==============================================================

マカフィー サポート通信 - リスク管理ソリューション 2011.12.16
==============================================================

本メールはMcAfee Vulnerability Manager製品のサポートをご購入のお客様
に配信しております。

○-======  今週のマカフィー Vulnerability Manager (目次)  =======-○
1) FSL UPDATE
2) OSパッチアップデート
3) 第3回 バーチャルサポートセミナー開催のお知らせ
4) 企業向けの年末年始のサポート体制について
5) McAfee Vulnerability Manager Software v6.8のサポート終了について
6) McAfee Risk Advisor 2.6.2のリリースについて
7) McAfee Policy Auditor 6.0のリリースおよび5.2のサポート終了について
8) サポートコミュニティサイトでのテクニカルドキュメント公開
9) 企業向けサポートコミュニティサイトの開設および Twitter サービスの開始について
10) 「サポート通信」配信について

※) マカフィーからのサービス
○-===================================================-○

-------------------------------------------------------
1) FSL UPDATE
-------------------------------------------------------
マカフィーは以下のVulnerability Manager製品のアップデートを提供しています。
最新更新日: 2011-DEC-15

(SUMMARY)

新しいチェック項目     :       13
改善されたチェック項目 :       454
削除されたチェック項目 :        1

 追加・改善されたシグネチャ項目等の詳細は以下の製品ダウンロード
 ページから「McAfee Foundstone Update」の最新版を入手してください。

 http://www.mcafee.com/japan/licensed2/

新しいチェック項目:

  * FID #13022 Siemens Automation License Manager Multiple Vulnerabilities
    Risk: High
  * FID #13023 Siemens Automation License Manager ALMListView.ALMListCtrl ActiveX Remote Code Execution
    Risk: High
  * FID #13024 3S CoDeSys Multiple Vulnerabilities
    Risk: High
  * FID #13025 Siemens SIMATIC WinCC Flexible Runtime Miniweb Denial of Service
    Risk: High
  * FID #13038 IBM AIX Perl Digest Module Code Injection Vulnerability
    Risk: High
  * FID #13044 Siemens SIMATIC WinCC Flexible Runtime HmiLoad Strings Remote Code Execution
    Risk: High
  * FID #13046 Siemens SIMATIC WinCC Flexible Runtime HmiLoad Denial of Service
    Risk: High
  * FID #13026 Siemens SIMATIC WinCC Flexible Runtime Miniweb Security Bypass
    Risk: Medium
  * FID #13045 Siemens SIMATIC WinCC Flexible Runtime HmiLoad Security Bypass
    Risk: Medium
  * FID #13047 Citrix XenDesktop Client Drive Mapping Policy Security Bypass Vulnerability
    Risk: Medium
  * FID #13049 Juniper Networks JUNOS IPv6 Traffic Tunneled Through IPv4 Security Bypass
    Risk: Medium
  * FID #13051 WordPress Pretty Link Plugin Unspecified Cross Site Scripting Vulnerability
    Risk: Medium
  * FID #13015 IBM DB2 STMM Denial Of Service
    Risk: Low

改善されたチェック項目:

