Summary

This security update resolves a Microsoft Word remote code execution vulnerability, Microsoft Office remote code execution vulnerability, and Microsoft SharePoint Server remote code execution vulnerability. To learn more about the vulnerabilities, see the following security advisories:

Note: To apply this security update, you must have the release version of Microsoft SharePoint Enterprise Server 2016 installed on the computer.

This public update delivers Feature Pack 2 for SharePoint Server 2016. Feature Pack 2 contains the following feature:

  • SharePoint Framework (SPFx)

This public update also delivers all the features that were included in Feature Pack 1 for SharePoint Server 2016, including:

  • Administrative Actions Logging

  • MinRole enhancements

  • SharePoint Custom Tiles

  • Hybrid Taxonomy

  • OneDrive API for SharePoint on-premises

  • OneDrive for Business modern user experience (available to Software Assurance customers)

The OneDrive for Business modern user experience requires an active Software Assurance contract at the time that the experience is enabled, either by installation of the public update or by manual enablement. If you don't have an active Software Assurance contract at the time of enablement, you must turn off the OneDrive for Business modern user experience.

For more information, see the following Microsoft Docs articles:

Improvements and fixes

This security update contains fixes for the following nonsecurity issues in SharePoint Server 2016:

  • Fixes an issue in which a double URL encoding occurs when you try to open documents in a client application in Google Chrome from Mac devices.

  • Fixes an issue in which an error occurs when you share a folder in a list under a subsite.

  • Fixes an issue in which the Word Automation Services assembly (Sword.dll) is not updated to the expected version.

  • Fixes an issue in which selecting the New button in the form library opens a dialog box to upload files instead of opening the InfoPath client application.

This security update also provides security improvements for Project Server 2016.

Known issues in this update

Most users cannot access Web.config files in Microsoft SharePoint Server. The affected group of users does not include farm administrators, local administrators, or members who are managed by the system. For more information, see Users cannot access Web.config files in SharePoint Server (KB5010126).

How to get and install the update

Method 1: Microsoft Update

This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see Windows Update: FAQ.

Method 2: Microsoft Update Catalog

To get the standalone package for this update, go to the Microsoft Update Catalog website.

Method 3: Microsoft Download Center

You can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.

More information

Security update deployment information

For deployment information about this update, see Security update deployment information: January 11, 2022 (KB5010029).

Security update replacement information

This security update replaces previously released security update 5002055.

File hash information

File name

SHA256 hash

sts2016-kb5002113-fullfile-x64-glb.exe

3F528A56C1022187EA906E0CF8E058C528168897FB171C2ED94707149550C345

File information

Download the list of files that are included in security update 5002113.

Information about protection and security

Protect yourself online: Windows Security support

Learn how we guard against cyber threats: Microsoft Security

Need more help?

Expand your skills
Explore Training
Get new features first
Join Microsoft Insiders

Was this information helpful?

What affected your experience?

Thank you for your feedback!

×