Summary

This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0919.Note To apply this security update, you must have the release version of Office Online Server installed on the computer.

How to get and install the update

Method 1: Microsoft Update Catalog

To get the stand-alone package for this update, go to the Microsoft Update Catalog website.

Method 2: Microsoft Download Center

You can get the stand-alone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.

More Information

Security update deployment information

For deployment information about this update, see security update deployment information: March 13, 2018.

Security update replacement information

This security update replaces previously released security update KB4011022.

File hash information

Package name

Package hash SHA 1

Package hash SHA 2

wacserver2016-kb4011023-fullfile-x64-glb.exe

CEBCF31AD1B129F81535775C50500FD8182A3C86

35DA6A576B2C4E6BD0D617AFE46EF64BF077DA980109D4FFC8846AA9E383D042

File information

For the list of files that cumulative update 4011023 contains, download the file information for update 4011023

How to get help and support for this security update

Help for installing updates: Windows Update FAQ Security solutions for IT professionals: Security Support and Troubleshooting Help for protecting your Windows-based computer from viruses and malware: Microsoft Secure Local support according to your country: International Support

Propose a feature or provide feedback on SharePoint: SharePoint User Voice portal

ヘルプを表示

その他のオプションが必要ですか?

Explore subscription benefits, browse training courses, learn how to secure your device, and more.

Communities help you ask and answer questions, give feedback, and hear from experts with rich knowledge.