  * FID #5230 (MS07-033) Microsoft Language Pack Installation Vulnerability
(933566)
    Recommendation is updated
  * FID #5231 (MS07-033) Microsoft Uninitialized Memory Corruption
Vulnerability (933566)
    Recommendation is updated
  * FID #5232 (MS07-033) Microsoft Speech Control Memory Corruption
Vulnerability (933566)
    Recommendation is updated
  * FID #5517 (MS07-057) Microsoft Internet Explorer Script Error Handling
Memory Corruption Vulnerability (939653)
    Recommendation is updated
  * FID #6283 (MS08-073) Microsoft Internet Explorer HTML Objects Memory
Corruption Vulnerability (958215)
    Recommendation is updated
  * FID #6284 (MS08-073) Microsoft Internet Explorer HTML Rendering Memory
Corruption Vulnerability (958215)
    Recommendation is updated
  * FID #6285 (MS08-073) Microsoft Internet Explorer Parameter Validation
Memory Corruption Vulnerability (958215)
    Recommendation is updated
  * FID #6286 (MS08-073) Microsoft Internet Explorer Uninitialized Memory
Corruption Vulnerability (958215)
    Recommendation is updated
  * FID #6301 Microsoft Internet Explorer Nexted XML Code Execution
Vulnerability
    Recommendation is updated
  * FID #6424 (MS09-002) Microsoft Internet Explorer CSS Memory Corruption
Vulnerability CVE-2009-0075 (961260)
    Recommendation is updated
  * FID #6425 (MS09-002) Microsoft Internet Explorer CSS Memory Corruption
Vulnerability CVE-2009-0076 (961260)
    Recommendation is updated
  * FID #6492 (MS09-006) Microsoft Windows Kernel Input Validation
Vulnerability (958690)
    Recommendation is updated
  * FID #6583 Microsoft Office PowerPoint PPT Parsing Code Execution
Vulnerability
    Recommendation is updated
  * FID #6606 (MS09-014) Microsoft Internet Explorer Page Transition Memory
Corruption Vulnerability (963027)
    Recommendation is updated
  * FID #6607 (MS09-014) Microsoft Internet Explorer Uninitialized Memory
Corruption Vulnerability (963027)
    Recommendation is updated
  * FID #6608 (MS09-014) Microsoft Internet Explorer Uninitialized Memory
Corruption Vulnerability II (963027)
    Recommendation is updated
  * FID #6609 (MS09-014) Microsoft Internet Explorer Uninitialized Memory
Corruption Vulnerability III (963027)
    Recommendation is updated
  * FID #6610 (MS09-014) Microsoft Internet Explorer WinINet Remote Code
Execution vulnerability (963027)
    Recommendation is updated
  * FID #6662 (MS09-017) Microsoft PowerPoint Legacy File Format
Vulnerability (967340)
    Recommendation is updated
  * FID #6663 (MS09-017) Microsoft PowerPoint Integer Overflow
Vulnerability (967340)
    Recommendation is updated
  * FID #6664 (MS09-017) Microsoft PowerPoint Legacy File Format
Vulnerability II (967340)
    Recommendation is updated
  * FID #6665 (MS09-017) Microsoft PowerPoint Legacy File Format
Vulnerability III (967340)
    Recommendation is updated
  * FID #6666 (MS09-017) Microsoft PowerPoint Memory Corruption
Vulnerability (967340)
    Recommendation is updated
  * FID #6667 (MS09-017) Microsoft PowerPoint Legacy File Format
Vulnerability IV (967340)
    Recommendation is updated
  * FID #6668 (MS09-017) Microsoft PowerPoint Legacy File Format
Vulnerability V (967340)
    Recommendation is updated
  * FID #6669 (MS09-017) Microsoft PowerPoint Legacy File Format
Vulnerability VI (967340)
    Recommendation is updated
  * FID #6670 (MS09-017) Microsoft PowerPoint Legacy File Format
Vulnerability VII (967340)
    Recommendation is updated
  * FID #6671 (MS09-017) Microsoft PowerPoint Legacy File Format
Vulnerability VIII (967340)
    Recommendation is updated
  * FID #6672 (MS09-017) Microsoft PowerPoint Heap Corruption Vulnerability
(967340)
    Recommendation is updated
  * FID #6673 (MS09-017) Microsoft PowerPoint Legacy File Format
Vulnerability IX (967340)
    Recommendation is updated
  * FID #6674 (MS09-017) Microsoft PowerPoint Data Out of Bounds
Vulnerability (967340)
    Recommendation is updated
  * FID #6745 (MS09-019) Microsoft Internet Explorer DHTML Object Memory
Corruption Vulnerability (969897)
    Recommendation is updated
  * FID #6746 (MS09-019) Microsoft Internet Explorer HTML Object Memory
Corruption (969897)
    Recommendation is updated
  * FID #6747 (MS09-019) Microsoft Internet Explorer HTML Objects Memory
Corruption Vulnerability (969897)
    Recommendation is updated
  * FID #6748 (MS09-019) Microsoft Internet Explorer HTML Objects Memory
Corruption Vulnerability II (969897)
    Recommendation is updated
  * FID #6749 (MS09-019) Microsoft Internet Explorer HTML Objects Memory
Corruption Vulnerability III (969897)
    Recommendation is updated
  * FID #6751 (MS09-019) Microsoft Internet Explorer Uninitialized Memory
Corruption Vulnerability (969897)
    Recommendation is updated
  * FID #6904 (MS09-034) Microsoft Internet Explorer Uninitialized Memory
Corruption Vulnerability (972260)
    Recommendation is updated
  * FID #6905 (MS09-034) Microsoft Internet Explorer HTML Objects Memory
Corruption Vulnerability (972260)
    Recommendation is updated
  * FID #6906 (MS09-034) Microsoft Internet Explorer Memory Corruption
Vulnerability (972260)
    Recommendation is updated
  * FID #7194 (MS09-054) Data Stream Header Corruption Vulnerability
(974455)
    Recommendation is updated
  * FID #7195 (MS09-054) Uninitialized Memory Corruption Vulnerability
(974455)
    Recommendation is updated
  * FID #7196 (MS09-054) HTML Component Handling Vulnerability (974455)
    Recommendation is updated
  * FID #7197 (MS09-054) Uninitialized Memory Corruption Vulnerability II
(974455)
    Recommendation is updated
  * FID #7198 (MS09-055) ATL COM Initialization Vulnerability ActiveX Kill
Bits  (973525)
    Recommendation is updated
  * FID #7224 (MS09-054) Cumulative Security Update For Internet Explorer
(974455)
    Recommendation is updated
  * FID #7229 (MS09-055) Cumulative Security Update Of ActiveX Kill Bits
(973525)
    Recommendation is updated
  * FID #7316 (MS09-065) Win32k NULL Pointer Dereferencing Vulnerability
(969947)
    Recommendation is updated
  * FID #7317 (MS09-065) Win32k Insufficient Data Validation Vulnerability
(969947)
    Recommendation is updated
  * FID #7318 (MS09-065) Win32k EOT Parsing Vulnerability (969947)
    Recommendation is updated
  * FID #7332 (MS09-065) Vulnerabilities In Windows Kernel-Mode Drivers
Could Allow Remote Code Execution (969947)
    Recommendation is updated
  * FID #7346 (MS09-014) Cumulative Security Update For Internet Explorer
(963027)
    Recommendation is updated
  * FID #7350 (MS09-002) Cumulative Security Update For Internet Explorer
(961260)
    Recommendation is updated
  * FID #7356 (MS09-017) Vulnerabilities In Microsoft Office PowerPoint
Could Allow Remote Code Execution (967340)
    Recommendation is updated
  * FID #7377 (MS09-019) Cumulative Security Update for Internet Explorer
(969897)
    Recommendation is updated
  * FID #7413 (MS09-006) Vulnerabilities In Windows Kernel Could Allow
Remote Code Execution (958690)
    Recommendation is updated
  * FID #7456 (MS09-072) ATL COM Initialization Vulnerability (976325)
    Recommendation is updated
  * FID #7457 (MS09-072) Uninitialized Memory Corruption Vulnerability
(976325)
    Recommendation is updated
  * FID #7458 (MS09-072) HTML Object Memory Corruption Vulnerability
(976325)
    Recommendation is updated
  * FID #7459 (MS09-072) Uninitialized Memory Corruption Vulnerability III
(976325)
    Recommendation is updated
  * FID #7460 (MS09-072) Uninitialized Memory Corruption Vulnerability II
(976325)
    Recommendation is updated
  * FID #7466 (MS09-072) Cumulative Security Update For Internet Explorer
(976325)
    Recommendation is updated
  * FID #7639 (MS08-051) Vulnerability In Windows Messenger Could Allow
Information Disclosure (955702)
    Recommendation is updated
  * FID #7677 (MS10-002) Microsoft Internet Explorer HTML Object Memory
Corruption Vulnerability II (978207)
    Recommendation is updated
  * FID #7681 (MS08-061)Vulnerabilities In Windows Kernel Could Allow
Elevation Of Privilege (954211)
    Recommendation is updated
  * FID #7724 (MS10-002) Microsoft Internet Explorer URL Validation
Vulnerability (978207)
    Recommendation is updated
  * FID #7725 (MS10-002) Microsoft Internet Explorer Uninitialized Memory
Corruption Vulnerability (978207)
    Recommendation is updated
  * FID #7726 (MS10-002) Microsoft Internet Explorer Uninitialized Memory
Corruption Vulnerability II (978207)
    Recommendation is updated
  * FID #7727 (MS10-002) Microsoft Internet Explorer Uninitialized Memory
Corruption Vulnerability III (978207)
    Recommendation is updated
  * FID #7728 (MS10-002) Microsoft Internet Explorer Uninitialized Memory
Corruption Vulnerability IV (978207)
    Recommendation is updated
  * FID #7729 (MS10-002) Microsoft Internet Explorer HTML Object Memory
Corruption Vulnerability (978207)
    Recommendation is updated
  * FID #7730 (MS08-023) Security Update Of ActiveX Kill Bits (948881)
    Recommendation is updated
  * FID #7731 (MS08-024) Cumulative Security Update For Internet Explorer
(947864)
    Recommendation is updated
  * FID #7743 (MS10-002) Cumulative Security Update For Internet Explorer
(978207)
    Recommendation is updated
  * FID #7804 (MS08-031) Cumulative Security Update For Internet Explorer
(950759)
    Recommendation is updated
  * FID #7805 (MS08-032) Cumulative Security Update Of ActiveX Kill Bits
(950760)
    Recommendation is updated
  * FID #7817 (MS10-035) Microsoft Internet Explorer Cross-Domain
Information Disclosure Vulnerability (982381)
    Recommendation is updated
  * FID #7825 (MS08-010) Cumulative Security Update For Internet Explorer
(944533)
    Recommendation is updated
  * FID #7862 (MS10-034) Microsoft Windows Data Analyzer ActiveX Control
Vulnerability (980195)
    Recommendation is updated
  * FID #7882 (MS10-008) Cumulative Security Update of ActiveX Kill Bits
(978262)
    Recommendation is updated
  * FID #8099 (MS08-045) Cumulative Security Update For Internet Explorer
(953838)
    Recommendation is updated
  * FID #8114 (MS10-017) Vulnerabilities in Microsoft Office Excel Could
Allow Remote Code Execution (980150)
    Recommendation is updated
  * FID #8115 (MS10-018) Microsoft Internet Explorer Uninitialized Memory
Corruption Vulnerability III (980182)
    Recommendation is updated
  * FID #8324 (MS10-018) Microsoft Internet Explorer Memory Corruption
Vulnerability (980182)
    Recommendation is updated
  * FID #8325 (MS10-018) Microsoft Internet Explorer HTML Rendering Memory
Corruption Vulnerability (980182)
    Recommendation is updated
  * FID #8326 (MS10-018) Microsoft Internet Explorer HTML Object Memory
Corruption Vulnerability II (980182)
    Recommendation is updated
  * FID #8328 (MS10-018) Microsoft Internet Explorer Uninitialized Memory
Corruption Vulnerability II (980182)
    Recommendation is updated
  * FID #8329 (MS10-018) Microsoft Internet Explorer HTML Object Memory
Corruption Vulnerability (980182)
    Recommendation is updated
  * FID #8330 (MS10-018) Microsoft Internet Explorer Race Condition Memory
Corruption Vulnerability (980182)
    Recommendation is updated
  * FID #8332 (MS10-018) Microsoft Internet Explorer Uninitialized Memory
Corruption Vulnerability (980182)
    Recommendation is updated
  * FID #8333 (MS10-018) Cumulative Security Update For Internet Explorer
(980182)
    Recommendation is updated
