Lucene search

K
mskbMicrosoftKB5001976
HistoryJul 13, 2021 - 7:00 a.m.

Description of the security update for SharePoint Enterprise Server 2016: July 13, 2021 (KB5001976)

2021-07-1307:00:00
Microsoft
support.microsoft.com
16

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

7 High

AI Score

Confidence

High

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.561 Medium

EPSS

Percentile

97.6%

Description of the security update for SharePoint Enterprise Server 2016: July 13, 2021 (KB5001976)

Summary

This security update resolves a Microsoft SharePoint Server spoofing vulnerability, SharePoint Server information disclosure vulnerability, and SharePoint Server remote code execution vulnerability. To learn more about the vulnerabilities, see the following security advisories:

**Note:**To apply this security update, you must have the release version of Microsoft SharePoint Enterprise Server 2016 installed on the computer.

This public update delivers Feature Pack 2 for SharePoint Server 2016. Feature Pack 2 contains the following feature:

  • SharePoint Framework (SPFx)
    This public update also delivers all the features that were included in Feature Pack 1 for SharePoint Server 2016, including:
  • Administrative Actions Logging
  • MinRole enhancements
  • SharePoint Custom Tiles
  • Hybrid Taxonomy
  • OneDrive API for SharePoint on-premises
  • OneDrive for Business modern user experience (available to Software Assurance customers)
    The OneDrive for Business modern user experience requires an active Software Assurance contract at the time that the experience is enabled, either by installation of the public update or by manual enablement. If you don’t have an active Software Assurance contract at the time of enablement, you must turn off the OneDrive for Business modern user experience.For more information, see the following Microsoft Docs articles:
  • New features included in the November 2016 Public Update for SharePoint Server 2016 (Feature Pack 1)
  • New features included in the September 2017 Public Update for SharePoint Server 2016 (Feature Pack 2)

Improvements and fixes

This security update contains fixes for the following nonsecurity issues in SharePoint Server 2016:

  • Fixes an issue in which PSConfig doesn’t start an administrative instance of Microsoft Edge when you try to use SharePoint Server Central Administration.

  • Fixes an issue in which you can’t resolve Portal Super User and Portal Super Reader accounts in a multi-tenant farm.

  • Fixes an issue in which you can’t open the XSL and Parameters editor in Microsoft Edge that’s based on Chromium.

  • Fixes an issue in which SharePoint Designer doesn’t create a forms page under a subsite.

  • Fixes an issue in which the Site Aggregator Web Part doesn’t add a new tab as expected.
    This security update also contains fixes for the following nonsecurity issues in SharePoint Server 2016. To fix the issues completely, you have to install KB 5001981 together with this update.

  • Adds the ability to change the ASP.NET view state decryption and validation keys of a SharePoint Server web application. The Set-SPMachineKey PowerShell cmdlet configures and deploys new decryption and validation keys to the servers in the farm. TheUpdate-SPMachineKey PowerShell cmdlet deploys decryption and validation keys to the servers in the farm.

  • Fixes an issue that affects the bypass list functionality in the search crawler proxy settings by adding Windows-style wildcard support to the bypass list.
    This security update also contains fixes for the following nonsecurity issues in Project Server 2016:

  • Fixes an issue in which submitted status updates don’t appear for approval after you submit a timesheet.

  • In the Scheduled Web Part, the Pastebutton doesn’t paste the cut or copied task to the grid. Paste by using the keyboard (Ctrl+V) does work as expected. However, cut by using the keyboard (Ctrl+X) doesn’t work. Ctrl+X copies the task instead of cutting it.

Known issues in this update

Existing workflows might stop functioning in Microsoft SharePoint 2010 workflows after you install this security update for SharePoint Server. Additionally, “c42q8,” “c42ra,” or “c42rh” event tags are logged in the SharePoint Unified Logging System (ULS) log. For more information, see KB 5004862.

How to get and install the update

Method 1: Microsoft Update

This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see Windows Update: FAQ.

Method 2: Microsoft Update Catalog

To get the standalone package for this update, go to the Microsoft Update Catalog website.

Method 3: Microsoft Download Center

You can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.

More information

Security update deployment information

For deployment information about this update, see Security update deployment information: July 13, 2021 (KB5004480).

Security update replacement information

This security update replaces previously released security update 5001946.

File hash information

File name SHA256 hash
sts2016-kb5001976-fullfile-x64-glb.exe BCC5CEE0BE4C296198C654EC2B8FAB836B73848DB11136074BD315250CB33816

File information

Download the list of files that are included in security update 5001976.

Information about protection and security

Protect yourself online: Windows Security supportLearn how we guard against cyber threats: Microsoft Security

Change history

The following table summarizes some of the most important changes to this topic.Date Description
July 22, 2021 Update the issue description about the bypass list functionality in the Improvements and fixes section.

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

7 High

AI Score

Confidence

High

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.561 Medium

EPSS

Percentile

97.6%