This security update resolves resolves a security feature bypass vulnerability that exists when Microsoft Office incorrectly handles input. To learn more about the vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2019-1264.
Note To apply this security update, you must have the release version of Project 2016 installed on the computer.
Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2016. It doesn't apply to the Office 2016 Click-to-Run editions, such as Microsoft Office 365 Home (see What version of Office am I using?).
Improvements and fixes
When you access various pane-based wizards in Project, such as Import Resources to Enterprise, Import Project, Task Inspector and Deliverables, you see an error message that resembles the following:
An add-on for this website failed to run. Check the security settings in Internet Options for potential conflicts.
This problem occurs when the ActiveX controls and plug-ins > Run ActiveX controls and plug-ins setting is set to Disable in the Internet security zone.
- Consider the following scenario:
- You have a test Project Web App site in your test environment and a production site in your production environment.
- The two sites have the same site ID.
- In Project, you have server profiles that point to both instances.
In this scenario, when you edit an enterprise calendar in PWA, Project starts. But you may find that the wrong calendar has been edited.
Note To fix this issue completely, you must install KB 3114852 together with this update.
How to get and install the update
Method 1: Microsoft Update
This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see Windows Update: FAQ.
Method 2: Microsoft Update Catalog
To get the standalone package for this update, go to the Microsoft Update Catalog website.
Method 3: Microsoft Download Center
You can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.
Security update deployment information
For deployment information about this update, see security update deployment information: September 10, 2019.
Security update replacement information
This security update replaces previously released security update 4461478.
File hash information
|File name||SHA1 hash||SHA256 hash|
The English (United States) version of this software update installs files that have the attributes that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.