Summary
This security update resolves an information disclosure vulnerability that exists if Microsoft Excel incorrectly discloses the contents of its memory. It also resolves a remote code execution vulnerability that exists in Excel if the software does not correctly handle objects in memory. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2020-1218, CVE-2020-1224, and CVE-2020-1335. Note To apply this security update, you must have the release version of Service Pack 1 for Microsoft Office Web Apps Server 2013 installed on the computer.
How to get and install the update
Method 1: Microsoft Update
This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see Windows Update: FAQ.
Method 2: Microsoft Update Catalog
To get the standalone package for this update, go to the Microsoft Update Catalog website.
Method 3: Microsoft Download Center
You can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.
More information
Security update deployment information
For deployment information about this update, see security update deployment information: September 8, 2020.
Security update replacement information
This security update replaces any previously released update 4484481.
File hash information
File name |
SHA1 hash |
SHA256 hash |
---|---|---|
WacServer2013-kb4484518-fullfile-x64-glb.exe |
AA121AF9D0EB35D74CCAD6EF7BB67B788A0E4352 |
849FE8E4BE7030088635AA4D6A89BA85D141B863B9AB2F7BC5B1A36D489CC9A4 |
File information
Download the list of files that are included in security update 4484518.
Information about protection and security
Protect yourself online: Windows Security support
Learn how we guard against cyber threats: Microsoft Security