Description of the security update for Office Web Apps Server 2013: April 14, 2020

Applies to: Office Web Apps Server 2013

Summary


This security update resolves a remote code execution vulnerability that exists in Microsoft Word software if it does not correctly handle objects in memory. To learn more about the vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2020-0980.

Note To apply this security update, you must have the release version of Service Pack 1 for Microsoft Office Web Apps Server 2013 installed on the computer.

How to get and install the update


Method 1: Microsoft Update

This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see Windows Update: FAQ.

Method 2: Microsoft Update Catalog

To get the standalone package for this update, go to the Microsoft Update Catalog website.

Method 3: Microsoft Download Center

You can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.

More information


Security update deployment information

For deployment information about this update, see security update deployment information: April 14, 2020.

Security update replacement information

This security update replaces previously released security update 4462216.

File hash information

File name SHA1 hash SHA256 hash
wacserver2013-kb4475609-fullfile-x64-glb.exe 5F26222CCD18CA550AF0F2E45675A1C23374EC86 691D821B1244D6C6E358BE1BA91A7D81EC669112BA1821579B5804B6BD8C1E06


File information

Download the list of files that are included in security update 4475609.

Information about protection and security


Protect yourself online: Windows Security support

Learn how we guard against cyber threats: Microsoft Security