Lucene search

K
mskbMicrosoftKB4484336
HistoryMay 12, 2020 - 7:00 a.m.

Description of the security update for SharePoint Server Enterprise 2016: May 12, 2020

2020-05-1207:00:00
Microsoft
support.microsoft.com
29

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.4 High

AI Score

Confidence

High

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.017 Low

EPSS

Percentile

87.7%

Description of the security update for SharePoint Server Enterprise 2016: May 12, 2020

Summary

This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following security advisories:

Improvements and fixes

This security update contains improvements and fixes for the following nonsecurity issues in SharePoint Server 2016:

  • Changes the β€œScheduled Start Date” and β€œScheduled End Date” fields in a publishing page to format the date field according to the correct locale.
  • Updates SharePoint search crawler to send GET requests by using HTTP 1.1 if the HTTP 1.0 requests fail.
  • Updates the Search word breaker to tag IP addresses and GUIDs as named entities for all languages except Korean.
  • Fixes an issue in which axis values may be truncated when you use SharePoint Server 2016 to convert a file that contains charts to PDF.
  • Fixes the HTTP 404 response error when you access site collections in newly created or mounted content databases.
  • Consider the following scenario:
  • You have a web application that uses Windows claims authentication only.
  • You create an Active Directory (AD) user that has a mail account name that’s not the same as the user principal name (UPN), and the AD user doesn’t exist in the UserInfo list.
  • You create a new team site and also create a custom list that has a β€œperson” field.
  • You use the Quick Edit mode to set the person field to the AD user.
    In this scenario, the AD user isn’t validated.

How to get and install the update

Method 1: Microsoft Update

This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see Windows Update: FAQ.

Method 2: Microsoft Update Catalog

To get the standalone package for this update, go to the Microsoft Update Catalog website.

Method 3: Microsoft Download Center

You can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.

More information

Security update deployment information

For deployment information about this update, see security update deployment information: May 12, 2020.

Security update replacement information

This security update replaces previously released security update 4484299.

File hash information

File name SHA1 hash SHA256 hash
sts2016-kb4484336-fullfile-x64-glb.exe 192B1DF5801B06907DEA8187C2AD3A68DE9D5C22 7722CEF51237A2A8C982602333C1133AB3B3DED676CA38BAD88246999F7A32F9

File informationDownload the list of files that are included in security update 4484336.

Information about protection and security

Protect yourself online: Windows Security supportLearn how we guard against cyber threats: Microsoft Security

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.4 High

AI Score

Confidence

High

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.017 Low

EPSS

Percentile

87.7%