Applies to: All Visual Studio 2015 Update 3 editions except Build Tools

Notice

In November 2020, the content of this article was updated to clarify the affected products, prerequisites, and restart requirements. Additionally, the update metadata in WSUS was revised to fix a Microsoft System Center Configuration Manager reporting bug. 

Summary

An elevation of privilege vulnerability exists if the Diagnostics Hub Standard Collector or the Visual Studio Standard Collector allows file deletion in arbitrary locations. To learn more about the vulnerability, go to CVE-2019-0727.

More information

Prerequisites

To apply this security update, you must have both Visual Studio 2015 Update 3 and the subsequent Cumulative Servicing Release KB 3165756 installed. Typically, KB 3165756 is installed automatically when you install Visual Studio 2015 Update 3. However, in some cases, you have to install the two packages separately.

Restart requirement

We recommend that you close Visual Studio 2015 before you install this security update. Otherwise, you may have to restart the computer after you apply this security update if a file that is being updated is open or in use by Visual Studio.

Security update replacement information

This security update supersedes KB4469516.

File hash information

File name

SHA1 hash

SHA256 hash

vs14-kb4489639.exe

74906BE3045EE77A88FD87539FEF52CA4D4A3889

169C70C94A412C702DCB345E5DDDB534DF78B7F2573DE704B5E063ED73DD0A26

Installation verification

To check that this security update was applied correctly, follow these steps:

  1. Open the Visual Studio 2015 folder.

  2. Locate the DiagnosticHub.StandardCollector.Runtime.dll file.

  3. Verify that the file version is equal to or greater than 14.0.27533.

Information about protection, security, and support

Need more help?

Want more options?

Explore subscription benefits, browse training courses, learn how to secure your device, and more.

Communities help you ask and answer questions, give feedback, and hear from experts with rich knowledge.