Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

Description of the security update for SharePoint Server 2013: May 9, 2017


View products that this article applies to.

Summary

This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2017-0281.

Note To apply this security update, you must have the release version of Service Pack 1 for Microsoft SharePoint Server 2013 installed on the computer.

↑ Back to the top


Improvements and fixes

This security update contains the following improvements:

  • Updates flags for the ParentLink managed property to match the DocumentLink managed property.

     

  • Improves execution efficiency of the stored procedure for deleting Secure Store audits.

     

  • Improves word breaking for Thai language.

     

This security update fixes the following nonsecurity issues:

  • You can't restore a document of a document set to an earlier version if the document library contains more than 5,000 items.

     

  • After you delete an organization unit for an AD Import connection, the deleted organization unit is still shown as selected.

     

  • Notification emails that indicate that a page will expire contain an invalid link.

     

  • You can't create more than 200 content deployment jobs in SharePoint Server 2013.

     

  • A screen reader reads out the term icons in a term hierarchy tree view.

     

  • After you delete a search center sub site, you can't download search reports any more.

     

 

↑ Back to the top


How to get and install the update

Method 1: Microsoft Update

This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see Windows Update: FAQ.

Method 2: Microsoft Update Catalog

To get the stand-alone package for this update, go to the Microsoft Update Catalog website.

Method 3: Microsoft Download Center

You can get the stand-alone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.

↑ Back to the top


More Information

Security update deployment information

For deployment information about this update, see security update deployment information: May 9, 2017.

Security update replacement information

This security update replaces security update 3085567.

File hash information

Package name Package hash SHA 1 Package hash SHA 2
coreserverloc2013-kb3191886-fullfile-x64-glb.exe FAF7F72FF7589784124CDDFFB724608196FCAF3C 9A10B81E9DB8FC1C3728592AE730BFD9F5CEB3C98BF38E5451D66A820FABD829

File information

For a list of the files that are provided in this cumulative update 3191886, download the file information for update 3191886.

↑ Back to the top


How to get help and support for this security update

Help for installing updates: Support for Microsoft Update

Security solutions for IT professionals: TechNet Security Troubleshooting and Support

Help for protecting your Windows-based computer from viruses and malware: Virus Solution and Security Center

Local support according to your country: International Support

Propose a feature or provide feedback on SharePoint: SharePoint User Voice portal

↑ Back to the top


Keywords: kbBug, kbfix, kbsurveynew, kbSecReview, KbSECBulletin, KbSECVulnerability, ATdownload, kbMustLoc, kbLangAll, kbSecurity, kbExpertiseInter

↑ Back to the top

Article Info
Article ID : 3191886
Revision : 19
Created on : 4/13/2020
Published on : 4/16/2020
Exists online : False
Views : 357