Description of the security update for Project Server 2013: February 13, 2018

Applies to: Microsoft Project Server 2013 Service Pack 1

Summary


This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0864.

Note To apply this security update, you must have the release version of Microsoft Project Server 2013 Service Pack 1 installed on the computer.

Improvements and fixes


This security update contains the following nonsecurity fixes:
  • Consider the following scenario:
    • You have a task that has a resource assigned.
    • The task has a split in it. For example, there is a week of work, a week that has no work, and then a final week that has work.
    • In the timesheet for this task, you enter hours on the task so that the work is completed up to the date where the split begins.
    • The timesheet is submitted, and then the status update is approved.
    • After that, the project is opened in Project Web App, and the task finish date is adjusted to a date that's after the actual work is completed. For example, the actual finish date is set to the middle of the week where there is no work.

    In this situation, the actual work is spread over the whole duration.

  • Consider the following scenario:

    • You have a Project Web App site and Project Professional 2013 in your organization.
    • You create some custom project fields and add them to your project detail pages (PDPs).
    • In Project Web App, you create a new project and add values for these custom fields.
    • You open the project in Project Professional 2013, make a change, and then save the project.
    • You open the project in Project Web App and view the custom field values on the PDPs.

    In this situation, the values for these custom fields may be lost.

How to get and install the update


Method 1: Microsoft Update Catalog

To get the stand-alone package for this update, go to the Microsoft Update Catalog website.

Method 2: Microsoft Download Center

You can get the stand-alone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.

More Information


Security update deployment information

For deployment information about this update, see security update deployment information: February 13, 2018.

Security update replacement information

This security update replaces previously released security update KB 4011257.

File hash information

Package name Package hash SHA 1 Package hash SHA 2
pjsrvloc2013-kb4011701-fullfile-x64-glb.exe BA75196254EF8226F3870C6555F46F7A6CCD3112 D9CAB572ECA9B32FEAA7533A3E8515F11F21995ABF9AD38740EE2B426760C522

File information

The English version of this security update has the file attributes (or later file attributes) that are listed in the following table. The dates and the times for these files are listed in Coordinated Universal Time (UTC). The dates and the times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and the times may change when you perform certain operations on the files.

How to get help and support for this security update

Help for installing updates: Windows Update FAQ

Security solutions for IT professionals: Security Support and Troubleshooting

Help for protecting your Windows-based computer from viruses and malware: Microsoft Secure

Local support according to your country: International Support

Propose a feature or provide feedback on SharePoint: SharePoint User Voice portal