Summary

This security update resolves a remote code execution vulnerability that exists if Microsoft Office incorrectly loads arbitrary type libraries. To learn more about the vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2020-0760.Note To apply this security update, you must have the release version of Service Pack 1 for Microsoft Office 2013 installed on the computer.

Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2013. It doesn't apply to the Office 2013 Click-to-Run editions, such as Microsoft Office 365 Home (see What version of Office am I using?).

Known issues

  • Issue 1 Symptom Some types of Visual Basic for Applications (VBA) references might be affected by this update. For more information, see FAQ for VBA solutions affected by April 2020 Office security updates.Status This change in behavior is caused by a design change in Office. The new behavior is by design. Therefore, a fix is not necessary and no mitigation will be provided.

  • Issue 2 Symptom Consider the following scenario:

    • You open an Excel workbook.

    • The workbook has VBA macros.

    • The macros contain references that include DBCS (double-byte) characters.

    In this scenario, you may receive the following error message after this update is installed:

    The Visual Basic for Applications (VBA) macro in this workbook is corrupt and has been removed. Macro corruption may exist in the current file. To recover the macro, please open a backup copy of this file.

    Fix To fix this issue, install KB 2986208.

How to get and install the update

Method 1: Microsoft Update

This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see Windows Update: FAQ.

Method 2: Microsoft Update Catalog

To get the standalone package for this update, go to the Microsoft Update Catalog website.

Method 3: Microsoft Download Center

You can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.

More information

Security update deployment information

For deployment information about this update, see security update deployment information: April 14, 2020.

Security update replacement information

This security update replaces previously released security update 3115153.

File hash information

File name

SHA1 hash

SHA256 hash

vbe72013-kb4011104-fullfile-x64-glb.exe

482AA7AFA9C744E5D9ED974BC033BCA4D55770E0

871AE858D7D036C00C8149DC76C19581B9C8EA86A6036B36284D6F315718CFD8

vbe72013-kb4011104-fullfile-x86-glb.exe

026B69CA8AB899A77E3DB25ECFDD56949029716D

BEFCE36A3FE812BA7FC380BF02E7451CE8AEAACBA0B0BF346E048FB1AA409D47

File information

The English (United States) version of this software update installs files that have the attributes that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.

File identifier

File name

File version

File size

Date

Time

vbeui.dll

vbeui.dll

7.1.15.5223

2214800

23-Mar-20

03:57

vbe7.dll

vbe7.dll

7.01.1096

2712656

19-Mar-20

02:17

File identifier

File name

File version

File size

Date

Time

vbeui.dll

vbeui.dll

7.1.15.5223

2733968

23-Mar-20

04:44

vbe7.dll

vbe7.dll

7.01.1096

4504144

19-Mar-20

02:51

Information about protection and security

Protect yourself online: Windows Security support

Learn how we guard against cyber threats: Microsoft Security

Need more help?

Want more options?

Explore subscription benefits, browse training courses, learn how to secure your device, and more.

Communities help you ask and answer questions, give feedback, and hear from experts with rich knowledge.