Lucene search

K
mskbMicrosoftKB4486700
HistoryOct 13, 2020 - 7:00 a.m.

Description of the security update for Office 2010: October 13, 2020

2020-10-1307:00:00
Microsoft
support.microsoft.com
13

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.3 High

AI Score

Confidence

High

0.015 Low

EPSS

Percentile

87.0%

Description of the security update for Office 2010: October 13, 2020

Summary

This security update resolves remote code execution vulnerabilities that exist in Microsoft Office software when the software fails to properly handle objects in memory. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2020-16929 and Microsoft Common Vulnerabilities and Exposures CVE-2020-16954.

Note To apply this security update, you must have the release version of Service Pack 2 for Office 2010 installed on the computer.Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2010. It doesn’t apply to the Office 2010 Click-to-Run editions, such as Microsoft Office 2010 Home and Student (see What version of Office am I using?).

How to get and install the update

Method 1: Microsoft Update

This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see Windows Update: FAQ.

Method 2: Microsoft Update Catalog

To get the standalone package for this update, go to the Microsoft Update Catalog website.

Method 3: Microsoft Download Center

You can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.

More information

Security update deployment information

For deployment information about this update, see security update deployment information: October 13, 2020.

Security update replacement information

This security update replaces previously released security update 4484532.

File hash information

File name SHA1 hash SHA256 hash
graph2010-kb4486700-fullfile-x86-glb.exe E2C68EF9D3D97B1DA51463EA2072460A4A6D9DB6 ED4106CEF58DDF6893387BFB9817150F581B53E321A0AF8AF553C20A43CFE789
graph2010-kb4486700-fullfile-x64-glb.exe A3853C398225A5AC23A8B4D760F09854D9957E77 F9370CB7E0023E22D5BEBB004DB535E64D78EB1648BCB0A651136152A8928876

File informationThe English (United States) version of this software update installs files that have the attributes that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.

__

For all supported x86-based versions of Office 2010

File identifier File name File version File size Date Time
graph.exe graph.exe 14.0.7261.5000 4,315,824 16-Sep-2020 12:03

__

For all supported x64-based versions of Office 2010

File identifier File name File version File size Date Time
graph.exe graph.exe 14.0.7261.5000 6,463,672 16-Sep-2020 12:02

Information about protection and securityProtect yourself online: Windows Security supportLearn how we guard against cyber threats: Microsoft Security

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.3 High

AI Score

Confidence

High

0.015 Low

EPSS

Percentile

87.0%