[Bigfix-announcements-simplified-chinese] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (Simplified Chinese)'

autonotify at us.ibm.com autonotify at us.ibm.com
Thu Nov 15 04:58:37 PST 2012


Fixlet Site - 'Patches for Windows (Simplified Chinese)'
Current Version: 467	Published: Thu, 15 Nov 2012 09:08:17  GMT

New Fixlets:
============

***************************************************************
Title: MS12-046: Vulnerability in Visual Basic for Applications Could Allow Remote Code Execution - Office 2003 SP3 (Local/Network Installation) (Simplified Chinese)
Severity: Important
Fixlet ID: 1204606
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-046
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability in Microsoft Visual Basic for Applications. The vulnerability could allow remote code execution if a user opens a legitimate Microsoft Office file (such as a .docx file) that is located in the same directory as a specially crafted dynamic link library (DLL) file. An attacker could then install programs; view, change, or delete data; or create new accounts that have full user rights. If a user is logged on with administrative user rights, an attacker could take complete control of the affected system. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false;  document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" +  link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS12-046: Vulnerability in Visual Basic for Applications Could Allow Remote Code Execution - Office 2003 SP3 (Administrative Installation) (Simplified Chinese)
Severity: Important
Fixlet ID: 1204608
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS12-046
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability in Microsoft Visual Basic for Applications. The vulnerability could allow remote code execution if a user opens a legitimate Microsoft Office file (such as a .docx file) that is located in the same directory as a specially crafted dynamic link library (DLL) file. An attacker could then install programs; view, change, or delete data; or create new accounts that have full user rights. If a user is logged on with administrative user rights, an attacker could take complete control of the affected system. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

var isEvansOrLater = '' == 'True'?true:false;  document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" +  link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS12-071: Cumulative Security Update for Internet Explorer - IE 9 - Windows Vista SP2 (Simplified Chinese)
Severity: Critical
Fixlet ID: 1207101
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-071

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-071: Cumulative Security Update for Internet Explorer - IE 9 - Windows Vista SP2 (x64) (Simplified Chinese)
Severity: Critical
Fixlet ID: 1207103
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-071

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-071: Cumulative Security Update for Internet Explorer - IE 9 - Windows Server 2008 SP2 (Simplified Chinese)
Severity: Moderate
Fixlet ID: 1207105
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-071

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-071: Cumulative Security Update for Internet Explorer - IE 9 - Windows Server 2008 SP2 (x64) (Simplified Chinese)
Severity: Moderate
Fixlet ID: 1207107
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-071

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-071: Cumulative Security Update for Internet Explorer - IE 9 - Windows 7 Gold/SP1 (Simplified Chinese)
Severity: Critical
Fixlet ID: 1207109
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-071

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-071: Cumulative Security Update for Internet Explorer - IE 9 - Windows 7 Gold/SP1 (x64) (Simplified Chinese)
Severity: Critical
Fixlet ID: 1207111
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-071

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-071: Cumulative Security Update for Internet Explorer - IE 9 - Windows Server 2008 R2 Gold/SP1 (x64) (Simplified Chinese)
Severity: Moderate
Fixlet ID: 1207113
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-071

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-072: Vulnerabilities in Windows Shell Could Allow Remote Code Execution - Windows XP SP3 (Simplified Chinese)
Severity: Critical
Fixlet ID: 1207201
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-072

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user browses to a specially crafted briefcase in Windows Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code as the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-072: Vulnerabilities in Windows Shell Could Allow Remote Code Execution - Windows XP SP3 - CORRUPT PATCH (Simplified Chinese)
Severity: Critical
Fixlet ID: 1207202
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-072

***************************************************************
Title: MS12-072: Vulnerabilities in Windows Shell Could Allow Remote Code Execution - Windows Server 2003 SP2 (Simplified Chinese)
Severity: Critical
Fixlet ID: 1207205
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-072

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user browses to a specially crafted briefcase in Windows Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code as the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-072: Vulnerabilities in Windows Shell Could Allow Remote Code Execution - Windows Server 2003 SP2 - CORRUPT PATCH (Simplified Chinese)
Severity: Critical
Fixlet ID: 1207206
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-072

