Applies ToMicrosoft Office 2010 Service Pack 2

Summary

This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2020-0760.Note To apply this security update, you must have the release version of Service Pack 2 for Office 2010 installed on the computer.

Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2010. It doesn't apply to the Office 2010 Click-to-Run editions, such as Microsoft Microsoft Office 2010 Home and Student (see What version of Office am I using?).

Known issues

  • Issue 1 Symptom Some types of Visual Basic for Applications (VBA) references might be affected by this update. For more information, see FAQ for VBA solutions affected by April 2020 Office security updates.Status This change in behavior is caused by a design change in Office. The new behavior is by design. Therefore, a fix is not necessary and no mitigation will be provided.

  • Issue 2 Symptom Consider the following scenario:

    • You open an Excel workbook.

    • The workbook has VBA macros.

    • The macros contain references that include DBCS (double-byte) characters.

    In this scenario, you may receive the following error message after this update is installed:

    The Visual Basic for Applications (VBA) macro in this workbook is corrupt and has been removed. Macro corruption may exist in the current file. To recover the macro, please open a backup copy of this file.

    Fix To fix this issue, install KB 3015640.

How to get and install the update

Method 1: Microsoft Update

This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see Windows Update: FAQ.

Method 2: Microsoft Update Catalog

To get the standalone package for this update, go to the Microsoft Update Catalog website.

Method 3: Microsoft Download Center

You can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.

More information

Security update deployment information

For deployment information about this update, see security update deployment information: April 14, 2020.

Security update replacement information

This security update replaces previously released security update 3115120.

File hash information

File name

SHA1 hash

SHA256 hash

vbe72010-kb3203462-fullfile-x64-glb.exe

882DB875E604154A5D97F2D2433AC581930B0BBA

27CF7383C0FA8C2BB92232FA4C5A92C2AAB289F323944C3BC974E4FA2408307E

vbe72010-kb3203462-fullfile-x86-glb.exe

6A1BBB9F014AF6451994A05C05E5A1A129A53A4F

B45982BF0CDD53B543FA49201E972317C8044EB2EB135D29B85620883D8AE9CE

File information

The English (United States) version of this software update installs files that have the attributes that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.

File identifier

File name

File version

File size

Date

Time

vbe7.dll

vbe7.dll

7.00.1645

2,707,744

19-Mar-2020

08:49

File identifier

File name

File version

File size

Date

Time

vbe7.dll

vbe7.dll

7.00.1645

3,680,032

19-Mar-2020

08:49

Information about protection and security

Protect yourself online: Windows Security support

Learn how we guard against cyber threats: Microsoft Security

Perlu bantuan lainnya?

Ingin opsi lainnya?

Explore subscription benefits, browse training courses, learn how to secure your device, and more.

Communities help you ask and answer questions, give feedback, and hear from experts with rich knowledge.