Lucene search

K
mskbMicrosoftKB3114934
HistoryApr 12, 2016 - 7:00 a.m.

MS16-042: Description of the security update for Office Web Apps Server 2013: April 12, 2016

2016-04-1207:00:00
Microsoft
support.microsoft.com
23

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8 High

AI Score

Confidence

High

0.704 High

EPSS

Percentile

98.0%

MS16-042: Description of the security update for Office Web Apps Server 2013: April 12, 2016

Summary

This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Security Bulletin MS16-042.

Note To apply this security update, you must have the release version of Service Pack 1 for Microsoft Office Web Apps Server 2013 installed on the computer.

For a complete list of affected versions of Microsoft Office software, see Microsoft Knowledge Base article KB3148775.

Improvements and fixes

This security update contains improvements and fixes for the following nonsecurity issues:

  • After you save a document as a .pdf file in Word 2013, the font name in the .pdf file doesn’t appear as the corresponding PostScript name.

How to get and install the update

Method 1: Microsoft Update

This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see the “Turn on automatic updating in Control Panel” section of this Safety & Security Center article.

Method 2: Microsoft Download Center

You can get the stand-alone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.

More Information

Security update deployment information

For deployment information about this update, see Microsoft Knowledge Base article KB3148775.

Security update replacement information

This security update replaces previously released security update KB3114821.

File hash information

Package Name Package Hash SHA 1 Package Hash SHA 2
wacserver2013-kb3114934-fullfile-x64-glb.exe 608B4D7F7216C253BE90404B7661168B539E1DED 1EC61E042D4384EEB02315213EFB9AE166A85ECF1A910B5969B0DCCA613510A3

File information

For a list of the files that are provided in this cumulative update KB3114934, download the [file information for update 3114934](<http://download.microsoft.com/download/8/e/f/8efcfa60-d571-4563-bcc9-58f042e28294/file information for update kb3114934.csv>).

__

How to get help and support for this security update

Help for installing updates: Support for Microsoft Update

Security solutions for IT professionals: TechNet Security Troubleshooting and Support

Help for protecting your Windows-based computer from viruses and malware: Virus Solution and Security Center

Local support according to your country: International Support

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8 High

AI Score

Confidence

High

0.704 High

EPSS

Percentile

98.0%