***************************************************************
Title: MS12-072: Vulnerabilities in Windows Shell Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (Simplified Chinese)
Severity: Critical
Fixlet ID: 1207207
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-072

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user browses to a specially crafted briefcase in Windows Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code as the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-072: Vulnerabilities in Windows Shell Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Simplified Chinese)
Severity: Critical
Fixlet ID: 1207208
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-072

***************************************************************
Title: MS12-072: Vulnerabilities in Windows Shell Could Allow Remote Code Execution - Windows Vista SP2 (Simplified Chinese)
Severity: Critical
Fixlet ID: 1207209
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-072

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user browses to a specially crafted briefcase in Windows Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code as the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-072: Vulnerabilities in Windows Shell Could Allow Remote Code Execution - Windows Vista SP2 (x64) (Simplified Chinese)
Severity: Critical
Fixlet ID: 1207211
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-072

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user browses to a specially crafted briefcase in Windows Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code as the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-072: Vulnerabilities in Windows Shell Could Allow Remote Code Execution - Windows Server 2008 SP2 (Simplified Chinese)
Severity: Critical
Fixlet ID: 1207213
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-072

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user browses to a specially crafted briefcase in Windows Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code as the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-072: Vulnerabilities in Windows Shell Could Allow Remote Code Execution - Windows Server 2008 SP2 (x64) (Simplified Chinese)
Severity: Critical
Fixlet ID: 1207215
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-072

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user browses to a specially crafted briefcase in Windows Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code as the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-072: Vulnerabilities in Windows Shell Could Allow Remote Code Execution - Windows 7 Gold/SP1 (Simplified Chinese)
Severity: Critical
Fixlet ID: 1207217
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-072

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user browses to a specially crafted briefcase in Windows Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code as the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-072: Vulnerabilities in Windows Shell Could Allow Remote Code Execution - Windows 7 Gold/SP1 (x64) (Simplified Chinese)
Severity: Critical
Fixlet ID: 1207219
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-072

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user browses to a specially crafted briefcase in Windows Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code as the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-072: Vulnerabilities in Windows Shell Could Allow Remote Code Execution - Windows Server 2008 R2 Gold /SP1 (x64) (Simplified Chinese)
Severity: Critical
Fixlet ID: 1207221
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-072

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user browses to a specially crafted briefcase in Windows Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code as the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-073: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Information Disclosure - FTP Service 7.0 for IIS 7.0 - Windows Vista SP2 (Simplified Chinese)
Severity: Moderate
Fixlet ID: 1207301
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-073

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft Internet Information Services (IIS). The more severe vulnerability could allow information disclosure if an attacker sends specially crafted FTP commands to the server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-073: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Information Disclosure - FTP Service 7.5 for IIS 7.0 - Windows Vista SP2 (Simplified Chinese)
Severity: Moderate
Fixlet ID: 1207303
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-073

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft Internet Information Services (IIS). The more severe vulnerability could allow information disclosure if an attacker sends specially crafted FTP commands to the server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-073: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Information Disclosure - FTP Service 7.0 for IIS 7.0 - Windows Vista SP2 (x64) (Simplified Chinese)
Severity: Moderate
Fixlet ID: 1207305
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-073

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft Internet Information Services (IIS). The more severe vulnerability could allow information disclosure if an attacker sends specially crafted FTP commands to the server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-073: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Information Disclosure - FTP Service 7.5 for IIS 7.0 - Windows Vista SP2 (x64) (Simplified Chinese)
Severity: Moderate
Fixlet ID: 1207307
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-073

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft Internet Information Services (IIS). The more severe vulnerability could allow information disclosure if an attacker sends specially crafted FTP commands to the server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-073: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Information Disclosure - FTP Service 7.0 for IIS 7.0 - Windows Server 2008 SP2 (Simplified Chinese)
Severity: Moderate
Fixlet ID: 1207309
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-073

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft Internet Information Services (IIS). The more severe vulnerability could allow information disclosure if an attacker sends specially crafted FTP commands to the server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-073: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Information Disclosure - FTP Service 7.5 for IIS 7.0 - Windows Server 2008 SP2 (Simplified Chinese)
Severity: Moderate
Fixlet ID: 1207311
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-073