  * FID #8389 (MS08-073) Cumulative Security Update For Internet Explorer
(958215)
    Recommendation is updated
  * FID #8394 (MS08-078) Security Update For Internet Explorer (960714)
    Recommendation is updated
  * FID #8519 (MS10-021) Microsoft Windows Kernel Null Pointer
Vulnerability (979683)
    Recommendation is updated
  * FID #8520 (MS10-021) Microsoft Windows Kernel Symbolic Link Value
Vulnerability (979683)
    Recommendation is updated
  * FID #8523 (MS10-021) Microsoft Windows Kernel Registry Key
Vulnerability (979683)
    Recommendation is updated
  * FID #8524 (MS10-021) Microsoft Windows Virtual Path Parsing
Vulnerability (979683)
    Recommendation is updated
  * FID #8525 (MS10-021) Microsoft Windows Kernel Malformed Image
Vulnerability (979683)
    Recommendation is updated
  * FID #8526 (MS10-021) Microsoft Windows Kernel Exception Handler
Vulnerability (979683)
    Recommendation is updated
  * FID #8534 (MS10-023) Microsoft Office Publisher Conversion TextBox
Processing Buffer Overflow Vulnerability (981160)
    Recommendation is updated
  * FID #8547 (MS10-023) Vulnerability in Microsoft Office Publisher Could
Allow Remote Code Execution (981160)
    Recommendation is updated
  * FID #9065 (MS10-035) Cumulative Security Update for Internet Explorer
(982381)
    Recommendation is updated
  * FID #9068 (MS10-034) Cumulative Security Update of ActiveX Kill Bits
(980195)
    Recommendation is updated
  * FID #9071 (MS10-038) Vulnerabilities In Microsoft Office Excel Could
Allow Remote Code Execution (2027452)
    Recommendation is updated
  * FID #9078 (MS10-035) Microsoft Internet Explorer Uninitialized Memory
Corruption Vulnerability (982381)
    Recommendation is updated
  * FID #9079 (MS10-035) Microsoft HTML Element Memory Corruption
Vulnerability (982381)
    Recommendation is updated
  * FID #9080 (MS10-035) Microsoft Internet Explorer Uninitialized Memory
Corruption Vulnerability (982381) CVE-2010-1261
    Recommendation is updated
  * FID #9081 (MS10-035) Microsoft Internet Explorer Memory Corruption
Vulnerability (982381)
    Recommendation is updated
  * FID #9085 (MS11-027) Microsoft Microsoft Internet Explorer 8 Developer
Tools Remote Code Execution (2508272)
    Recommendation is updated
  * FID #9678 (MS10-057) Microsoft Office Excel Memory Corruption
Vulnerability (2269707)
    Recommendation is updated
  * FID #9694 (MS10-048) Microsoft Windows Win32k Window Creation
Vulnerability (2160329)
    Recommendation is updated
  * FID #9695 (MS10-048) Microsoft Windows Win32k User Input Validation
Vulnerability (2160329)
    Recommendation is updated
  * FID #9696 (MS10-048) Microsoft Windows Win32k Exception Handling
Vulnerability (2160329)
    Recommendation is updated
  * FID #9697 (MS10-048) Microsoft Windows Win32k Pool Overflow
Vulnerability (2160329)
    Recommendation is updated
  * FID #9698 (MS10-048) Microsoft Windows Win32k Bounds Checking
Vulnerability (2160329)
    Recommendation is updated
  * FID #9699 (MS10-053) Microsoft Internet Explorer HTML Layout Memory
Corruption Vulnerability (2183461)
    Recommendation is updated
  * FID #9700 (MS10-053) Microsoft Internet Explorer Uninitialized Memory
Corruption Vulnerability (2183461)
    Recommendation is updated
  * FID #9701 (MS10-053) Microsoft Internet Explorer Race Condition Memory
Corruption Vulnerability (2183461)
    Recommendation is updated
  * FID #9702 (MS10-053) Microsoft Internet Explorer Uninitialized Memory
Corruption Vulnerability CVE-2010-2557 (2183461)
    Recommendation is updated
  * FID #9703 (MS10-053) Microsoft Internet Explorer Uninitialized Memory
Corruption Vulnerability CVE-2010-2556 (2183461)
    Recommendation is updated
  * FID #9704 (MS10-053) Microsoft Internet Explorer Event Handler
Cross-Domain Vulnerability (2183461)
    Recommendation is updated
  * FID #9711 (MS10-057) Vulnerability in Microsoft Office Excel Could
Allow Remote Code Execution (2269707)
    Recommendation is updated
  * FID #9723 (MS10-053) Cumulative Security Update for Internet Explorer
(2183461)
    Recommendation is updated
  * FID #10322 (MS10-071) Cumulative Security Update for Internet Explorer
(2360131)
    Recommendation is updated
  * FID #10345 (MS10-071) Microsoft Internet Explorer Autocomplete
Information Disclosure (2360131)
    Recommendation is updated
  * FID #10346 (MS10-071) Microsoft Internet Explorer toStaticHTML
Information Disclosure (2360131) I
    Recommendation is updated
  * FID #10347 (MS10-071) Microsoft Internet Explorer toStaticHTML
Information Disclosure (2360131) II
    Recommendation is updated
  * FID #10348 (MS10-071) Microsoft Internet Explorer CSS Special Character
Information Disclosure (2360131)
    Recommendation is updated
  * FID #10349 (MS10-071) Microsoft Internet Explorer Uninitialized Memory
Corruption Remote Code Execution (2360131) I
    Recommendation is updated
  * FID #10350 (MS10-071) Microsoft Internet Explorer Uninitialized Memory
Corruption Remote Code Execution (2360131) II
    Recommendation is updated
  * FID #10351 (MS10-071) Microsoft Internet Explorer Anchor Element
Information Disclosure (2360131)
    Recommendation is updated
  * FID #10352 (MS10-071) Microsoft Internet Explorer Uninitialized Memory
Corruption Remote Code Execution (2360131) III
    Recommendation is updated
  * FID #10353 (MS10-071) Microsoft Internet Explorer Cross-Domain
Information Disclosure (2360131)
    Recommendation is updated
  * FID #10354 (MS10-071) Microsoft Internet Explorer Uninitialized Memory
Corruption (2360131) IV
    Recommendation is updated
  * FID #10357 (MS10-080) Microsoft Office Excel Record Parsing Integer
Remote Code Execution (2293211)
    Recommendation is updated
  * FID #10359 (MS10-080) Microsoft Office Excel Record Parsing Memory
Corruption (2293211)
    Recommendation is updated
  * FID #10367 (MS10-080) Microsoft Office Excel File Format Parsing Remote
Code Execution (2293211)
    Recommendation is updated
  * FID #10368 (MS10-080) Microsoft Office Lotus 1-2-3 Workbook Parsing
Remote Code Execution (2293211)
    Recommendation is updated
  * FID #10369 (MS10-080) Microsoft Office Formula Substream Memory
Corruption (2293211)
    Recommendation is updated
  * FID #10370 (MS10-080) Microsoft Office Formula Biff Record Remote Code
Execution (2293211)
    Recommendation is updated
  * FID #10373 (MS10-080) Microsoft Office Out Of Bounds Array Remote Code
Execution (2293211)
    Recommendation is updated
  * FID #10374 (MS10-080) Microsoft Office Merge Cell Record Pointer Remote
Code Execution (2293211)
    Recommendation is updated
  * FID #10375 (MS10-080) Microsoft Office Negative Future Function Remote
Code Execution (2293211)
    Recommendation is updated
  * FID #10379 (MS10-080) Microsoft Office Extra Out of Boundry Record
Parsing Remote Code Execution (2293211)
    Recommendation is updated
  * FID #10380 (MS10-080) Microsoft Office Real Time Data Array Record
Remote Code Execution (2293211)
    Recommendation is updated
  * FID #10381 (MS10-080) Microsoft Office Out-of-Bounds Memory Write in
Parsing Remote Code Execution (2293211)
    Recommendation is updated
  * FID #10382 (MS10-080) Microsoft Office Ghost Record Type Parsing Remote
Code Execution (2293211)
    Recommendation is updated
  * FID #10618 Microsoft Internet Explorer Invalid Flag Remote Code
Execution (2458511)
    Recommendation is updated
  * FID #10654 (MS10-088) Vulnerabilities In Microsoft PowerPoint Could
Allow Remote Code Execution (2293386)
    Recommendation is updated
  * FID #10656 (MS10-088) Microsoft Office PowerPoint Parsing Buffer
Overflow  (2293386)
    Recommendation is updated
  * FID #10657 (MS10-088) Microsoft Office PowerPoint Heap Corruption
Remote Code Execution (2293386)
    Recommendation is updated
  * FID #10855 (MS10-090) Cumulative Security Update For Internet Explorer
(2416400)
    Recommendation is updated
  * FID #10865 (MS10-103) Vulnerabilities in Microsoft Publisher Could
Allow Remote Code Execution (2292970)
    Recommendation is updated
  * FID #10881 (MS10-103) Microsoft Office Suites Memory Corruption Due To
Invalid Index Into Array in Pubconv.dll Vulnerability (2292970)
    Recommendation is updated
  * FID #10882 (MS10-103) Microsoft Publisher Memory Corruption
Vulnerability  (2292970)
    Recommendation is updated
  * FID #10883 (MS10-103) Microsoft Office Suites Array Indexing Memory
Corruption Vulnerability (2292970)
    Recommendation is updated
  * FID #10890 (MS10-090) Microsoft Internet Explorer HTML Object Memory
Corruption Vulnerability CVE-2010-3340 (2416400)
    Recommendation is updated
  * FID #10892 (MS10-090) Microsoft Internet Explorer HTML Object Memory
Corruption Vulnerability CVE-2010-3343 (2416400)
    Recommendation is updated
  * FID #10893 (MS10-090) Microsoft Internet Explorer HTML Object Memory
Corruption Vulnerability CVE-2010-3345 (2416400)
    Recommendation is updated
  * FID #10894 (MS10-090) Microsoft Internet Explorer HTML Object Memory
Corruption Vulnerability CVE-2010-3346 (2416400)
    Recommendation is updated
  * FID #11066 (MS10-036) Microsoft Office COM Object Validation
Vulnerability (983235)
    Recommendation is updated
  * FID #11093 (MS10-008) Cumulative Security Update of ActiveX Kill Bits
(978262)
    Recommendation is updated
  * FID #11249 (MS11-003) Microsoft Internet Explorer Uninitialized Memory
Corruption I (2482017)
    Recommendation is updated
  * FID #11250 (MS11-003) Microsoft Internet Explorer Uninitialized Memory
Corruption II (2482017)
    Recommendation is updated
  * FID #11267 (MS11-003) Cumulative Security Update For Internet Explorer
(2482017)
    Recommendation is updated
  * FID #11340 (MS11-022) Microsoft PowerPoint OfficeArt Atom RCE (2489283)
    Recommendation is updated
  * FID #11342 (MS11-021) Microsoft Excel Array Indexing (2489279)
    Recommendation is updated
  * FID #11343 (MS11-021) Microsoft Excel Linked List Corruption (2489279)
    Recommendation is updated
  * FID #11344 (MS11-021) Microsoft Excel Dangling Pointer (2489279)
    Recommendation is updated
  * FID #11580 (MS11-018) Microsoft Internet Explorer Object Management
Memory Corruption (2497640)
    Recommendation is updated
  * FID #11754 (MS11-018) Cumulative Security Update For Internet Explorer
(2497640)
    Recommendation is updated
  * FID #11757 (MS11-021) Vulnerabilities in Microsoft Excel Could Allow
Remote Code Execution (2489279)
    Recommendation is updated
  * FID #11758 (MS11-022) Vulnerabilities in Microsoft PowerPoint Could
Allow Remote Code Execution (2489283)
    Recommendation is updated
  * FID #11763 (MS11-027) Cumulative Security Update of ActiveX Kill Bits
(2508272)
    Recommendation is updated
  * FID #11775 (MS11-021) Microsoft Excel Integer Overrun (2489279)
    Recommendation is updated
  * FID #11777 (MS11-021) Microsoft Excel Record Parsing WriteAV (2489279)
    Recommendation is updated
  * FID #11778 (MS11-021) Microsoft Excel Memory Corruption (2489279)
    Recommendation is updated
  * FID #11779 (MS11-021) Microsoft Excel Heap Overflow (2489279)
    Recommendation is updated
  * FID #11780 (MS11-021) Microsoft Excel Buffer Overwrite (2489279)
    Recommendation is updated
  * FID #11781 (MS11-021) Microsoft Excel Data Initialization (2489279)
    Recommendation is updated
  * FID #11782 (MS11-022) Microsoft PowerPoint Floating Point Techno-color
