Summary

This security update resolves remote code execution vulnerabilities that exist if Microsoft Office incorrectly loads arbitrary type libraries and if Microsoft Excel software does not correctly handle objects in memory. To learn more about the vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2020-0760 and Microsoft Common Vulnerabilities and Exposures CVE-2020-0906.

Note To apply this security update, you must have the release version of Service Pack 2 for Office 2010 installed on the computer.

Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2010. It doesn't apply to the Office 2010 Click-to-Run editions, such as Microsoft Office Home and Student 2010 (see What version of Office am I using?).

Known issues

Some types of Visual Basic for Applications (VBA) references might be affected by this update. For more information, see FAQ for VBA solutions affected by April 2020 Office security updates.

Note This change in behavior is caused by a design change in Office. The new behavior is by design. Therefore, a fix is not necessary and no mitigation will be provided.

How to get and install the update

Method 1: Microsoft Update

This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see Windows Update: FAQ.

Method 2: Microsoft Update Catalog

To get the standalone package for this update, go to the Microsoft Update Catalog website.

Method 3: Microsoft Download Center

You can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.

More information

Security update deployment information

For deployment information about this update, see security update deployment information: April 14, 2020.

Security update replacement information

This security update replaces previously released security update 4484267.

File hash information

File name

SHA1 hash

SHA256 hash

excel2010-kb4484285-fullfile-x86-glb.exe

E408ED659106D21CC7F655A20C5BFE3249B45A5D

1A737F17B3815EA45CA1CAB4F1372BF228677E5D73A18AB12B8E186DE7C4E102

excel2010-kb4484285-fullfile-x64-glb.exe

4380CBE4F4BF9CE4449DC442D0E51F71752E217A

383D0339DFD201C0D4074876D3F3C3C03D0865930739562BAA01397E03AF6C53


File information

The English (United States) version of this software update installs files that have the attributes that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.

File identifier

File name

File version

File size

Date

Time

excel.exe

excel.exe

14.0.7248.5000

20,419,896

26-Mar-2020

06:52

excel.man

excel.exe.manifest

1,194

05-Nov-2009

11:00

xl12cnv.exe

excelcnv.exe

14.0.7248.5000

17,856,312

20-Mar-2020

05:35

xlcall32.dll

xlcall32.dll

14.0.7162.5000

10,432

13-Oct-2015

06:52

xlicons.exe

xlicons.exe

14.0.7120.5000

1,480,360

05-Mar-2014

06:06

File identifier

File name

File version

File size

Date

Time

excel.exe

excel.exe

14.0.7248.5000

27,676,784

26-Mar-2020

06:52

excel.man

excel.exe.manifest

1,196

05-Nov-2009

11:23

xl12cnv.exe

excelcnv.exe

14.0.7248.5000

25,071,216

20-Mar-2020

05:43

xlcall32.dll

xlcall32.dll

14.0.7162.5000

10,944

13-Oct-2015

07:00

xlicons.exe

xlicons.exe

14.0.7120.5000

1,480,360

05-Mar-2014

06:06

Information about protection and security

Protect yourself online: Windows Security support

Learn how we guard against cyber threats: Microsoft Security

Need more help?

Expand your skills
Explore Training
Get new features first
Join Microsoft Insiders

Was this information helpful?

What affected your experience?

Thank you for your feedback!

×