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft Internet Information Services (IIS). The more severe vulnerability could allow information disclosure if an attacker sends specially crafted FTP commands to the server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-073: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Information Disclosure - FTP Service 7.0 for IIS 7.0 - Windows Server 2008 SP2 (x64) (Simplified Chinese)
Severity: Moderate
Fixlet ID: 1207313
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-073

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft Internet Information Services (IIS). The more severe vulnerability could allow information disclosure if an attacker sends specially crafted FTP commands to the server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-073: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Information Disclosure - FTP Service 7.5 for IIS 7.0 - Windows Server 2008 SP2 (x64) (Simplified Chinese)
Severity: Moderate
Fixlet ID: 1207315
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-073

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft Internet Information Services (IIS). The more severe vulnerability could allow information disclosure if an attacker sends specially crafted FTP commands to the server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-073: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Information Disclosure - FTP Service 7.5 for IIS 7.5 - Windows 7 Gold/SP1 (Simplified Chinese)
Severity: Moderate
Fixlet ID: 1207317
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-073

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft Internet Information Services (IIS). The more severe vulnerability could allow information disclosure if an attacker sends specially crafted FTP commands to the server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-073: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Information Disclosure - IIS 7.5 - Windows 7 Gold/SP1 (Simplified Chinese)
Severity: Moderate
Fixlet ID: 1207319
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-073

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft Internet Information Services (IIS). The more severe vulnerability could allow information disclosure if an attacker sends specially crafted FTP commands to the server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-073: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Information Disclosure - FTP Service 7.5 for IIS 7.5 - Windows 7 Gold/SP1 (x64) (Simplified Chinese)
Severity: Moderate
Fixlet ID: 1207321
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-073

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft Internet Information Services (IIS). The more severe vulnerability could allow information disclosure if an attacker sends specially crafted FTP commands to the server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-073: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Information Disclosure - IIS 7.5 - Windows 7 Gold/SP1 (x64) (Simplified Chinese)
Severity: Moderate
Fixlet ID: 1207323
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-073

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft Internet Information Services (IIS). The more severe vulnerability could allow information disclosure if an attacker sends specially crafted FTP commands to the server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-073: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Information Disclosure - FTP Service 7.5 for IIS 7.5 - Windows Server 2008 R2 Gold/SP1 (x64) (Simplified Chinese)
Severity: Moderate
Fixlet ID: 1207325
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-073

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft Internet Information Services (IIS). The more severe vulnerability could allow information disclosure if an attacker sends specially crafted FTP commands to the server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-073: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Information Disclosure - IIS 7.5 - Windows Server 2008 R2 Gold/SP1 (x64) (Simplified Chinese)
Severity: Moderate
Fixlet ID: 1207327
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-073

Fixlet Description: Microsoft has released a security update that resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft Internet Information Services (IIS). The more severe vulnerability could allow information disclosure if an attacker sends specially crafted FTP commands to the server. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-074: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - .NET Framework 1.0 SP3 - Tablet PC/Media Center Edition (Simplified Chinese)
Severity: Important
Fixlet ID: 1207401
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-074

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow remote code execution if an attacker convinces the user of a target system to use a malicious proxy auto configuration file and then injects code into the currently running application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-074: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - .NET Framework 1.1 SP1 - Windows XP SP2 / Server 2003 SP2 / Vista SP2 / Server 2008 SP2 (x64) (Simplified Chinese)
Severity: Important
Fixlet ID: 1207403
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-074

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow remote code execution if an attacker convinces the user of a target system to use a malicious proxy auto configuration file and then injects code into the currently running application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-074: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - .NET Framework 2.0 SP2 - Windows XP SP3 /Server 2003 SP2 (Simplified Chinese)
Severity: Critical
Fixlet ID: 1207405
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-074

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow remote code execution if an attacker convinces the user of a target system to use a malicious proxy auto configuration file and then injects code into the currently running application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-074: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - .NET Framework 4 - Windows XP SP3 / Server 2003 SP2 / Vista SP2 / Server 2008 SP2 / 7 Gold/SP1 (Simplified Chinese)
Severity: Critical
Fixlet ID: 1207407
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-074