Time Bandit RCE (2489283)
    Recommendation is updated
  * FID #11783 (MS11-022) Microsoft PowerPoint Persist Directory RCE
(2489283)
    Recommendation is updated
  * FID #11787 (MS11-018) Microsoft Internet Explorer Layouts Handling
Memory Corruption (2497640)
    Recommendation is updated
  * FID #11788 (MS11-018) Microsoft Internet Explorer MSHTML Memory
Corruption (2497640)
    Recommendation is updated
  * FID #11821 (MS11-027) Microsoft WMITools ActiveX Control Remote Code
Execution (2508272)
    Recommendation is updated
  * FID #11822 (MS11-027) Microsoft Windows Messenger ActiveX Control
Remote Code Execution (2508272)
    Recommendation is updated
  * FID #11901 (APSB11-07) Adobe AIR Doc Remote Code Execution
    Observation is updated
  * FID #11993 (MS11-036) Microsoft PowerPoint Buffer Overrrun RCE
(2545814)
    Recommendation is updated
  * FID #11994 (MS11-036) Microsoft PowerPoint Memory Corruption RCE
(2545814)
    Recommendation is updated
  * FID #11996 (MS11-036) Vulnerabilities In Microsoft PowerPoint Could
Allow Remote Code Execution (2545814)
    Recommendation is updated
  * FID #12171 (APSB11-13) Adobe Flash Player Cross Site Scripting Remote
Code Execution
    Observation is updated
  * FID #12208 (MS11-045) Microsoft Excel Buffer Overrun Remote Code
Execution (2537146)
    Recommendation is updated
  * FID #12209 (MS11-045) Microsoft Excel Improper Record Parsing  Remote
Code Execution (KB2537146)
    Recommendation is updated
  * FID #12210 (MS11-045) Microsoft Excel Insufficient Record Validation
Remote Code Execution (KB2537146)
    Recommendation is updated
  * FID #12211 (MS11-045) Microsoft Excel Memory Corruption Remote Code
Execution (2537146)
    Recommendation is updated
  * FID #12213 (MS11-045) Microsoft Excel Memory Heap Overwrite Remote Code
Execution (KB2537146)
    Recommendation is updated
  * FID #12214 (MS11-045) Microsoft Excel Out of Bounds Array Access Remote
Code Execution (KB2537146)
    Recommendation is updated
  * FID #12215 (MS11-050) Cumulative Security Update for Internet Explorer
(2530548)
    Recommendation is updated
  * FID #12217 (MS11-045) Microsoft Excel Out Of Bounds WriteAV Remote Code
Execution (2537146)
    Recommendation is updated
  * FID #12219 (MS11-041) Microsoft Windows Kernel-Mode Drivers Could Allow
Remote Code Execution (KB2525694)
    Recommendation is updated
  * FID #12233 (MS11-050) Microsoft Internet Explorer Link Properties
Handling Memory Corruption (2530548)
    Recommendation is updated
  * FID #12234 (MS11-050) Microsoft Internet Explorer DOM Manipulation
Memory Corruption (2530548)
    Recommendation is updated
  * FID #12236 (MS11-050) Microsoft Internet Explorer Drag and Drop Memory
Corruption (2530548)
    Recommendation is updated
  * FID #12237 (MS11-050) Microsoft Internet Explorer Time Element Memory
Corruption (2530548)
    Recommendation is updated
  * FID #12239 (MS11-050) Microsoft Internet Explorer DOM Modification
Memory Corruption (2530548)
    Recommendation is updated
  * FID #12241 (MS11-050) Microsoft Internet Explorer Layout Memory
Corruption (2530548)
    Recommendation is updated
  * FID #12242 (MS11-050) Microsoft Internet Explorer Selection Object
Memory Corruption (2530548)
    Recommendation is updated
  * FID #12244 (MS11-050) Microsoft Internet Explorer HTTP Redirect Memory
Corruption (2530548)
    Recommendation is updated
  * FID #12247 (MS11-041) Vulnerability In Windows Kernel-Mode Drivers
Could Allow Remote Code Execution (KB2525694)
    Recommendation is updated
  * FID #12253 (MS11-045) Vulnerabilities in Microsoft Excel Could Allow
Remote Code Execution (2537146)
    Recommendation is updated
  * FID #12254 (APSB11-16) Adobe Reader And Acrobat Multiple
Vulnerabilities
    Observation is updated
  * FID #12257 (MS11-045) Microsoft Excel WriteAV Remote Code Execution
(2537146)
    Recommendation is updated
  * FID #12262 (APSB11-18) Adobe Flash Player Memory Corruption Remote Code
Vulnerability
    Observation is updated
  * FID #12263 (APSB11-17) Adobe Shockwave Player Multiple Vulnerabilities
    Observation is updated
  * FID #12336 (MS11-054) Microsoft Windows Win32k Incorrect Parameter
Privilege Escalation (2555917)
    Recommendation is updated
  * FID #12337 (MS11-054) Microsoft Windows Win32k Null Pointer Dereference
Privilege Escalation IV (2555917)
    Recommendation is updated
  * FID #12338 (MS11-054) Microsoft Windows Win32k Null Pointer Dereference
Privilege Escalation V (2555917)
    Recommendation is updated
  * FID #12449 (MS11-057) Microsoft Internet Explorer Style Object Memory
Corruption Remote Code Execution (2559049)
    Recommendation is updated
  * FID #12450 (MS11-057) Microsoft Internet Explorer Telnet Handler Remote
Code Execution (2559049)
    Recommendation is updated
  * FID #12451 (MS11-057) Microsoft Internet Explorer Windows Open Race
Condition (2559049)
    Recommendation is updated
  * FID #12454 (MS11-057) Microsoft Internet Explorer XSLT Memory
Corruption Remote Code Execution (2559049)
    Recommendation is updated
  * FID #12466 (MS11-057) Cumulative Security Update for Internet Explorer
(2559049)
    Recommendation is updated
  * FID #12472 (MS11-068) Microsoft Kernel Metadata Parsing Could Allow
Denial of Service (2556532)
    Recommendation is updated
  * FID #12475 (MS11-068) Vulnerability in Windows Kernel Could Allow
Denial of Service (2556532)
    Recommendation is updated
  * FID #12616 (MS11-072) Microsoft Excel Conditional Expression Parsing
Remote Code Execution (2587505)
    Recommendation is updated
  * FID #12617 (MS11-072) Microsoft Excel Heap Corruption Remote Code
Execution (2587505)
    Recommendation is updated
  * FID #12618 (MS11-072) Microsoft Excel Out of Bounds Array Indexing
Remote Code Execution (2587505)
    Recommendation is updated
  * FID #12619 (MS11-072) Microsoft Excel Out of Bounds Array Indexing
Remote Code Execution II (2587505)
    Recommendation is updated
  * FID #12620 (MS11-072) Microsoft Excel Use after Free WriteAV Remote
Code Execution (2587505)
    Recommendation is updated
  * FID #12738 (MS11-077) Microsoft Windows Kernel-Mode Drivers Win32k Null
Pointer De-reference (2567053)
    Recommendation is updated
  * FID #12739 (MS11-077) Microsoft Windows Kernel-Mode Drivers Win32k
TrueType Font Type Translation (2567053)
    Recommendation is updated
  * FID #12740 (MS11-077) Microsoft Windows Kernel-Mode Drivers Font
Library File Buffer Overrun (2567053)
    Recommendation is updated
  * FID #12744 (MS11-077) Vulnerabilities In Windows Kernel-Mode Drivers
Could Allow Remote Code Execution (2567053)
    Recommendation is updated
  * FID #12750 (MS11-081) Microsoft IE Scroll Event Remote Code Execution
(2586448)
    Recommendation is updated
  * FID #12752 (MS11-081) Microsoft IE OLEAuto32.dll Remote Code Execution
(2586448)
    Recommendation is updated
  * FID #12753 (MS11-081) Microsoft IE Option Element Remote Code Execution
(2586448)
    Recommendation is updated
  * FID #12754 (MS11-081) Microsoft IE OnLoad Event Remote Code Execution
(2586448)
    Recommendation is updated
  * FID #12755 (MS11-081) Microsoft IE Select Element Remote Code Execution
(2586448)
    Recommendation is updated
  * FID #12756 (MS11-081) Microsoft IE Body Element Remote Code Execution
(2586448)
    Recommendation is updated
  * FID #12757 (MS11-081) Microsoft IE Virtual Function Table Corruption
Remote Code Execution (2586448)
    Recommendation is updated
  * FID #12763 (MS11-081) Cumulative Security Update for Internet Explorer
(2586448)
    Recommendation is updated
  * FID #12799 (MS11-081) Microsoft IE Jscript9.dll Remote Code Execution
(2586448)
    Recommendation is updated
  * FID #12832 (MS11-091) Microsoft Publisher Function Pointer Overwrite
(2607702)
    Name is updated
    FASLScript is updated
  * FID #12891 (MS11-087) Microsoft Windows TrueType Font Parsing (2639417)
    Name is updated
    FASLScript is updated
  * FID #12913 (MS11-084) Microsoft Windows TrueType Font Parsing Denial of
Service (2617657)
    Recommendation is updated
  * FID #13064 (MS11-099) Microsoft Internet Explorer Insecure Library
Loading (2618444)
    FASLScript is updated
  * FID #13067 (MS11-090) Microsoft Time Remote Code Execution (2618451)
    FASLScript is updated
  * FID #13068 (MS11-091) Microsoft Publisher Invalid Pointer (2607702)
    FASLScript is updated
  * FID #13069 (MS11-091) Microsoft Publisher Memory Corruption (2607702)
    FASLScript is updated
  * FID #13071 (MS11-091) Microsoft Publisher Out-of-bounds Array Index
(2607702)
    FASLScript is updated
  * FID #13072 (MS11-087) Vulnerability in Windows Kernel-Mode Drivers
Could Allow Remote Code Execution (2639417)
    FASLScript is updated
  * FID #13073 (MS11-090) Cumulative Security Update of ActiveX Kill Bits
(2618451)
    FASLScript is updated
  * FID #13076 (MS11-091) Vulnerabilities in Microsoft Publisher Could
Allow Elevation of Privilege (2607702)
    FASLScript is updated
  * FID #13078 (MS11-092) Microsoft Windows Media Player DVR-MS Memory
Corruption (2648048)
    FASLScript is updated
  * FID #13079 (MS11-093) Microsoft Windows OLE Property (2624667)
    FASLScript is updated
  * FID #13080 (MS11-094) Microsoft PowerPoint Insecure Library Loading
(2639142)
    FASLScript is updated
  * FID #13081 (MS11-094) Microsoft PowerPoint OfficeArt Shape RCE
(2639142)
    FASLScript is updated
  * FID #13082 (MS11-095) Microsoft Active Directory Buffer Overflow
(2640045)
    FASLScript is updated
  * FID #13083 (MS11-096) Microsoft Excel Record Memory Corruption
(2640241)
    FASLScript is updated
  * FID #13084 (MS11-092) Vulnerability in Windows Media Could Allow Remote
Code Execution (2648048)
    FASLScript is updated
  * FID #13085 (MS11-093) Vulnerability in OLE Could Allow Remote Code
Execution (2624667)
    FASLScript is updated
  * FID #13086 (MS11-094) Vulnerabilities in Microsoft PowerPoint Could
Allow Remote Code Execution (2639142)
    FASLScript is updated
  * FID #13087 (MS11-095) Vulnerability in Active Directory Could Allow
Remote Code Execution (2640045)
    FASLScript is updated
  * FID #13088 (MS11-096) Vulnerability in Microsoft Excel Could Allow
Remote Code Execution (2640241)
    FASLScript is updated
  * FID #5016 (MS07-033) Microsoft Internet Explorer 7 Navigation Cancel
Page Spoofing Vulnerability (933566)
    Recommendation is updated
  * FID #5228 (MS07-033) Microsoft COM Object Instantiation Memory
Corruption Vulnerability (933566)
    Recommendation is updated
  * FID #5229 (MS07-033) Microsoft CSS Tag Memory Corruption Vulnerability
(933566)
    Recommendation is updated
  * FID #5354 (MS07-057) Microsoft Internet Explorer Address Bar Spoofing
Vulnerability III (939653)
    Recommendation is updated
  * FID #5415 (MS07-045) Microsoft Internet Explorer CSS Memory Corruption
Vulnerability (937143)
    Recommendation is updated
  * FID #5416 (MS07-045) Microsoft Internet Explorer ActiveX Object
Vulnerability (937143)
    Recommendation is updated
  * FID #5417 (MS07-045) Microsoft Internet Explorer ActiveX Object Memory
Corruption Vulnerability (937143)
    Recommendation is updated
  * FID #5516 (MS07-057) Microsoft Internet Explorer Address Bar Spoofing
Vulnerability I (939653)
    Recommendation is updated
  * FID #5520 (MS07-057) Microsoft Internet Explorer Address Bar Spoofing
Vulnerability II (939653)
