8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.4 High
AI Score
Confidence
High
6.5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
0.009 Low
EPSS
Percentile
83.1%
This security update resolves a Microsoft SharePoint Server remote code execution vulnerability, Microsoft Word information disclosure vulnerability, and Microsoft Word remote code execution vulnerability. To learn more about the vulnerabilities, see the following security advisories:
Notes:
This public update delivers Feature Pack 2 for SharePoint Server 2016. Feature Pack 2 contains the following feature:
**Customers using Access Services must take additional actions for the feature to continue to work and remain supported.**The Access Services feature in SharePoint Server 2016 has dependencies on certain SQL Server 2012 components that are no longer supported with SharePoint Server 2016. This security update includes changes to the Access Services feature that enable it to be compatible with newer SQL Server components. To make sure that the Access Services feature continues to work and remains supported, Access Services customers should upgrade the following components before they install this security update for SharePoint Server 2016. (These components can also be upgraded after this security update for SharePoint Server 2016 is installed. However, the Access Services feature might no longer work until the components are upgraded.)
This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see Windows Update: FAQ.
To get the standalone package for this update, go to the Microsoft Update Catalog website.
You can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.
For deployment information about this update, see Deployments - Security Update Guide.
This security update replaces previously released security update 5002287.
File name | SHA256 hash |
---|---|
sts2016-kb5002305-fullfile-x64-glb.exe | 326A94B8696BEF2D4008194B86C44D81803918AA78AF5B86026C0F7C68D0E456 |
Download the list of files that are included in security update 5002305.
Protect yourself online: Windows Security supportLearn how we guard against cyber threats: Microsoft Security
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.4 High
AI Score
Confidence
High
6.5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
0.009 Low
EPSS
Percentile
83.1%