You are currently offline, waiting for your internet to reconnect

MS13-100: Vulnerabilities in Microsoft SharePoint Server could allow remote code execution: December 10, 2013

INTRODUCTION
Microsoft has released security bulletin MS13-100. To view the complete security bulletin, visit one of the following Microsoft websites:

How to obtain help and support for this security update

Help installing updates: Support for Microsoft Update

Security solutions for IT professionals: TechNet Security Troubleshooting and Support

Help protect your computer that is running Windows from viruses and malware:Virus Solution and Security Center

Local support according to your country: International Support

Known issues and additional information about this security update

The following articles contain additional information about this security update as it relates to individual product versions. The articles may contain known issue information. If this is the case, the known issue is listed below each article link.
  • 2553298 MS13-100: Description of the security update for SharePoint Server 2010: December 10, 2013
  • 2850058 MS13-100: Description of the security update for SharePoint Server 2013 (coreserverloc): December 10, 2013
  • 2837629 MS13-100: Description of the security update for SharePoint Server 2013: December 10, 2013
  • 2837631 MS13-100: Description of the security update for Excel Services in SharePoint Server 2013: December 10, 2013
  • 2910228 MS13-100: Description of the security update for Office Web Apps Server 2013: December 10, 2013
Note After you install any of the following SharePoint Server security updates, you have to run the PSconfig tool to complete the installation.
  • 2553298 MS13-100: Description of the security update for SharePoint Server 2010: December 10, 2013
  • 2850058 MS13-100: Description of the security update for SharePoint Server 2013 (coreserverloc): December 10, 2013
  • 2837629 MS13-100: Description of the security update for SharePoint Server 2013: December 10, 2013
For more information about how to use the PSconfig tool, go to the following TechNet webpage:

File hash information

File nameSHA1 hashSHA256 hash
acsrv2010-kb2553298-fullfile-x64-glb.exe53166086BB64AED22CA3B904DCECB76C31901D36363B4E562AAB1768D0775CDB16177E06B317DFDEC4D79978AC02A78DE6C6BC52
acsrv2013-kb2837629-fullfile-x64-glb.com1C2A41EF7BD7A488F5B6B59D587CA3854B505107BFA75C008CEFB14F382DE934DF6A15226238EA2898ACFD74A056A695607A7482
coreserverloc2013-kb2850058-fullfile-x64-glb.com1C2A41EF7BD7A488F5B6B59D587CA3854B505107BFA75C008CEFB14F382DE934DF6A15226238EA2898ACFD74A056A695607A7482
wacserver2013-kb2910228-fullfile-x64-glb.com1C2A41EF7BD7A488F5B6B59D587CA3854B505107BFA75C008CEFB14F382DE934DF6A15226238EA2898ACFD74A056A695607A7482
xlsrvloc2013-kb2837631-fullfile-x64-glb.com1C2A41EF7BD7A488F5B6B59D587CA3854B505107BFA75C008CEFB14F382DE934DF6A15226238EA2898ACFD74A056A695607A7482
update security_patch security_update security bug flaw vulnerability malicious attacker exploit registry unauthenticated buffer overrun overflow specially-formed scope specially-crafted denial of service dos
Properties

Article ID: 2904244 - Last Review: 12/23/2013 18:14:00 - Revision: 2.0

  • kbexpertiseinter kbqfe kbsecurity kbsecbulletin kbsecvulnerability kbbug kbfix kbsurveynew KB2904244
Feedback
">=4050&did=1&t=">