    Recommendation is updated
  * FID #5626 (MS07-066) Microsoft Windows Kernel Vulnerability (943078)
    Recommendation is updated
  * FID #5628 (MS07-069) Microsoft Internet Explorer Uninitialized Memory
Corruption Vulnerability I (942615)
    Recommendation is updated
  * FID #5629 (MS07-069) Microsoft Internet Explorer Uninitialized Memory
Corruption Vulnerability II (942615)
    Recommendation is updated
  * FID #5630 (MS07-069) Microsoft Internet Explorer Uninitialized Memory
Corruption Vulnerability III(942615)
    Recommendation is updated
  * FID #5631 (MS07-069) Microsoft Internet Explorer DHTML Objects Memory
Corruption Vulnerabilities (942615)
    Recommendation is updated
  * FID #5701 (MS08-010) Microsoft HTML Rendering Memory Corruption
Vulnerability (944533)
    Recommendation is updated
  * FID #5702 (MS08-010) Microsoft Property Memory Corruption Vulnerability
(944533)
    Recommendation is updated
  * FID #5703 (MS08-010) Microsoft Argument Handling Memory Corruption
Vulnerability (944533)
    Recommendation is updated
  * FID #5704 (MS08-010) Microsoft ActiveX Object Memory Corruption
Vulnerability (944533)
    Recommendation is updated
  * FID #5805 (MS08-025) Microsoft Windows Kernel Vulnerability (941693)
    Recommendation is updated
  * FID #5806 (MS08-024) Microsoft Data Stream Handling Memory Corruption
Vulnerability (947864)
    Recommendation is updated
  * FID #5807 (MS08-023) Microsoft ActiveX Object Memory Corruption
Vulnerability (948881)
    Recommendation is updated
  * FID #5920 (MS08-031) Microsoft HTML Objects Memory Corruption
Vulnerability (950759)
    Recommendation is updated
  * FID #5921 (MS08-031) Microsoft Request Header Cross-Domain Information
Disclosure Vulnerability (950759)
    Recommendation is updated
  * FID #5922 (MS08-032) Microsoft Speech API Vulnerability (950760)
    Recommendation is updated
  * FID #6052 (MS08-045) Microsoft HTML Objects Memory Corruption
Vulnerability I (953838)
    Recommendation is updated
  * FID #6053 (MS08-045) Microsoft HTML Objects Memory Corruption
Vulnerability II (953838)
    Recommendation is updated
  * FID #6054 (MS08-045) Microsoft Uninitialized Memory Corruption
Vulnerability (953838)
    Recommendation is updated
  * FID #6055 (MS08-045) Microsoft HTML Objects Memory Corruption
Vulnerability III (953838)
    Recommendation is updated
  * FID #6056 (MS08-045) Microsoft HTML Objects Memory Corruption
Vulnerability IV (953838)
    Recommendation is updated
  * FID #6057 (MS08-045) Microsoft Component Handling Memory Corruption
Vulnerability (953838)
    Recommendation is updated
  * FID #6064 (MS08-051) Microsoft Memory Allocation Vulnerability (949785)
    Recommendation is updated
  * FID #6065 (MS08-051) Microsoft Memory Calculation Vulnerability
(949785)
    Recommendation is updated
  * FID #6066 (MS08-051) Microsoft Parsing Overflow Vulnerability (949785)
    Recommendation is updated
  * FID #6164 (MS08-064) Microsoft Virtual Address Descriptor Elevation of
Privilege Vulnerability (956841)
    Recommendation is updated
  * FID #6169 (MS08-061) Microsoft Windows Kernel Window Creation
Vulnerability (954211)
    Recommendation is updated
  * FID #6170 (MS08-061) Microsoft Windows Kernel Unhandled Exception
Vulnerability (954211)
    Recommendation is updated
  * FID #6171 (MS08-061) Microsoft Windows Kernel Memory Corruption
Vulnerability (954211)
    Recommendation is updated
  * FID #6172 (MS08-058) Microsoft HTML Tag Element Cross-Domain
Information Disclosure Vulnerability (956390)
    Recommendation is updated
  * FID #6173 (MS08-058) Microsoft Source Element Cross-Domain Information
Disclosure Vulnerability (956390)
    Recommendation is updated
  * FID #6174 (MS08-058) Microsoft Window Location Property Cross-Domain
Information Disclosure Vulnerability (956390)
    Recommendation is updated
  * FID #6175 (MS08-058) Microsoft Uninitialized Memory Corruption
Vulnerability (956390)
    Recommendation is updated
  * FID #6176 (MS08-058) Microsoft HTML Objects Memory Corruption
Vulnerability (956390)
    Recommendation is updated
  * FID #6177 (MS08-058) Microsoft Internet Explorer
CPeerHolder::CPeerSite::QueryService() Vulnerability  (KB956390)
    Recommendation is updated
  * FID #6493 (MS09-006) Windows Kernel Handle Validation Vulnerability
(958690)
    Recommendation is updated
  * FID #6494 (MS09-006) Windows Kernel Invalid Pointer Vulnerability
(958690)
    Recommendation is updated
  * FID #6744 (MS09-019) Microsoft Internet Explorer Cross-Domain
Information Disclosure Vulnerability (969897)
    Recommendation is updated
  * FID #6750 (MS09-019) Microsoft Internet Explorer Race Condition
Cross-Domain Information Disclosure Vulnerability (969897)
    Recommendation is updated
  * FID #6766 (MS09-025) Microsoft Windows Desktop Parameter Edit
Vulnerability (968537)
    Recommendation is updated
  * FID #6767 (MS09-025) Microsoft Windows Driver Class Registration
Vulnerability (968537)
    Recommendation is updated
  * FID #6768 (MS09-025) Microsoft Windows Kernel Desktop Vulnerability
(968537)
    Recommendation is updated
  * FID #6769 (MS09-025) Microsoft Windows Kernel Pointer Validation
Vulnerability (968537)
    Recommendation is updated
  * FID #6843 (MS09-032) Microsoft Cumulative Security Update of ActiveX
Kill Bits (973346)
    Recommendation is updated
  * FID #7202 (MS09-058) Windows Kernel Exception Handler Vulnerability
(971486)
    Recommendation is updated
  * FID #7203 (MS09-058) Windows Kernel Integer Underflow Vulnerability
(971486)
    Recommendation is updated
  * FID #7204 (MS09-058) Windows Kernel NULL Pointer Dereference
Vulnerability (971486)
    Recommendation is updated
  * FID #7227 (MS09-058) Vulnerabilities In Windows Kernel Could Allow
Elevation of Privilege (971486)
    Recommendation is updated
  * FID #7544 (MS09-025) Vulnerabilities In Windows Kernel Could Allow
Elevation of Privilege (968537)
    Recommendation is updated
  * FID #7551 (MS09-032) Cumulative Security Update Of ActiveX Kill Bits
(973346)
    Recommendation is updated
  * FID #7723 (MS10-002) Microsoft Internet Explorer XSS Filter Script
Handling Vulnerability (978207)
    Recommendation is updated
  * FID #7732 (MS08-025) Vulnerability In Windows Kernel Could Allow
Elevation Of Privilege (941693)
    Recommendation is updated
  * FID #7855 (MS10-011) Microsoft Windows CSRSS Local Privilege Escalation
Vulnerability (978037)
    Recommendation is updated
  * FID #7860 (MS10-015) Windows Kernel Exception Handler Vulnerability
(977165)
    Recommendation is updated
  * FID #7861 (MS10-015) Windows Kernel Double Free Vulnerability (977165)
    Recommendation is updated
  * FID #7885 (MS10-011) Vulnerability In Windows Client/Server Run-time
Subsystem Could Allow Elevation Of Privilege (978037)
    Recommendation is updated
  * FID #7889 (MS10-015) Vulnerabilities in Windows Kernel Could Allow
Elevation of Privilege (977165)
    Recommendation is updated
  * FID #8020 (MS08-058) Cumulative Security Update For Internet Explorer
(956390)
    Recommendation is updated
  * FID #8054 (MS08-064) Vulnerability In Virtual Address Descriptor
Manipulation Could Allow Elevation Of Privilege (956841)
    Recommendation is updated
  * FID #8106 (MS10-017) Microsoft Office Excel Record Memory Corruption
Vulnerability (980150)
    Recommendation is updated
  * FID #8107 (MS10-017) Microsoft Office Excel Sheet Object Type Confusion
Vulnerability (980150)
    Recommendation is updated
  * FID #8108 (MS10-017) Microsoft Office Excel MDXTUPLE Record Heap
Overflow Vulnerability (980150)
    Recommendation is updated
  * FID #8109 (MS10-017) Microsoft Office Excel MDXSET Record Heap Overflow
Vulnerability (980150)
    Recommendation is updated
  * FID #8110 (MS10-017) Microsoft Office Excel FNGROUPNAME Record
Uninitialized Memory Vulnerability (980150)
    Recommendation is updated
  * FID #8111 (MS10-017) Microsoft Office Excel XLSX File Parsing Code
Execution Vulnerability (980150)
    Recommendation is updated
  * FID #8112 (MS10-017) Microsoft Office Excel DbOrParamQry Record Parsing
Vulnerability (980150)
    Recommendation is updated
  * FID #8327 (MS10-018) Microsoft Internet Explorer HTML Element
Cross-Domain Vulnerability (980182)
    Recommendation is updated
  * FID #8331 (MS10-018) Microsoft Internet Explorer Post Encoding
Information Disclosure Vulnerability (980182)
    Recommendation is updated
  * FID #8521 (MS10-021) Microsoft Windows Kernel Memory Allocation
Vulnerability (979683)
    Recommendation is updated
  * FID #8522 (MS10-021) Microsoft Windows Kernel Symbolic Link Creation
Vulnerability (979683)
    Recommendation is updated
  * FID #8545 (MS10-021) Vulnerabilities in Windows Kernel Could Allow
Elevation of Privilege (979683)
    Recommendation is updated
  * FID #9063 (MS10-032) Vulnerabilities In Windows Kernel-Mode Drivers
Could Allow Remote Code Execution (979559)
    Recommendation is updated
  * FID #9066 (MS10-036) Vulnerabilities In COM Validation In Microsoft
Office Could Allow Remote Code Execution (983235)
    Recommendation is updated
  * FID #9073 (MS10-032) Microsoft Windows Win32k Improper Data Validation
Vulnerability (979559)
    Recommendation is updated
  * FID #9074 (MS10-032) Microsoft Windows Win32k Window Creation
Vulnerability (979559)
    Recommendation is updated
  * FID #9075 (MS10-032) Microsoft Windows Win32k TrueType Font Parsing
Vulnerability (979559)
    Recommendation is updated
  * FID #9077 (MS10-035) Microsoft Internet Explorer toStaticHTML
Information Disclosure Vulnerability (982381)
    Recommendation is updated
  * FID #9088 (MS10-038) Microsoft Office Excel Record Parsing Memory
Corruption Vulnerability (2027452)
    Recommendation is updated
  * FID #9089 (MS10-038) Microsoft Office Excel Object Stack Overflow
Vulnerability (2027452)
    Recommendation is updated
  * FID #9090 (MS10-038) Microsoft Office Excel Memory Corruption
Vulnerability (2027452)
    Recommendation is updated
  * FID #9091 (MS10-038) Microsoft Office Excel Record Memory Corruption
Vulnerability (2027452)
    Recommendation is updated
  * FID #9092 (MS10-038) Microsoft Office Excel Record Memory Corruption
Vulnerability (2027452) CVE-2010-1245
    Recommendation is updated
  * FID #9093 (MS10-038) Microsoft Office Excel RTD Memory Corruption
Vulnerability (2027452)
    Recommendation is updated
  * FID #9094 (MS10-038) Microsoft Excel Memory Corruption Vulnerability
(2027452)
    Recommendation is updated
  * FID #9095 (MS10-038) Microsoft Excel HFPicture Memory Corruption
Vulnerability (2027452)
    Recommendation is updated
  * FID #9096 (MS10-038) Microsoft Excel Memory Corruption Vulnerability II
(2027452)
    Recommendation is updated
  * FID #9097 (MS10-038) Microsoft Excel EDG Memory Corruption
Vulnerability (2027452)
    Recommendation is updated
  * FID #9098 (MS10-038) Microsoft Excel Record Stack Corruption
Vulnerability (2027452)
    Recommendation is updated
  * FID #9099 (MS10-038) Microsoft Excel String Variable Vulnerability
(2027452)
    Recommendation is updated
  * FID #9100 (MS10-038) Microsoft Excel ADO Object Vulnerability (2027452)
    Recommendation is updated
  * FID #9682 (MS10-047) Microsoft Windows Kernel Improper Validation
Vulnerability (981852)
    Recommendation is updated
  * FID #9683 (MS10-047) Microsoft Windows Kernel Double Free Vulnerability
