Summary

This security update resolves a remote code execution vulnerability that exists in Microsoft Word software if the program does not correctly handle objects in memory. To learn more about thesvulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2020-0850 and Microsoft Common Vulnerabilities and Exposures CVE-2020-0892.

Note To apply this security update, you must have the release version of Service Pack 1 for Microsoft SharePoint Foundation 2013 installed on the computer.

How to get and install the update

Method 1: Microsoft Update

This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see Windows Update: FAQ.

Method 2: Microsoft Update Catalog

To get the standalone package for this update, go to the Microsoft Update Catalog website.

Method 3: Microsoft Download Center

You can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.

More information

Security update deployment information

For deployment information about this update, see security update deployment information: March 10, 2020.

Security update replacement information

This security update replaces previously released security update 4484099.

File hash information

File name

SHA1 hash

SHA256 hash

wssloc2013-kb4484124-fullfile-x64-glb.exe

E3138C2FE8DD637711B7319435D204AD7663CD43

0695D78C5C02F595A74C01CA4613E9C6A615B8C993D4F013276FDC7B01509C41


File information

Download the list of files that are included in security update 4484124.

Information about protection and security

Protect yourself online: Windows Security support

Learn how we guard against cyber threats: Microsoft Security

Need more help?

Expand your skills
Explore Training
Get new features first
Join Microsoft Insiders

Was this information helpful?

What affected your experience?

Thank you for your feedback!

×