Summary
This security update resolves remote code execution vulnerabilities that exists in Microsoft SharePoint if the software does not check the source markup of an application package. This update also resolves cross-site-scripting (XSS) vulnerabilities that exists if Microsoft SharePoint Server does not correctly sanitize a specially crafted web request to an affected SharePoint server.
To learn more about these vulnerabilities, see the following security advisories:
-
Microsoft Common Vulnerabilities and Exposures CVE-2020-0920
-
Microsoft Common Vulnerabilities and Exposures CVE-2020-0923
-
Microsoft Common Vulnerabilities and Exposures CVE-2020-0924
-
Microsoft Common Vulnerabilities and Exposures CVE-2020-0925
-
Microsoft Common Vulnerabilities and Exposures CVE-2020-0926
-
Microsoft Common Vulnerabilities and Exposures CVE-2020-0927
-
Microsoft Common Vulnerabilities and Exposures CVE-2020-0929
-
Microsoft Common Vulnerabilities and Exposures CVE-2020-0930
-
Microsoft Common Vulnerabilities and Exposures CVE-2020-0931
-
Microsoft Common Vulnerabilities and Exposures CVE-2020-0932
-
Microsoft Common Vulnerabilities and Exposures CVE-2020-0933
-
Microsoft Common Vulnerabilities and Exposures CVE-2020-0954
-
Microsoft Common Vulnerabilities and Exposures CVE-2020-0971
-
Microsoft Common Vulnerabilities and Exposures CVE-2020-0972
-
Microsoft Common Vulnerabilities and Exposures CVE-2020-0973
-
Microsoft Common Vulnerabilities and Exposures CVE-2020-0974
-
Microsoft Common Vulnerabilities and Exposures CVE-2020-0975
-
Microsoft Common Vulnerabilities and Exposures CVE-2020-0976
-
Microsoft Common Vulnerabilities and Exposures CVE-2020-0977
-
Microsoft Common Vulnerabilities and Exposures CVE-2020-0978
-
Microsoft Common Vulnerabilities and Exposures CVE-2020-0980
Note To apply this security update, you must have the release version of Microsoft SharePoint Enterprise Server 2016 installed on the computer.
This public update delivers Feature Pack 2 for SharePoint Server 2016. Feature Pack 2 contains the following feature:
-
SharePoint Framework (SPFx)
This public update also delivers all the features that were included in Feature Pack 1 for SharePoint Server 2016, including:
-
Administrative Actions Logging
-
MinRole enhancements
-
SharePoint Custom Tiles
-
Hybrid Taxonomy
-
OneDrive API for SharePoint on-premises
-
OneDrive for Business modern user experience (available to Software Assurance customers)
The OneDrive for Business modern user experience requires an active Software Assurance contract at the time that the experience is enabled, either by installation of the public update or by manual enablement. If you don't have an active Software Assurance contract at the time of enablement, you must turn off the OneDrive for Business modern user experience.
For more information, see the following Microsoft Docs articles:
Improvements and fixes
This security update contains improvements and fixes for the following nonsecurity issues in SharePoint Server 2016:
-
Because Brazil no longer observes daylight saving time, date and time values are displayed incorrectly for list items in site collections that use the "(UTC-03:00) Brasilia" and "(UTC-04:00) Cuiaba" time zones.
-
If a list has many columns and security scopes but fewer than the List View Threshold setting (the default setting is 5,000), it may take long time to open the list because of a slow response from the database server.
-
Enterprise keywords can't be saved in the NewDocSet.aspx page after you add another metadata column to the document set.
-
When you use two separate accounts for the object cache, the publishing sites collections may intermittently display a "Sorry something went wrong" error message.
-
Word 2016 crashes when you try to save certain documents.
-
Mixtures of Traditional Chinese and other text are not handled correctly by the Chinese Traditional Word Breaker.
How to get and install the update
Method 1: Microsoft Update
This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see Windows Update: FAQ.
Method 2: Microsoft Update Catalog
To get the standalone package for this update, go to the Microsoft Update Catalog website.
Method 3: Microsoft Download Center
You can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.
More Information
Security update deployment information
For deployment information about this update, see security update deployment information: April 14, 2020.
Security update replacement information
This security update replaces previously released security update 4484272.
File hash information
File name |
SHA1 hash |
SHA256 hash |
---|---|---|
sts2016-kb4484299-fullfile-x64-glb.exe |
850F792F268B56400103766E2BC5D74D7166B40C |
5296CCF54B4F7A184FF3312D08285E51E85E9030A83E1C5A3F4F357E0EFE2E00 |
File information
Download the list of files that are included in security update 4484299.
Information about protection and security
Protect yourself online: Windows Security support
Learn how we guard against cyber threats: Microsoft Security