(981852)
    Recommendation is updated
  * FID #9684 (MS10-047) Microsoft Windows Kernel Data Initialization
Vulnerability (981852)
    Recommendation is updated
  * FID #9715 (MS10-047) Vulnerabilities in Windows Kernel Could Allow
Elevation of Privilege (981852)
    Recommendation is updated
  * FID #9722 (MS10-048) Vulnerabilities in Windows Kernel-Mode Drivers
Could Allow Elevation of Privilege (2160329)
    Recommendation is updated
  * FID #10358 (MS10-073) Vulnerabilities in Windows Kernel-Mode Drivers
Could Allow Elevation of Privilege (981957)
    Recommendation is updated
  * FID #10360 (MS10-073) Microsoft Windows Win32K Reference Count
Privilege Escalation (981957)
    Recommendation is updated
  * FID #10361 (MS10-073) Microsoft Windows Win32K Keyboard Layout
Privilege Escalation (981957)
    Recommendation is updated
  * FID #10362 (MS10-073) Microsoft Windows Win32k Window Class Privilege
Escalation (981957)
    Recommendation is updated
  * FID #10383 (MS10-080) Vulnerabilities in Microsoft Excel Could Allow
Remote Code Execution (2293211)
    Recommendation is updated
  * FID #10869 (MS10-098) Vulnerabilities in Windows Kernel-Mode Drivers
Could Allow Elevation of Privilege (2436673)
    Recommendation is updated
  * FID #10879 (MS10-103) Microsoft Office Suites and Components Size Value
Heap Corruption in pubconv.dll Vulnerability (2292970)
    Recommendation is updated
  * FID #10880 (MS10-103) Microsoft Office Suites Heap Overrun in
pubconv.dll Vulnerability (2292970)
    Recommendation is updated
  * FID #10891 (MS10-090) Microsoft Internet Explorer Cross-Domain
Information Disclosure Vulnerability CVE-2010-3342 (2416400)
    Recommendation is updated
  * FID #10895 (MS10-090) Microsoft Internet Explorer Cross-Domain
Information Disclosure Vulnerability CVE-2010-3348 (2416400)
    Recommendation is updated
  * FID #10898 (MS10-098) Microsoft Windows Win32k Buffer Overflow Could
Allow Elevation Of Privilege (2436673)
    Recommendation is updated
  * FID #10899 (MS10-098) Microsoft Windows Win32k Buffer Overflow Could
Allow Elevation Of Privilege CVE-2010-3940 (2436673)
    Recommendation is updated
  * FID #10900 (MS10-098) Microsoft Windows Win32k Double Free Could Allow
Elevation Of Privilege (2436673)
    Recommendation is updated
  * FID #10901 (MS10-098) Microsoft Windows Win32k WriteAV Could Allow
Elevation Of Privilege (2436673)
    Recommendation is updated
  * FID #10902 (MS10-098) Microsoft Windows Win32k Cursor Linking Could
Allow Elevation Of Privilege (2436673)
    Recommendation is updated
  * FID #10903 (MS10-098) Microsoft Windows Win32k Memory Corruption Could
Allow Elevation Of Privilege (2436673)
    Recommendation is updated
  * FID #11241 (MS11-010) Windows Client/Server Run-time Subsystem
Elevation of Privilege (2476687)
    Recommendation is updated
  * FID #11244 (MS11-012) Microsoft Win32k Improper User Input Validation
(2479628)
    Recommendation is updated
  * FID #11245 (MS11-012) Microsoft Win32k Insufficient User Input
Validation (2479628)
    Recommendation is updated
  * FID #11246 (MS11-012) Microsoft Win32k Window Class Pointer Confusion
(2479628)
    Recommendation is updated
  * FID #11247 (MS11-012) Microsoft Win32k Window Class Improper Pointer
Validation (2479628)
    Recommendation is updated
  * FID #11248 (MS11-012) Microsoft Win32k Memory Corruption (2479628)
    Recommendation is updated
  * FID #11251 (MS11-003) Microsoft Internet Explorer Insecure Library
Loading (2482017)
    Recommendation is updated
  * FID #11256 (MS11-010) Vulnerability In Windows Client/Server Run-time
Subsystem Could Allow Elevation Of Privilege (2476687)
    Recommendation is updated
  * FID #11266 (MS11-012) Vulnerabilities In Windows Kernel-Mode Drivers
Could Allow Elevation Of Privilege (2479628)
    Recommendation is updated
  * FID #11770 (MS11-034) Vulnerabilities in Windows Kernel-Mode Drivers
Could Allow Elevation of Privilege (2506223)
    Recommendation is updated
  * FID #11789 (MS11-018) Microsoft Internet Explorer Frame Tag Information
Disclosure (2497640)
    Recommendation is updated
  * FID #11791 (MS11-034) Microsoft Win32k Use After Free I (2506223)
    Recommendation is updated
  * FID #11792 (MS11-034) Microsoft Win32k Use After Free II (2506223)
    Recommendation is updated
  * FID #11793 (MS11-034) Microsoft Win32k Use After Free III (2506223)
    Recommendation is updated
  * FID #11794 (MS11-034) Microsoft Win32k Use After Free IV (2506223)
    Recommendation is updated
  * FID #11795 (MS11-034) Microsoft Win32k Use After Free V (2506223)
    Recommendation is updated
  * FID #11796 (MS11-034) Microsoft Win32k Use After Free VI (2506223)
    Recommendation is updated
  * FID #11797 (MS11-034) Microsoft Win32k Use After Free VII (2506223)
    Recommendation is updated
  * FID #11798 (MS11-034) Microsoft Win32k Use After Free VIII (2506223)
    Recommendation is updated
  * FID #11799 (MS11-034) Microsoft Win32k Use After Free IX (2506223)
    Recommendation is updated
  * FID #11800 (MS11-034) Microsoft Win32k Use After Free X (2506223)
    Recommendation is updated
  * FID #11801 (MS11-034) Microsoft Win32k Use After Free XI (2506223)
    Recommendation is updated
  * FID #11802 (MS11-034) Microsoft Win32k Use After Free XII (2506223)
    Recommendation is updated
  * FID #11803 (MS11-034) Microsoft Win32k Use After Free XIII (2506223)
    Recommendation is updated
  * FID #11804 (MS11-034) Microsoft Win32k Use After Free XIV (2506223)
    Recommendation is updated
  * FID #11805 (MS11-034) Microsoft Win32k Use After Free XV (2506223)
    Recommendation is updated
  * FID #11806 (MS11-034) Microsoft Win32k Use After Free XVI (2506223)
    Recommendation is updated
  * FID #11807 (MS11-034) Microsoft Win32k Use After Free XVII (2506223)
    Recommendation is updated
  * FID #11808 (MS11-034) Microsoft Win32k Null Pointer Dereference
Privilege Escalation I (2506223)
    Recommendation is updated
  * FID #11809 (MS11-034) Microsoft Win32k Null Pointer Dereference
Privilege Escalation II (2506223)
    Recommendation is updated
  * FID #11810 (MS11-034) Microsoft Win32k Null Pointer Dereference
Privilege Escalation III (2506223)
    Recommendation is updated
  * FID #11811 (MS11-034) Microsoft Win32k Null Pointer Dereference
Privilege Escalation IV (2506223)
    Recommendation is updated
  * FID #11812 (MS11-034) Microsoft Win32k Null Pointer Dereference
Privilege Escalation V (2506223)
    Recommendation is updated
  * FID #11813 (MS11-034) Microsoft Win32k Null Pointer Dereference
Privilege Escalation VI (2506223)
    Recommendation is updated
  * FID #11814 (MS11-034) Microsoft Win32k Null Pointer Dereference
Privilege Escalation VII (2506223)
    Recommendation is updated
  * FID #11815 (MS11-034) Microsoft Win32k Null Pointer Dereference
Privilege Escalation VIII (2506223)
    Recommendation is updated
  * FID #11816 (MS11-034) Microsoft Win32k Null Pointer Dereference
Privilege Escalation IX (2506223)
    Recommendation is updated
  * FID #11817 (MS11-034) Microsoft Win32k Null Pointer Dereference
Privilege Escalation X (2506223)
    Recommendation is updated
  * FID #11818 (MS11-034) Microsoft Win32k Null Pointer Dereference
Privilege Escalation XI (2506223)
    Recommendation is updated
  * FID #11819 (MS11-034) Microsoft Win32k Null Pointer Dereference
Privilege Escalation XII (2506223)
    Recommendation is updated
  * FID #11828 (MS11-018) Microsoft Internet Explorer Javascript
Information Disclosure (2497640)
    Recommendation is updated
  * FID #11836 (MS11-034) Microsoft Win32k Use After Free XVIII (2506223)
    Recommendation is updated
  * FID #12105 (APSB11-09) Adobe RoboHelp Cross-Site Scripting
Vulnerability
    Observation is updated
  * FID #12232 (MS11-050) Microsoft Internet Explorer MIME Sniffing
Information Disclosure (2530548)
    Recommendation is updated
  * FID #12235 (MS11-050) Microsoft Internet Explorer toStaticHTML
Information Disclosure (2530548)
    Recommendation is updated
  * FID #12240 (MS11-050) Microsoft Internet Explorer Drag and Drop
Information Disclosure (2530548)
    Recommendation is updated
  * FID #12324 (MS11-054) Microsoft Windows Win32k Use After Free Privilege
Escalation I (2555917)
    Recommendation is updated
  * FID #12325 (MS11-054) Microsoft Windows Win32k Use After Free Privilege
Escalation II (2555917)
    Recommendation is updated
  * FID #12326 (MS11-054) Microsoft Windows Win32k Use After Free Privilege
Escalation III (2555917)
    Recommendation is updated
  * FID #12327 (MS11-054) Microsoft Windows Win32k Use After Free Privilege
Escalation IV (2555917)
    Recommendation is updated
  * FID #12328 (MS11-054) Microsoft Windows Win32k Use After Free Privilege
Escalation V (2555917)
    Recommendation is updated
  * FID #12329 (MS11-054) Microsoft Windows Win32k Use After Free Privilege
Escalation VI (2555917)
    Recommendation is updated
  * FID #12330 (MS11-054) Microsoft Windows Win32k Null Pointer Dereference
Privilege Escalation I (2555917)
    Recommendation is updated
  * FID #12331 (MS11-054) Microsoft Windows Win32k Null Pointer Dereference
Privilege Escalation II (2555917)
    Recommendation is updated
  * FID #12332 (MS11-054) Microsoft Windows Win32k Use After Free Privilege
Escalation VII (2555917)
    Recommendation is updated
  * FID #12333 (MS11-054) Microsoft Windows Win32k Use After Free Privilege
Escalation VIII (2555917)
    Recommendation is updated
  * FID #12334 (MS11-054) Microsoft Windows Win32k Use After Free Privilege
Escalation IX (2555917)
    Recommendation is updated
  * FID #12335 (MS11-054) Microsoft Windows Win32k Null Pointer Dereference
Privilege Escalation III (2555917)
    Recommendation is updated
  * FID #12446 (MS11-057) Microsoft Internet Explorer Event Handlers
Information Disclosure (2559049)
    Recommendation is updated
  * FID #12448 (MS11-057) Microsoft Internet Explorer Shift JIS Character
Encoding Information Disclosure (2559049)
    Recommendation is updated
  * FID #12627 (MS11-072) Vulnerabilities in Microsoft Excel Could Allow
Remote Code Execution (2587505)
    Recommendation is updated
  * FID #12741 (MS11-077) Microsoft Windows Kernel-Mode Drivers Win32k Use
After Free (2567053)
    Recommendation is updated
  * FID #12910 (MS11-086) Microsoft Windows Active Directory LDAPS
Authentication Bypass Privilege Escalation (2630837)
    Recommendation is updated
  * FID #12912 (MS11-086) Vulnerability in Active Directory Could Allow
Elevation of Privilege (2630837)
    Recommendation is updated
  * FID #12914 (MS11-084) Vulnerability in Microsoft Windows Kernel-Mode
Drivers Could Allow Denial of Service (2617657)
    Recommendation is updated
  * FID #13063 (MS11-099) Microsoft Internet Explorer Content-Disposition
Information Disclosure (2618444)
    FASLScript is updated
  * FID #13065 (MS11-099) Microsoft Internet Explorer XSS Filter
Information Disclosure (2618444)
    FASLScript is updated
  * FID #12342 (MS11-054) Vulnerabilities in Windows Kernel-Mode Drivers
Could Allow Elevation of Privilege (2555917)
    Recommendation is updated
  * FID #12447 (MS11-057) Microsoft Internet Explorer Drag And Drop
Information Disclosure (2559049)
    Recommendation is updated
  * FID #45001 ShellInitialize.fasl3
    FASLScript is updated
  * FID #70072 general-helpers.fasl3.inc
    FASLScript is updated

