CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
96.8%
This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2019-0585, Microsoft Common Vulnerabilities and Exposures CVE-2019-0557, Microsoft Common Vulnerabilities and Exposures CVE-2019-0558, and Microsoft Common Vulnerabilities and Exposures CVE-2019-0562.Note To apply this security update, you must have the release version of SharePoint Enterprise Server 2016 installed on the computer.This public update delivers Feature Pack 2 for SharePoint Server 2016, which contains the following feature:
This public update also delivers all the features that were included in Feature Pack 1 for SharePoint Server 2016, including:
The OneDrive for Business modern user experience requires an active Software Assurance contract at the time that the experience is enabled, either by installation of the public update or by manual enablement. If you donโt have an active Software Assurance contract at the time of enablement, you must turn off the OneDrive for Business modern user experience.For more information, see the following Microsoft Docs articles:
This security update contains the following improvements in SharePoint Server 2016:
This security update contains fixes for the following nonsecurity issues in SharePoint Server 2016:
This security update contains fixes for the following nonsecurity issues in Project Server 2016:
This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see Windows Update: FAQ.
To get the stand-alone package for this update, go to the Microsoft Update Catalog website.
You can get the stand-alone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.
For deployment information about this update, see security update deployment information: January 8, 2019.
This security update replaces previously released update KB 4461541.
File name | SHA1 hash | SHA256 hash |
---|---|---|
sts2016-kb4461598-fullfile-x64-glb.exe | FC6A5F810267DB8DE94BECFE95438B08441B1A38 | 4E43F80D9F74C1A71575BA59DF99686CB09C2DAAAD3DF4036B5ECDA4A1567839 |
File informationDownload the list of files that are included in security update KB 4461598.
Help for installing updates: Protect yourself online
Help for protecting your Windows-based computer from viruses and malware: Microsoft Security
Local support according to your country: International Support
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
96.8%