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow remote code execution if an attacker convinces the user of a target system to use a malicious proxy auto configuration file and then injects code into the currently running application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-074: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - .NET Framework 4 - Windows XP SP3 / Server 2003 SP2 / Vista SP2 / Server 2008 SP2 / 7 Gold/SP1 (KB2737019) (Simplified Chinese)
Severity: Important
Fixlet ID: 1207409
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-074

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow remote code execution if an attacker convinces the user of a target system to use a malicious proxy auto configuration file and then injects code into the currently running application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-074: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - .NET Framework 2.0 SP2 - Windows XP SP2 / Server 2003 SP2 (x64) (Simplified Chinese)
Severity: Critical
Fixlet ID: 1207411
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-074

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow remote code execution if an attacker convinces the user of a target system to use a malicious proxy auto configuration file and then injects code into the currently running application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-074: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - .NET Framework 4 - Windows XP SP2 / Server 2003 SP2 / Vista SP2 / Server 2008 SP2 / 7 Gold/SP1 / 2008 R2 Gold/SP1 (x64) (Simplified Chinese)
Severity: Critical
Fixlet ID: 1207413
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-074

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow remote code execution if an attacker convinces the user of a target system to use a malicious proxy auto configuration file and then injects code into the currently running application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-074: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - .NET Framework 4 - Windows XP SP3 / 2003 SP2 / Vista SP2 / 2008 SP2 / 7 Gold/SP1 / 2008 R2 Gold/SP1 (x64) (Simplified Chinese)
Severity: Important
Fixlet ID: 1207415
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-074

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow remote code execution if an attacker convinces the user of a target system to use a malicious proxy auto configuration file and then injects code into the currently running application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-074: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - .NET Framework 1.1 SP1 - Server 2003 SP2 (Simplified Chinese)
Severity: Important
Fixlet ID: 1207417
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-074

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow remote code execution if an attacker convinces the user of a target system to use a malicious proxy auto configuration file and then injects code into the currently running application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-074: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - .NET Framework 2.0 SP2 - Windows Vista SP2 / Server 2008 SP2 (Simplified Chinese)
Severity: Critical
Fixlet ID: 1207419
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-074

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow remote code execution if an attacker convinces the user of a target system to use a malicious proxy auto configuration file and then injects code into the currently running application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-074: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - .NET Framework 4.5 - Windows Vista SP2 / Server 2008 SP2 / 7 SP1 (Simplified Chinese)
Severity: Critical
Fixlet ID: 1207421
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-074

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow remote code execution if an attacker convinces the user of a target system to use a malicious proxy auto configuration file and then injects code into the currently running application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-074: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - .NET Framework 4.5 - Windows Vista SP2 / Server 2008 SP2 / 7 SP1 (Simplified Chinese)
Severity: Important
Fixlet ID: 1207423
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-074

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow remote code execution if an attacker convinces the user of a target system to use a malicious proxy auto configuration file and then injects code into the currently running application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-074: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - .NET Framework 2.0 SP2 - Windows Vista SP2 / Server 2008 SP2 (x64) (Simplified Chinese)
Severity: Critical
Fixlet ID: 1207425
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-074

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow remote code execution if an attacker convinces the user of a target system to use a malicious proxy auto configuration file and then injects code into the currently running application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-074: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - .NET Framework 4.5 - Windows Vista SP2 / Server 2008 SP2 /  7 SP1 / Server 2008 R2 SP1 (KB2729460) (x64) (Simplified Chinese)
Severity: Critical
Fixlet ID: 1207427
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-074

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow remote code execution if an attacker convinces the user of a target system to use a malicious proxy auto configuration file and then injects code into the currently running application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-074: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - .NET Framework 4.5 - Windows Vista SP2 / 2008 SP2 / 7 SP1 / 2008 R2 SP1 (x64) (Simplified Chinese)
Severity: Important
Fixlet ID: 1207429
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-074

