A remote code execution vulnerability exists in Microsoft SQL Server when it incorrectly handles processing of internal functions. An attacker who successfully exploited this vulnerability could execute code in the context of the SQL Server Database Engine service account. To learn more about the vulnerability, go to CVE-2019-1068.
The SQL Server and Analysis services components are updated to the following builds in this security update:
|Component||Product version||File version|
How to obtain and install the update
Method 1: Microsoft Update
This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see Windows Update: FAQ.
Method 2: Microsoft Update Catalog
To get the standalone package for this update, go to the Microsoft Update Catalog website.
Method 3: Microsoft Download Center
The following file is available for download from the Microsoft Download Center:
Download the package now
Release Date: July 9, 2019
For more information about how to download Microsoft support files, click the following article number to go to the article in the Microsoft Knowledge Base:
Microsoft scanned this file for viruses by using the most current virus-detection software that was available on the date that the file was posted. The file is stored on security-enhanced servers that help prevent any unauthorized changes to it.
Method 4: For SQL Server 2017 on Linux platforms and containers
For information on obtaining and installing this update on Linux Operating Systems or Docker Containers, see:
- Configure repositories for installing and upgrading SQL Server on Linux
- Release notes for SQL Server 2017 on Linux
- Official images for Microsoft SQL Server on Linux for Docker Engine
If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.
To apply this update, you must have SQL Server 2017 or any SQL Server 2017 GDR release through this SQL Server 2017 GDR installed.
Security update deployment information
For deployment information about this update, see security update deployment information: July 9, 2019.
Security update replacement information
This security update replaces the previously released security update 4494351.
File hash information
|File name||SHA1 hash||SHA256 hash|
The English (United States) version of this software update installs files that have the attributes that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.