Description of the security update for Project 2016: September 10, 2019

Applies to: Project Professional 2016Project Standard 2016

Summary


This security update resolves resolves a security feature bypass vulnerability that exists when Microsoft Office incorrectly handles input. To learn more about the vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2019-1264.

Note To apply this security update, you must have the release version of Project 2016 installed on the computer.

Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2016. It doesn't apply to the Office 2016 Click-to-Run editions, such as Microsoft Office 365 Home (see What version of Office am I using?).

Improvements and fixes


This security update contains fixes for the following nonsecurity issues:
  • When you access various pane-based wizards in Project, such as Import Resources to Enterprise, Import Project, Task Inspector and Deliverables, you see an error message that resembles the following: 


    This problem occurs when the ActiveX controls and plug-insRun ActiveX controls and plug-ins setting is set to Disable in the Internet security zone.

  • Consider the following scenario:
  • You have a test Project Web App site in your test environment and a production site in your production environment.
  • The two sites have the same site ID.
  • In Project, you have server profiles that point to both instances.

In this scenario, when you edit an enterprise calendar in PWA, Project starts. But you may find that the wrong calendar has been edited.

Note To fix this issue completely, you must install KB 3114852 together with this update.

How to get and install the update


Method 1: Microsoft Update

This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see Windows Update: FAQ.

Method 2: Microsoft Update Catalog

To get the standalone package for this update, go to the Microsoft Update Catalog website.

Method 3: Microsoft Download Center

You can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.

More Information


Security update deployment information

For deployment information about this update, see security update deployment information: September 10, 2019.

Security update replacement information

This security update replaces previously released security update 4461478.

File hash information

File name SHA1 hash SHA256 hash
project2016-kb4475589-fullfile-x86-glb.exe F0B0866DC57D643CA7B20F734FF326585E660762 D3D6A99E7CBAC6727A8D21CC505FEF0023FDF903E266EED3E24B15D8C9A537EF
project2016-kb4475589-fullfile-x64-glb.exe F82CD927BAB634C9800E766EB74AB6619D70645B 7A6169D33991FE7CD791675CF90F5770E5C2B47C2B8F7E1D5A87860DA9931D61


File information

The English (United States) version of this software update installs files that have the attributes that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.

How to get help and support for this security update


Help for installing updates: Protect yourself online

Help for protecting your Windows-based computer from viruses and malware: Microsoft Security

Local support according to your country: International Support