Gold/SP2 (Japanese) Severity: Critical Fixlet ID: 904809 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-048.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Transmission Control Protocol/Internet Protocol (TCP/IP) processing. The vulnerabilities could allow remote code execution if an attacker sent specially crafted TCP/IP packets over the network to a computer with a listening service. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-048: Vulnerabilities in Windows TCP/IP Could Allow Remote Code Execution - Windows Server 2008 Gold/SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 904811 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-048.mspx Fixlet Description: Microsoft has released a security update that resolves several privately reported vulnerabilities in Transmission Control Protocol/Internet Protocol (TCP/IP) processing. The vulnerabilities could allow remote code execution if an attacker sent specially crafted TCP/IP packets over the network to a computer with a listening service. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. *************************************************************** Title: MS09-049: Vulnerability in Wireless LAN AutoConfig Service Could Allow Remote Code Execution - Windows Vista Gold/SP1/SP2 (Japanese) Severity: Critical Fixlet ID: 904901 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-049.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Wireless LAN AutoConfig Service. The vulnerability could allow remote code execution if a client or server with a wireless network interface enabled receives specially crafted wireless frames. Systems without a wireless card enabled are not at risk from this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS09-049: Vulnerability in Wireless LAN AutoConfig Service Could Allow Remote Code Execution - Windows Vista Gold/SP1/SP2 (x64) (Japanese) Severity: Critical Fixlet ID: 904903 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-049.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Wireless LAN AutoConfig Service. The vulnerability could allow remote code execution if a client or server with a wireless network interface enabled receives specially crafted wireless frames. Systems without a wireless card enabled are not at risk from this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS09-049: Vulnerability in Wireless LAN AutoConfig Service Could Allow Remote Code Execution - Windows Server 2008 Gold/SP2 (Japanese) Severity: Important Fixlet ID: 904905 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-049.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Wireless LAN AutoConfig Service. The vulnerability could allow remote code execution if a client or server with a wireless network interface enabled receives specially crafted wireless frames. Systems without a wireless card enabled are not at risk from this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. *************************************************************** Title: MS09-049: Vulnerability in Wireless LAN AutoConfig Service Could Allow Remote Code Execution - Windows Server 2008 Gold/SP2 (x64) (Japanese) Severity: Important Fixlet ID: 904907 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-049.mspx Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Wireless LAN AutoConfig Service. The vulnerability could allow remote code execution if a client or server with a wireless network interface enabled receives specially crafted wireless frames. Systems without a wireless card enabled are not at risk from this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.