Description of the security update for SharePoint Server 2019: June 11, 2019

Applies to: SharePoint Server 2019


This security update resolves a cross-site-scripting (XSS) vulnerability that exists if Microsoft SharePoint Server does not correctly sanitize a specially crafted web request to an affected SharePoint server. It also resolves a remote code execution vulnerability that exists in Microsoft Word software if the program fails to correctly handle objects in memory. To learn more about the vulnerabilities, see the following:

Note To apply this security update, you must have the release version of SharePoint Server 2019 installed on the computer.

Improvements and fixes

Contains the following improvements:

  • Adds the new Japanese era name in the Japanese word breaker to make sure that the new era name can be correctly broken when during a search.

  • Spanish is now an option among the search language preference in the SharePoint classic search if users from Argentina and other countries from South America set Spanish as their language preferences in the browser.

Contains fixes for the following nonsecurity issues:

  • In some circumstances, if you delete a few views that are associated with custom fields that support multi-value selection from a lookup table in the database, and then you run the Repair-SPProjectWebInstance cmdlet, you find that the first view isn’t generated in the database.

  • Files that have Information Rights Management (IRM) protection in Modern UI are blocked from being uploaded to a document library.

  • Existing folders can be marked as special folders only if they are empty. Now, folders that have existing content can be used.

  • Certain calendar picker options for setting CalendarWeekRule update the value incorrectly.

  • After you install the January 2019 update, the “Resources" web part is removed from the Central Administration homepage. This update corrects the issue and restores the “Resources" web part to the Central Administration homepage.

How to get and install the update

Method 1: Microsoft Update

This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see Windows Update: FAQ.

Method 2: Microsoft Update Catalog

To get the standalone package for this update, go to the Microsoft Update Catalog website.

Method 3: Microsoft Download Center

You can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.

More information

Security update deployment information

For deployment information about this update, see security update deployment information: June 11, 2019.

Security update replacement information

This security update replaces previously released security update 4464556.

File hash information

File name SHA1 hash SHA256 hash
sts2019-kb4475512-fullfile-x64-glb.exe 4407C1313C2661E91314BD81A4C6E0A5C9553A9D 36DA12097444C002045373ABCC289E982D825D9FC4A83D6F3280309446F80118

File information

The English (United States) version of this software update installs files that have the attributes that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.

How to get help and support for this security update

Help for installing updates: Protect yourself online

Help for protecting your Windows-based computer from viruses and malware: Microsoft Security

Local support according to your country: International Support