Summary
This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2019-0668 and Microsoft Common Vulnerabilities and Exposures CVE-2019-0670. Note To apply this security update, you must have the release version of Service Pack 1 for Microsoft SharePoint Server 2013 installed.
How to get and install the update
This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see Windows Update: FAQ.
Method 2: Microsoft Update Catalog
To get the standalone package for this update, go to the Microsoft Update Catalog website.
Method 3: Microsoft Download Center
You can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.
More Information
Security update deployment information
For deployment information about this update, see security update deployment information: February 12, 2019.
Security update replacement information
This security update replaces the previously released security update 4461591.
File hash information
File name |
SHA1 hash |
SHA256 hash |
---|---|---|
coreserverloc2013-kb4462139-fullfile-x64-glb.exe |
EE8739A8472FF3B89F5562382A3D92DD51D150D6 |
3268E0D05971434A59163542FDF8C5BE24EEFDC55B5C5AE6FDFC8D2C2493611B |
File information
Download the list of files that are included in security update KB 4462139.
How to get help and support for this security update
Help for installing updates: Protect yourself online Help for protecting your Windows-based computer from viruses and malware: Microsoft Security Local support according to your country: International Support