Summary
This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2018-8577.
Note To apply this security update, you must have the release version of Service Pack 1 for Microsoft Office Web Apps Server 2013installed on the computer.
How to get and install the update
Method 1: Microsoft Update
This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see Windows Update: FAQ.
Method 2: Microsoft Update Catalog
To get the stand-alone package for this update, go to the Microsoft Update Catalog website.
Method 3: Microsoft Download Center
You can get the stand-alone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.
More Information
Security update deployment information
security update deployment information: November 13, 2018.
For deployment information about this update, seeSecurity update replacement information This security update replaces previously released security update
File hash information
File name |
SHA1 hash |
SHA256 hash |
---|---|---|
wacserver2013-kb4092473-fullfile-x64-glb.exe |
A57C060A9B169B7C78CC5863B4E8910F80549270 |
72C9ADF9C30F62AC56DA77BFD48899FA0B39E99A497EB4577744D5745095D4F8 |
File information
For the list of files that are included in the security update 4092473, download the file information.
How to get help and support for this security update
Protect yourself online and at home: Windows Security support
Help for protecting your Windows-based computer from viruses and malware: Microsoft Secure
Local support according to your country: International Support