Lucene search

K
mskbMicrosoftKB4484111
HistoryOct 08, 2019 - 7:00 a.m.

Description of the security update for SharePoint Enterprise Server 2016: October 8, 2019

2019-10-0807:00:00
Microsoft
support.microsoft.com
223

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

6.2 Medium

AI Score

Confidence

High

4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

27.9%

Description of the security update for SharePoint Enterprise Server 2016: October 8, 2019

Summary

This security update resolves a spoofing vulnerability that exists if Microsoft SharePoint Server does not correctly sanitize a specially crafted web request to an affected SharePoint server. To learn more about the vulnerability, see the following security advisories:

Improvements and fixes

This security update contains fixes for the following nonsecurity issues in SharePoint Server 2016:

  • Fixes a problem with the Convert-SPWebApplication cmdlet when the User Principal Name (UPN) is set as an identifier. Now you will be able to move SharePoint authentication to the Active Directory Federation Services (AD FS) Identity Provider by using following command:
    Convert-SPWebApplication -Identity $wa -From CLAIMS-WINDOWS -To CLAIMS-TRUSTED-DEFAULT -TrustedProvider $tp
  • Fixes the issue that affects access to the host-named site collection if one of the sites is deleted and users lose access to other sites for about a day. Now users will be able to access all the sites by running following command in PowerShell even though one of the sites is deleted:
    $config = Get-SPSecurityTokenServiceConfig**$config.WindowsModeIgnoreCache = $true****$config.Update()** * Users who have limited permissions on a list or document library but have approve-level permissions on a folder can now approve multiple items or documents in the folder. To complete the approval, you must select the items in the folder and use theApprove/Reject option on the Ribbon.
  • SharePoint patching may copy more folders than are necessary for side-by-side patching. This consumes additional hard drive space. This update fixes the issue by restricting copying to only the folders that are necessary for side-by-side patching.
    This security update contains improvements and fixes for the following nonsecurity issues in Project Server 2016:
  • Makes changes to display the new Japanese era name for date format samples in Date Format in Project Web App (PWA) sites.
  • The OwnerId property is now available to update the project owner through a REST call. The type of this property isString, but it accepts only the user’s numeric ID.
  • You cannot delete resource calendar exceptions through the client-side object model (CSOM). This issue occurs after you install update 4464594.
  • If the stage status information text contains special characters such as an ampersand (&), workflows fail.
  • When the Schedule Variance Percentage (SVP) or Cost Variance Percentage (CVP) earned value becomes very large, this creates an overflow condition. This causes the client-side object model (CSOM) or REST calls that are made while accessing the project to fail. The SVP and CVP values now have a lower limit of “-100%” and upper limit of “100%.”

How to get and install the update

Method 1: Microsoft Update

This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see Windows Update: FAQ.

Method 2: Microsoft Update Catalog

To get the standalone package for this update, go to the Microsoft Update Catalog website.

Method 3: Microsoft Download Center

You can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.

More information

Security update deployment information

For deployment information about this update, see security update deployment information: October 8, 2019.

Security update replacement information

This security update replaces previously released security update 4475590.

File hash information

File name SHA1 hash SHA256 hash
sts2016-kb4484111-fullfile-x64-glb.exe E6B7AAD7D9FF4C395B4F58E3546D757B6FFB9F87 5620E408C736F16EB40374FF88084EAF9FD40C68683EFAA2DB1E06B7F4A8D123

File informationDownload the list of files that are included in security update 4484111.

How to get help and support for this security update

Help for installing updates: Protect yourself online

Help for protecting your Windows-based computer from viruses and malware: Microsoft Security

Local support according to your country: International Support

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

6.2 Medium

AI Score

Confidence

High

4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

27.9%