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow remote code execution if an attacker convinces the user of a target system to use a malicious proxy auto configuration file and then injects code into the currently running application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-074: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - .NET Framework 3.5.1 - Windows 7 Gold (Simplified Chinese)
Severity: Critical
Fixlet ID: 1207431
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-074

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow remote code execution if an attacker convinces the user of a target system to use a malicious proxy auto configuration file and then injects code into the currently running application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-074: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - .NET Framework 3.5.1 - Windows 7 SP1 (Simplified Chinese)
Severity: Critical
Fixlet ID: 1207433
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-074

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow remote code execution if an attacker convinces the user of a target system to use a malicious proxy auto configuration file and then injects code into the currently running application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-074: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - .NET Framework 3.5.1 - Windows 7 / Server 2008 R2 Gold (x64) (Simplified Chinese)
Severity: Critical
Fixlet ID: 1207435
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-074

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow remote code execution if an attacker convinces the user of a target system to use a malicious proxy auto configuration file and then injects code into the currently running application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-074: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - .NET Framework 3.5.1 - Windows 7 SP1 / Server 2008 R2 SP1 (x64) (Simplified Chinese)
Severity: Critical
Fixlet ID: 1207437
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-074

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow remote code execution if an attacker convinces the user of a target system to use a malicious proxy auto configuration file and then injects code into the currently running application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-074: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - .NET Framework 1.1 SP1 - Windows XP SP3 / Vista SP2 / Server 2008 SP2 (Simplified Chinese)
Severity: Important
Fixlet ID: 1207449
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-074

Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in the .NET Framework. The most severe of these vulnerabilities could allow remote code execution if an attacker convinces the user of a target system to use a malicious proxy auto configuration file and then injects code into the currently running application. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-075: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows XP SP3 (Simplified Chinese)
Severity: Critical
Fixlet ID: 1207501
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-075

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits a malicious webpage that embeds TrueType font files. An attacker would have to convince users to visit the website, typically by getting them to click a link in an email message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-075: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows XP SP3 - CORRUPT PATCH (Simplified Chinese)
Severity: Critical
Fixlet ID: 1207502
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-075

***************************************************************
Title: MS12-075: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows Server 2003 SP2 (Simplified Chinese)
Severity: Critical
Fixlet ID: 1207505
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-075

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits a malicious webpage that embeds TrueType font files. An attacker would have to convince users to visit the website, typically by getting them to click a link in an email message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-075: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows Server 2003 SP2 - CORRUPT PATCH (Simplified Chinese)
Severity: Critical
Fixlet ID: 1207506
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-075

***************************************************************
Title: MS12-075: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) (Simplified Chinese)
Severity: Critical
Fixlet ID: 1207507
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-075

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits a malicious webpage that embeds TrueType font files. An attacker would have to convince users to visit the website, typically by getting them to click a link in an email message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-075: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - CORRUPT PATCH (Simplified Chinese)
Severity: Critical
Fixlet ID: 1207508
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-075

***************************************************************
Title: MS12-075: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows Vista SP2 (Simplified Chinese)
Severity: Critical
Fixlet ID: 1207509
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-075

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits a malicious webpage that embeds TrueType font files. An attacker would have to convince users to visit the website, typically by getting them to click a link in an email message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-075: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows Vista SP2 (x64) (Simplified Chinese)
Severity: Critical
Fixlet ID: 1207511
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-075

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits a malicious webpage that embeds TrueType font files. An attacker would have to convince users to visit the website, typically by getting them to click a link in an email message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-075: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows Server 2008 SP2 (Simplified Chinese)
Severity: Critical
Fixlet ID: 1207513
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-075

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits a malicious webpage that embeds TrueType font files. An attacker would have to convince users to visit the website, typically by getting them to click a link in an email message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-075: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows Server 2008 SP2 (x64) (Simplified Chinese)
Severity: Critical
Fixlet ID: 1207515
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-075

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits a malicious webpage that embeds TrueType font files. An attacker would have to convince users to visit the website, typically by getting them to click a link in an email message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-075: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows 7 Gold/SP1 (Simplified Chinese)
Severity: Critical
Fixlet ID: 1207517
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-075

