Summary
This security update resolves a Microsoft SharePoint Server remote code execution vulnerability. To learn more about the vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2024-30100.
Notes:
-
This is build 16.0.17328.20362 of the security update package.
-
To apply this security update, you must have the release version of Microsoft SharePoint Server Subscription Edition installed on the computer.
Improvements and fixes
This security update contains fixes for the following nonsecurity issues in SharePoint Server Subscription Edition:
-
Fixes an issue in which a new server doesn't have the right configuration when it joins an existing farm if the Antimalware Scanning Interface (AMSI) feature is enabled.
-
Fixes an issue in which the distributed cache registry key is removed when you delete a remote server by using a PowerShell cmdlet or from Central Administration.
-
Fixes an issue in which the calendar view doesn't switch to the classic view when you open the calendar view for a list from Quick Launch.
-
Fixes an issue in which the New button of document library web parts doesn't respect custom content types in a non-English environment.
-
Fixes an issue in which the document library enters an endless update loop if a bulk upload operation is interrupted midway.
-
Fixes an issue in which you receive the “Cannot Start Application” dialog box when you try to run the Discovery Download Manager.
-
Fixes an issue in which anonymous users cannot search in modern sites.
-
Fixes the high CPU usage performance issue.
This security update also contains a fix for the following nonsecurity issue in Project Server:
-
Fixes an issue in which the connected SharePoint site displays as not created with specific Unicode characters in URL.
How to get and install the update
Method 1: Microsoft Update
This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see Windows Update: FAQ.
Method 2: Microsoft Update Catalog
To get the standalone package for this update, go to the Microsoft Update Catalog website.
Method 3: Microsoft Download Center
You can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.
More information
Security update deployment information
For deployment information about this update, see Deployments - Security Update Guide.
Security update replacement information
This security update replaces previously released security update 5002599.
File hash information
File name |
SHA256 hash |
---|---|
uber-subscription-kb5002603-fullfile-x64-glb.exe |
616A4051EDE5A3C88BC2E872631E78D565A2B230E7FED43419583388D67531C0 |
File information
Download the list of files that are included in security update 5002603.
Information about protection and security
Protect yourself online: Windows Security support
Learn how we guard against cyber threats: Microsoft Security