A remote code execution vulnerability exists in Microsoft SQL Server Reporting Services if it incorrectly handles page requests. An attacker who successfully exploited this vulnerability could execute code in the context of the Report Server service account. To learn more about the vulnerability, go to CVE-2020-0618.
The SQL Server and Reporting Services components are updated to the following builds in this security update.
|Component||Product version||File version|
This security update fixes the following issue:
How to obtain and install the update
Method 1: Microsoft Update
This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see Windows Update: FAQ.
Method 2: Microsoft Update Catalog
To get the standalone package for this update, go to the Microsoft Update Catalog website.
Method 3: Microsoft Download Center
The following file is available for download from the Microsoft Download Center:
Download the package now
Release Date: February 11, 2020
For more information about how to download Microsoft support files, click the following article number to go to the article in the Microsoft Knowledge Base:
Microsoft scanned this file for viruses by using the most current virus-detection software that was available on the date that the file was posted. The file is stored on security-enhanced servers that help prevent any unauthorized changes to it.
Important If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.
To apply this update, you must have SQL Server 2012 SP4 or any SQL Server 2012 SP4 GDR release through this SQL Server 2012 SP4 GDR installed.
Security update deployment information
For deployment information about this update, see security update deployment information: February 11, 2020.
File hash information
|File name||SHA1 hash||SHA256 hash|
The English (United States) version of this software update installs files that have the attributes that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.