Applies ToSharePoint Server 2013 SP1

Summary

This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following Microsoft Docs articles:

Note To apply this security update, you must have the release version of Service Pack 1 for Microsoft SharePoint Server 2013 installed on the computer.

How to get and install the update

Method 1: Microsoft Update

This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see Windows Update: FAQ.

Method 2: Microsoft Update Catalog

To get the standalone package for this update, go to the Microsoft Update Catalog website.

Method 3: Microsoft Download Center

You can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.

More information

Security update deployment information

For deployment information about this update, see security update deployment information: June 9, 2020.

Security update replacement information

This security update replaces previously released security update 4484352.

File hash information

File name

SHA1 hash

SHA256 hash

coreserverloc2013-kb4484405-fullfile-x64-glb.exe

AC0B42AE5240BD6804B8F42FDF1AAC816C2A6453

2B0F2FF72CB47466C88599046DBD9D3EAE2468757E8C27438350D0FC7F588A8C

File information

Download the list of files that are included in security update 4484405.

Information about protection and security

Protect yourself online: Windows Security support

Learn how we guard against cyber threats: Microsoft Security

도움이 더 필요하세요?

더 많은 옵션을 원하세요?

Explore subscription benefits, browse training courses, learn how to secure your device, and more.

Communities help you ask and answer questions, give feedback, and hear from experts with rich knowledge.