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits a malicious webpage that embeds TrueType font files. An attacker would have to convince users to visit the website, typically by getting them to click a link in an email message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-075: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows 7 Gold/SP1 (x64) (Simplified Chinese)
Severity: Critical
Fixlet ID: 1207519
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-075

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits a malicious webpage that embeds TrueType font files. An attacker would have to convince users to visit the website, typically by getting them to click a link in an email message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-075: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows Server 2008 R2 Gold/SP1 (x64) (Simplified Chinese)
Severity: Critical
Fixlet ID: 1207521
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-075

Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits a malicious webpage that embeds TrueType font files. An attacker would have to convince users to visit the website, typically by getting them to click a link in an email message that takes them to the attacker's website. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-076: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution - Excel 2003 SP3 - Office 2003 SP3 (Local/Network Install) (Simplified Chinese)
Severity: Important
Fixlet ID: 1207606
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-076
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a specially crafted Excel file with an affected version of Microsoft Excel. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. var isEvansOrLater = '' == 'True'?true:false;  document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" +  link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS12-076: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution - Excel 2003 SP3 - Office 2003 SP3 (Administrative Installation) (Simplified Chinese)
Severity: Important
Fixlet ID: 1207608
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-076
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a specially crafted Excel file with an affected version of Microsoft Excel. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS12-076: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution - Excel 2007 SP2/SP3 - Office 2007 SP2/SP3 (Simplified Chinese)
Severity: Important
Fixlet ID: 1207616
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-076
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a specially crafted Excel file with an affected version of Microsoft Excel. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS12-076: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution - Excel 2010 SP1 - Office 2010 SP1 (Simplified Chinese)
Severity: Important
Fixlet ID: 1207621
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-076
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a specially crafted Excel file with an affected version of Microsoft Excel. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. var isEvansOrLater = '' == 'True'?true:false;  document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" +  link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS12-076: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution - Excel 2010 SP1 - Office 2010 SP1 (x64) (Simplified Chinese)
Severity: Important
Fixlet ID: 1207626
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-076
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a specially crafted Excel file with an affected version of Microsoft Excel. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS12-076: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution - Excel Viewer 2007 (Simplified Chinese)
Severity: Important
Fixlet ID: 1207631
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-076
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a specially crafted Excel file with an affected version of Microsoft Excel. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS12-076: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution - Office Compatibility Pack SP2/SP3 (Simplified Chinese)
Severity: Important
Fixlet ID: 1207636
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/bulletin/MS12-076
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a specially crafted Excel file with an affected version of Microsoft Excel. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: 2661254: Update For Minimum Certificate Key Length - Windows XP SP3 (Simplified Chinese)
Severity: N/A
Fixlet ID: 266125401
Fixlet Link: http://technet.microsoft.com/ZH-CN/security/advisory/2661254

Fixlet Description: Microsoft is announcing the availability of an update to Windows that restricts the use of certificates with RSA keys less than 1024 bits in length. The private keys used in these certificates can be derived and could allow an attacker to duplicate the certificates and use them fraudulently to spoof content, perform phishing attacks, or perform man-in-the-middle attacks. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: 2735855: Network connection is slow when you run a WFP-based application on a computer that is running Windows 7 or Windows Server 2008 R2 - Windows 7 SP1 (Simplified Chinese)
Severity: N/A
Fixlet ID: 273585501
Fixlet Link: http://support.microsoft.com/kb/2735855

Fixlet Description: Microsoft is providing an update to solve the issue: assume that you run an application that is developed by using Windows Filtering Platform (WFP) API on a computer that is running Windows 7 or Windows Server 2008 R2. When the application filters network traffic, the network connection is slow.

***************************************************************
Title: 2735855: Network connection is slow when you run a WFP-based application on a computer that is running Windows 7 or Windows Server 2008 R2 - Windows 7 SP1 (x64) (Simplified Chinese)
Severity: N/A
Fixlet ID: 273585503
Fixlet Link: http://support.microsoft.com/kb/2735855

Fixlet Description: Microsoft is providing an update to solve the issue: assume that you run an application that is developed by using Windows Filtering Platform (WFP) API on a computer that is running Windows 7 or Windows Server 2008 R2. When the application filters network traffic, the network connection is slow.

