This security update resolves a remote code execution vulnerability that exists in Microsoft Outlook software if it does not correctly handle objects in memory. To learn more about the vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2019-1200 and Microsoft Common Vulnerabilities and Exposures CVE-2019-1204.
Note To apply this security update, you must have the release version of Outlook 2016 installed on the computer.
Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2016. It doesn't apply to the Office 2016 Click-to-Run editions, such as Microsoft Office 365 Home (see What version of Office am I using?).
Improvements and fixes
This security update contains the following improvement:
Improved translations for all language versions of Outlook 2016.
This security update contains the following fixes:
Fix: In certain circumstances, such as switching folders or clearing search results, you see a black rectangle instead of the message list scroll bar.
Fix: The Notes and Message fields in some Outlook Items that are created by migration tools may not be editable.
Fix: The first time that you switch to Calendar view after you log in to Outlook, the primary calendar is not selected by default. Instead, a shared calendar is selected.
Fix: When you save a single attachment by using the context menu, users are not notified if the operations fails.
Fix: If a user sends an email message that contains combined languages in the Subject line, and a recipient sends a read receipt to the message, the original sender may see broken text in the Subject line of the read receipt. This update adds the ReadReceiptSubjectUseEnglish registry key to force the Subject line of a read receipt to be in English. To fix this issue, set the following registry key in Group Policy to fix this issue for all users:
- Location: HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Outlook\Preferences
- Name: ReadReceiptSubjectUseEnglish
- Type: DWORD
- Value data: 1
How to get and install the update
Method 1: Microsoft Update
This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see Windows Update: FAQ.
Method 2: Microsoft Update Catalog
To get the standalone package for this update, go to the Microsoft Update Catalog website.
Method 3: Microsoft Download Center
You can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.
Security update deployment information
For deployment information about this update, see security update deployment information: August 13, 2019.
Security update replacement information
This security update replaces previously released security update 4475517.
File hash information
|File name||SHA1 hash||SHA256 hash|
The English (United States) version of this software update installs files that have the attributes that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.