削除されたチェック項目:

  * FID #7983 CA ARCserve Backup LDBServer Remote Code Execution Vulnerability

-------------------------------------------------------
2) アプライアンス OSパッチアップデート
-------------------------------------------------------
 期間: 2011/12/15 ~ 2011/12/16 (日本時間)

今回のアップデートはございません。

-------------------------------------------------------
3) 第3回 バーチャルサポートセミナー開催のお知らせ
-------------------------------------------------------
○ お知らせ

マカフィーのテクニカルサポートが、製品の新機能や検証結果などの技術情報を解説する、
バーチャルセミナーをマカフィー 企業向け製品コミュニティサイト上で開催いたします。

● 公開開始日
2011/12/26(月)

○ 公開場所
マカフィー 企業向け製品コミュニティサイト

● セミナー概要
本セミナーは、McAfee製品をご使用されているユーザ様と日々トラブル対応を行ってい
る、テクニカルサポートの視点から、技術情報を発信していくセミナーとなります。
新機能の検証結果やそれに基づく推奨の使い方、トラブルシューティングなどの情報を
デモを使用してご覧いただき、日々の運用にご活用ください。

○ 視聴方法
1. マカフィー企業向けコミュニティサイト「Japan Corporate Support」にアクセスし
    ます。
    https://community.mcafee.com/community/japan
2. 画面左のカテゴリー欄から「Virtual Support Seminar」を選択します。
3. ご覧になりたいプログラムを選択します。

● 「マカフィー バーチャルサポートセミナー」についてのご案内ページ
http://www.mcafee.com/Japan/support/virtualseminar.asp

-------------------------------------------------------
4) 企業向けの年末年始のサポート体制について
-------------------------------------------------------
○ お知らせ

企業向けの年末年始のサポート体制についてお知らせいたします。


● マカフィー スタンダード/ライト・テクニカルサポート

年末サポート終了日時:2011/12/28 (水) 17:00 まで
年始サポート開始日時:2012/01/05 (木) 9:00 より


○ マカフィー シルバー・テクニカルサポート

年末サポート終了日時:2011/12/28 (水) 21:00 まで
年始サポート開始日時:2012/01/05 (木) 9:00 より


● マカフィー ゴールド・ビジネス/ゴールド・エンハンスド・ビジネス サポート

24時間365日の対応となりますが、以下の年末年始期間は Severity 1,2 のみの対応とな
ります。

2011/12/28 (水) 17:00 - 2012/01/05 (木) 9:00


○ マカフィー プラチナ・エンタープライズ/プラチナ・グローバル・エンタープライズ サポート

24時間365日の対応となりますが、以下の年末年始期間は Severity 1,2 のみの対応とな
ります。

2011/12/28 (水) 17:00 - 2012/01/05 (木) 9:00

● ハードウェア代替機の発送について
対象製品 :
 ・Email and Web Security Appliance 3000
  ※ハードウェアの世代によりオンサイトサポートの場合があります。
 ・Network Security Platform
 ・Email Gateway Appliance
  ※ハードウェアの世代によりオンサイトサポートの場合があります。
 ・Firewall Enterprise Appliances
  ※ハードウェアによりオンサイトサポートの場合があります。
 ・Vulnerability Manager 3100 Appliance
 ・Encrypted USB


  年末受付終了日時:2011/12/28(水)15:00まで
  年始受付開始日時:2012/1/5(木)9:00より

○ ハードウェアオンサイトサポートについて
対象製品 :
 ・Email and Web Security Appliance
  ※Email and Web Security Appliance  3000はハードウェアの世代により
  代替着出荷対応の場合があります。
 ・Email Security Appliance
 ・Web Security Appliance
  ・Web Gateway Appliance
  ・Email Gateway Appliance
  ※ハードウェアの世代により代替着出荷対応の場合があります。
  ・Firewall Enterprise Appliances
  ※ハードウェアにより代替着出荷対応の場合があります。
  ・Vulnerability Manager 3000 Appliance
  ・Foundstone Appliance FS1000/FS850