***************************************************************
Title: 2735855: Network connection is slow when you run a WFP-based application on a computer that is running Windows 7 or Windows Server 2008 R2 - Windows Server 2008 R2 SP1 (x64) (Simplified Chinese)
Severity: N/A
Fixlet ID: 273585505
Fixlet Link: http://support.microsoft.com/kb/2735855

Fixlet Description: Microsoft is providing an update to solve the issue: assume that you run an application that is developed by using Windows Filtering Platform (WFP) API on a computer that is running Windows 7 or Windows Server 2008 R2. When the application filters network traffic, the network connection is slow.

***************************************************************
Title: 2756822: Oct. 2012 Cumulative Time Zone Update - Windows XP SP3 (Simplified Chinese)
Severity: N/A
Fixlet ID: 275682201
Fixlet Link: http://support.microsoft.com/kb/2756822

Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. 

Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates.

***************************************************************
Title: 2756822: Oct. 2012 Cumulative Time Zone Update - Windows Server 2003 SP2 (Simplified Chinese)
Severity: N/A
Fixlet ID: 275682203
Fixlet Link: http://support.microsoft.com/kb/2756822

Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. 

Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates.

***************************************************************
Title: 2756822: Oct. 2012 Cumulative Time Zone Update - Windows Vista SP2 (Simplified Chinese)
Severity: N/A
Fixlet ID: 275682205
Fixlet Link: http://support.microsoft.com/kb/2756822

Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. 

Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates.

***************************************************************
Title: 2756822: Oct. 2012 Cumulative Time Zone Update - Windows Server 2008 SP2 (Simplified Chinese)
Severity: N/A
Fixlet ID: 275682207
Fixlet Link: http://support.microsoft.com/kb/2756822

Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. 

Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates.

***************************************************************
Title: 2756822: Oct. 2012 Cumulative Time Zone Update - Windows 7 Gold/SP1 (Simplified Chinese)
Severity: N/A
Fixlet ID: 275682209
Fixlet Link: http://support.microsoft.com/kb/2756822

Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. 

Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates.

***************************************************************
Title: 2756822: Oct. 2012 Cumulative Time Zone Update - Windows Server 2003 SP2 (x64) (Simplified Chinese)
Severity: N/A
Fixlet ID: 275682213
Fixlet Link: http://support.microsoft.com/kb/2756822

Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. 

Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates.

***************************************************************
Title: 2756822: Oct. 2012 Cumulative Time Zone Update - Windows Vista SP2 (x64) (Simplified Chinese)
Severity: N/A
Fixlet ID: 275682215
Fixlet Link: http://support.microsoft.com/kb/2756822

Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. 

Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates.

***************************************************************
Title: 2756822: Oct. 2012 Cumulative Time Zone Update - Windows Server 2008 SP2 (x64) (Simplified Chinese)
Severity: N/A
Fixlet ID: 275682217
Fixlet Link: http://support.microsoft.com/kb/2756822

Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. 

Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates.

***************************************************************
Title: 2756822: Oct. 2012 Cumulative Time Zone Update - Windows 7 Gold/SP1 (x64) (Simplified Chinese)
Severity: N/A
Fixlet ID: 275682219
Fixlet Link: http://support.microsoft.com/kb/2756822

Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. 

Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates.

***************************************************************
Title: 2756822: Oct. 2012 Cumulative Time Zone Update - Windows Server 2008 R2 Gold/SP1 (x64) (Simplified Chinese)
Severity: N/A
Fixlet ID: 275682221
Fixlet Link: http://support.microsoft.com/kb/2756822

Fixlet Description: This update implements changes in time zone data to accommodate daylight saving time (DST) changes in several countries. This update also includes other DST-related changes, time zone-related changes, and settings-related changes. 

Important Note: Microsoft recommends running the Outlook Time Zone Update tool or its Exchange counterpart as soon as possible after applying the Windows operating system time zone updates.



More information about the BigFix-Announcements-Simplified-Chinese mailing list