Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

Description of the security update for SharePoint Enterprise Server 2016: April 9, 2019


View products that this article applies to.

Summary

This security update resolves a cross-site-scripting (XSS) vulnerability that exists when Microsoft SharePoint Server does not correctly sanitize a specially crafted web request to an affected SharePoint server. To learn more about the vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2019-0830 and Microsoft Common Vulnerabilities and Exposures CVE-2019-0831.

Note To apply this security update, you must have the release version of Microsoft SharePoint Enterprise Server 2016 installed on the computer.

This public update delivers Feature Pack 2 for SharePoint Server 2016. Feature Pack 2 contains the following feature:

  • SharePoint Framework (SPFx)

This public update also delivers all the features that were included in Feature Pack 1 for SharePoint Server 2016, including:

  • Administrative Actions Logging
  • MinRole enhancements
  • SharePoint Custom Tiles
  • Hybrid Auditing (preview)
  • Hybrid Taxonomy
  • OneDrive API for SharePoint on-premises
  • OneDrive for Business modern user experience (available to Software Assurance customers)

The OneDrive for Business modern user experience requires an active Software Assurance contract at the time that the experience is enabled, either by installation of the public update or by manual enablement. If you don't have an active Software Assurance contract at the time of enablement, you must turn off the OneDrive for Business modern user experience.

For more information, see the following Microsoft Docs articles:

↑ Back to the top


Improvements and fixes

Contains fixes for the following nonsecurity issues in SharePoint Server 2016:

  • When the Missing server side dependencies health analyzer rule runs on a server that's not running the SPWebService service, an error message that states that some web parts are missing in the system is displayed in the health analysis report.

  • The filter functionality in an Asset Picker control doesn't work and shows a deprecated style of UI.

  • Variations ignore the features that aren't installed on a farm instead of blocking provisioning on a new site.

  • If you add a column that has spaces in its column title to a SharePoint list or document, the column title is displayed as having encoded characters. This issue occurs when the Multilingual User Interface (MUI) is enabled and the current language on your computer is different from the SharePoint site's default language.

Contains fixes for the following nonsecurity issues in Project Server 2016:

  • When you query many projects in batches through the client-side object model (CSOM), the project custom fields values are returned as "null."

  • In an environment that uses the Japanese new era calendar, date formats that contain year aren't applied on the Timeline view for dates after 1 May 2019.

  • When you query a project by using a Representational State Transfer (REST) call, not all of the expected project related properties are returned.

  • When you update a single resource through the client-side object model (CSOM), a Reporting (Resource Sync) job is unexpectedly invoked for all resources and the process takes much longer than expected.

  • If you directly publish a project without first doing an explicit save operation, you won't receive an email notification for new or changed assignments.

  • Consider the following scenario:

  • You migrate your Project Server 2010 or 2013 data to Project Server 2016.
  • You open a project for editing from Project Web App.
  • You delete tasks in the project. You save the project.

In this situation, when the project is reopened, you may find that the tasks that were deleted previously reappear or that the project can't be reopened.

↑ Back to the top


How to get and install the update

Method 1: Microsoft Update

This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see Windows Update: FAQ.

Method 2: Microsoft Update Catalog

To get the standalone package for this update, go to the Microsoft Update Catalog website.

Method 3: Microsoft Download Center

You can get the stand-alone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.

↑ Back to the top


More information

Security update deployment information

For deployment information about this update, see security update deployment information: April 9, 2019.

Security update replacement information

This security update replaces previously released security update 4462211.

File hash information

File name SHA1 hash SHA256 hash
sts2016-kb4464510-fullfile-x64-glb.exe 358BF23103B24C12EEE869CD7EA59C4C258CDA6C 332CE26A5D22564D1DCD55E24D8A8F8311181259ACFE59349B5F463DBBAC01F5


File information

Download the list of files that are included in security update 4464510.

↑ Back to the top


How to get help and support for this security update

Help for installing updates: Protect yourself online

Help for protecting your Windows-based computer from viruses and malware: Microsoft Security

Local support according to your country: International Support

↑ Back to the top


Keywords: kbBug, kbfix, kbsurveynew, kbSecReview, KbSECBulletin, KbSECVulnerability, ATdownload, kbMustLoc, kbLangAll, kbSecurity, kbExpertiseInter

↑ Back to the top

Article Info
Article ID : 4464510
Revision : 10
Created on : 11/15/2019
Published on : 11/15/2019
Exists online : False
Views : 130