CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
AI Score
Confidence
Low
EPSS
Percentile
90.3%
This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2018-8580, Microsoft Common Vulnerabilities and Exposures CVE-2018-8635, and Microsoft Common Vulnerabilities and Exposures CVE-2018-8628.Note To apply this security update, you must have the release version of SharePoint Enterprise Server 2016 installed on the computer.This public update delivers Feature Pack 2 for SharePoint Server 2016, which contains the following feature:
This security update contains improvements and fixes for the following nonsecurity issues for SharePoint Server 2016:
This update also fixes a vulnerability through the following changes in SharePoint Server 2016:
This security update contains improvements and fixes for the following nonsecurity issues for Project Server 2016:
βSorry, something went wrong.
Your request has failed for an undetectable reason; you may need to contact your system or database administrator."
Method 1: Microsoft UpdateThis update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see Windows Update: FAQ.Method 2: Microsoft Update CatalogTo get the standalone package for this update, go to the Microsoft Update Catalog website.Method 3: Microsoft Download CenterYou can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.
Security update deployment informationFor deployment information about this update, see security update deployment information: December 11, 2018.Security update replacement informationThis security update replaces previously released security update KB 4461501.
File hash informationFile name | SHA1 hash | SHA256 hash |
---|---|---|
sts2016-kb4461541-fullfile-x64-glb.exe | C644AAF7D815E83C07E034FD9845A3937F0330CA | 979D1674EDCCED396819B225F453D86D7456D50A7567140CD2CCA614BA3B38B1 |
File informationFor the list of files that are included in the security update 4461541, download the file information. |
Protect yourself online and at home: Windows Security support Help for protecting your Windows-based computer from viruses and malware: Microsoft SecureLocal support according to your country: International Support
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
AI Score
Confidence
Low
EPSS
Percentile
90.3%