Lucene search

K
mskbMicrosoftKB5002069
HistoryJul 11, 2023 - 7:00 a.m.

Description of the security update for Office 2013: July 11, 2023 (KB5002069)

2023-07-1107:00:00
Microsoft
support.microsoft.com
5
microsoft office 2013
security update
activex vulnerability
kb5002069
microsoft update
microsoft catalog
download center

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.1 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

46.7%

Description of the security update for Office 2013: July 11, 2023 (KB5002069)

Summary

This security update resolves a Microsoft ActiveX remote code execution vulnerability. To learn more about the vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2023-33152.

**Note:**To apply this security update, you must have the release version of Service Pack 1 for Microsoft Office 2013 installed on the computer.

Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2013. It doesn’t apply to the Office 2013 Click-to-Run editions, such as Microsoft Office 365 Home. (See What version of Office am I using?)

How to get and install the update

Method 1: Microsoft Update

This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see Windows Update: FAQ.

Method 2: Microsoft Update Catalog

To get the standalone package for this update, go to the Microsoft Update Catalog website.

Method 3: Microsoft Download Center

You can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.

More information

Security update deployment information

For deployment information about this update, see Deployments - Security Update Guide.

Security update replacement information

This security update replaces previously released security update 4018332.

File hash information

File name SHA256 hash
riched202013-kb5002069-fullfile-x86-glb.exe 56FBAC480DFA61F4D9981A3C0013562E9ACFBD4049BD75C8206E493B1A26899F
riched202013-kb5002069-fullfile-x64-glb.exe 8446591478587D7A3D8D57964BCFA11D2A6E67AB93C4D943F18ED5697EFE38E4

File information

The English (United States) version of this software update installs files that have the attributes that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.

__

For all supported x86-based versions of Office 2013

File identifier File name File version File size Date Time
richtx32.ocx msrtedit.dll 15.0.5571.1000 114120 15-Jun-23 01:29
riched20.dll_0001 riched20.dll 15.0.5389.1000 1627544 15-Jun-23 01:29

__

For all supported x64-based versions of Office 2013

File identifier File name File version File size Date Time
richtx32.ocx msrtedit.dll 15.0.5571.1000 150424 15-Jun-23 01:29
conversion.office.riched20.dll riched20.dll 15.0.5455.1000 2231216 15-Jun-23 01:29
ppt.conversion.riched20.dll riched20.dll 15.0.5455.1000 2231216 15-Jun-23 01:29
ppt.edit.riched20.dll riched20.dll 15.0.5455.1000 2231216 15-Jun-23 01:29
riched20.dll riched20.dll 15.0.5455.1000 2231216 15-Jun-23 01:29
riched20.dll_0001 riched20.dll 15.0.5455.1000 2231216 15-Jun-23 01:29
wac.office.riched20.dll riched20.dll 15.0.5455.1000 2231216 15-Jun-23 01:29
xlsrv.ecs.riched20.dll riched20.dll 15.0.5455.1000 2231216 15-Jun-23 01:29

Information about protection and security

Protect yourself online: Windows Security supportLearn how we guard against cyber threats: Microsoft Security

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.1 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

46.7%