  年末受付終了日時:2011/12/28(水)15:00まで
  年始受付開始日時:2012/1/5(木)9:00より

注)ハードウェアオンサイトサポートアップグレードをご購入のお客様は
  24時間365日の対応となります。


※上記内容に関して、危険度の高いウイルスが発生した場合、契約ユーザー様に
告知するとともに、サポートセンターを臨時に開設する場合があります。
サポートセンターへの連絡先(TEL)につきましては、緊急ウイルス発令時に
以下のページにて告知をいたします。(承認番号と製品コードの入力が必要となります)
  http://www.mcafee.com/japan/licensed2/

※ 緊急ウイルス発令時の問い合わせ内容につきましては、該当するウイルスに関する内
容のみとさせて頂き、製品関連のお問い合わせについては年始営業開始日より対応させて
いただきます。

-------------------------------------------------------
5) McAfee Vulnerability Manager Software v6.8のサポート終了について
-------------------------------------------------------
McAfee Vulnerability Manager Softwareにつきまして、以下のバージョンの
サポート終了を予定しておりますのでご案内いたします。

McAfee Vulnerability Manager Software v6.8
サポート終了日:2012年6月30日

■備考
・現在の最新バージョンは、McAfee Vulnerability Manager Software v7.0です。
・本バージョンへの移行などに関しましては、弊社サポート窓口までお問い合わせください。
・ソフトウェアンおよびドキュメントは下記ダウンロードページよりご入手いただけます。
 http://www.mcafee.com/japan/licensed2/

-------------------------------------------------------
6) McAfee Risk Advisor 2.6.2のリリースについて
-------------------------------------------------------
McAfee Risk Advisorの新バージョン2.6.2の日本でのリリースについてご案内いたします。

■対象製品
 McAfee Risk Advisor 2.6.2

■リリース日
 2011年11月18日(金)(Webダウンロード)
 http://www.mcafee.com/japan/licensed2/
※サポート契約が有効なお客様のみダウンロードできます。
※ダウンロードにはご契約サポートの承認番号と購入型番(SKU)が必要になります。

■新機能概要
このバージョンより追加される主な新機能は以下になります。

・Vulnerability Centric ViewでのQuick Search機能:
 ユーザは、脆弱性名、説明、CVE References、脅威名などのフィールド情報をフィルタ
 リングして、特定の脆弱性を検索できます
・リスク解析時間の減少
・McAfee Application Inventory プラグインとの後方互換性:
 McAfee Risk Advisor 2.6.2 サーバは、v2.6.1より追加されたApplication Inventory
 プラグインをサポートします。

その他新機能や修正された問題については、ダウンロードサイト内のリリースノートを
ご参照ください。

-------------------------------------------------------
7) McAfee Policy Auditor 6.0のリリースおよび5.2のサポート終了について
-------------------------------------------------------
McAfee Policy Auditorの新バージョン6.0の日本でのリリースおよび旧バージョン5.2の
サポート終了(EOS)についてご案内いたします。

■対象製品
 McAfee Policy Auditor 6.0
 McAfee Policy Auditor 5.2 (EOS)

■バージョン6.0のリリース日について
 2011年11月18日(金)(Webダウンロード)
 http://www.mcafee.com/japan/licensed2/
※サポート契約が有効なお客様のみダウンロードできます。
※ダウンロードにはご契約サポートの承認番号と購入型番(SKU)が必要になります。

■バージョン6.0新機能概要
このバージョンより追加される主な新機能は以下になります。

・McAfee Policy Auditor コンテンツ作成ツール:
 このツールを使用して、McAfee AgentとMcAfee Policy Auditor Agent プラグインが
 対応するOS用にカスタムベンチマークとカスタム検査を作成できます。
・サーバ パフォーマンスの向上:
 サーバ データベースが改善されストレージの重複を排除し、処理速度が高速化しました。
・使用権レポート:
 使用権レポートは、McAfee Policy Auditor ファイル整合性監視機能の拡張機能で、
 読み取り属性、書き込み属性などのファイルの使用権を監視します。
・OVAL 5.7 から 5.9 のサポート:
 Open Vulnerability and Assessment Language (OVAL) 5.7、5.8、5.9 のサポートが
 追加されました。

その他新機能や修正された問題については、ダウンロードサイト内のリリースノートを
ご参照ください。

■旧バージョン5.2のサポート終了について
新バージョン6.0の提供開始に伴い、旧バージョン5.2のサポートが終了となります。
今後のサポート対象バージョンは、バージョン5.3および6.0になります。

-------------------------------------------------------
8) サポートコミュニティサイトでのテクニカルドキュメント公開
-------------------------------------------------------
サポートコミュニティサイト「Japan Corporate Support」にVulnerability Manager
に関する下記のテクニカルドキュメントを公開いたしましたので、是非ご覧ください。

i) Vulnerability Manager v6.8(MVM3100)評価ガイド
     MVM3100をはじめて利用される方向けの簡易評価ガイドです。

ii) VulnerabilityManager(MVM3100)評価機初期化マニュアル
     MVM3100を初期化する際のマニュアルです。

■備考
・評価機のご利用につきましては弊社営業までお問合わせください。
・ダウンロード方法
 サポート・コミュニティ・サイト https://community.mcafee.com/community/japan
 にて、「ドキュメント」タブ をクリック、「カテゴリーとタグによる絞り込み」を
 クリックし「Vulnerability Manager」をクリックしてください。
 画面下部に上記2ドキュメントが表示されます。

-------------------------------------------------------
9) 企業向けサポートコミュニティサイトの開設および Twitter サービスの開始について
-------------------------------------------------------
○ お知らせ

企業向けサポートコミュニティサイト「Japan Corporate Support」を開設いたしました。
また、「企業向けお客様サポート公式 Twitter」を開設し、サポート情報のリアルタイム
配信を開始しました。

マカフィー、ユーザー参加型の企業向け製品コミュニティサイトをオープン
~サポート部門が主体となり企業セキュリティに関するディスカッションの場を提供~
(4月18日発プレスリリース)
http://www.mcafee.com/japan/about/prelease/pr_11a.asp?pr=11/04/18-1

● 開始日

2011/04/18 (月) 9:00

○ 備考

- 企業向けサポートコミュニティサイト「Japan Corporate Support」
   https://community.mcafee.com/community/japan
   サポート通信や FAQ 掲載情報、製品及びパッチのリリース情報やドキュメントが掲載
   されます。また、製品に関する技術的な情報に関して、コミュニティご登録者が参加
   可能なフリーディスカッションのスペースがございます。

- 企業向けお客様サポート公式 Twitter
   http://twitter.com/McAfee_BTS_JP
   Twitter サービスを利用し、サポート通信や FAQ 掲載情報、製品及びパッチのリリー
   ス情報がリアルタイムで配信されます。

  コミュニティサイトの登録方法、 Twitter のフォロー方法などの詳細につきましては、
  以下のページをご覧ください。
  http://www.mcafee.com/Japan/support/japancorporate.asp

-------------------------------------------------------
10) 「サポート通信」配信について
-------------------------------------------------------

新規契約をしたお客様には、4種類のサポート通信を配信いたします。
各種サポート通信が不要な方は、各サポート通信の文末に記載されているURLにアクセスして、
解除手続きを行っていただきます。

障害などでサポート窓口にお問い合わせいただいた新規のご担当者様には、
今までどおり、「サポート通信 - 登録のご案内」メールを1回のみ配信いたします。
http://www.mcafee.com/japan/support/customer_support/techsupport_regform.asp

---------------------------------------------------------
※ マカフィーからのサービス
---------------------------------------------------------
● マカフィーモバイルサービス
  携帯電話を利用して、緊急ウイルス情報をリアルタイムに確認し、
  ウイルス被害を抑制できます。
   ⇔ http://www.mcafee.com/japan/support/mobileservice.asp

○ サポートQ&A
- 製品の評価、導入、トラブル、障害の発生時に参考となる解決策や
   回避策のFAQをご確認頂けます。 是非お役立て下さい。
   ⇔ http://www.mcafee.com/japan/pqa/pqa.asp
- 1週間のあいだに更新(あるいは新掲載)されたQ&Aはこちら
   ⇔ http://www.mcafee.com/japan/pqa/pqa_newqa.asp

● 企業向けサポートコミュニティサイト「Japan Corporate Support」
   https://community.mcafee.com/community/japan
   サポート通信や FAQ 掲載情報、製品及びパッチのリリース情報やドキュメントが掲載
   されます。また、製品に関する技術的な情報に関して、コミュニティご登録者が
   参加可能なフリーディスカッションのスペースがございます。

○ 企業向けお客様サポート公式 Twitter
   http://twitter.com/McAfee_BTS_JP
   Twitter サービスを利用し、サポート通信や FAQ 掲載情報、製品及びパッチのリリース
   情報がリアルタイムで配信されます。

● マカフィーサポート通信について
- 配信停止
  「マカフィー サポート通信 - リスク管理ソリューション 」の配信停止をご希望される方は、
  以下のページより手続きをお願い致します。
 https://md.pbz.jp/s/r-ctrl.php?act=PCDelAuth&funcinfo_allreset=1&uid=mcafee&mid= foundstone_supp
- 各種法人ユーザ登録情報の変更はこちら
   ⇔ http://www.mcafee.com/japan/support/customer_support/tourokuhenkou.asp

○ マカフィー・PR-newsへのご登録はお済みでしょうか?
  PR-newsでは、法人向け製品・サービスのご紹介をはじめ、関連イベント・セミナー、最新セキュリティ情報、
  導入事例、キャンペーンなどのマーケティング情報を配信しております。PR-newsの配信を希望されたい場合は、
  以下のURLより、ご登録をお願い致します。
  http://www.mcafee.com/japan/enterprise/prnews.asp

●===McAfee=============================================○
発信元:
マカフィー株式会社
テクニカルサポートセンター インフォメーション係
http://www.mcafee.com/japan/support/customer_support/
(c) 2011 McAfee, Inc. All Rights Reserved.
お客様は,マカフィー株式会社の事前の書面による承諾を得ることなく、
掲載内容の無断転載を禁じます。
○=============================================McAfee===●