Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

Description of the security update for Office 2016: October 13, 2020


View products that this article applies to.

Summary

This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2020-16929 and Microsoft Common Vulnerabilities and Exposures CVE-2020-16954.

Note To apply this security update, you must have the release version of Office 2016 installed on the computer.

Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2016. It doesn't apply to the Office 2016 Click-to-Run editions, such as Microsoft Office 365 Home (see What version of Office am I using?).

↑ Back to the top


How to get and install the update

Method 1: Microsoft Update

This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see Windows Update: FAQ.

Method 2: Microsoft Update Catalog

To get the standalone package for this update, go to the Microsoft Update Catalog website.

Method 3: Microsoft Download Center

You can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.

↑ Back to the top


More information

Security update deployment information

For deployment information about this update, see security update deployment information: October 13, 2020.

Security update replacement information

This security update replaces previously released security update 4484513.

File hash information

File name SHA1 hash SHA256 hash
graph2016-kb4486682-fullfile-x86-glb.exe 75DB79698B8D82C7BE9FAADFA2A6E127743AA5C3 A22B244F112A4AD1F112B139C53A27F753D14023E0C9F9D3E03CD5F1B1D46DAC
graph2016-kb4486682-fullfile-x64-glb.exe 851F1D83D2793F6AD448A3CF64F12AE9CDAF87DD 0DE4D15CCFA27B9BE71F8EC86A10CA17BD66072B8B3947F65FF63F9D25F7DF16


File information

The English (United States) version of this software update installs files that have the attributes that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.

For all supported x86-based versions of Office 2016
File identifier File name File version File size Date Time
graph.exe graph.exe 16.0.5071.1000 4419936 18-Sep-20 02:05
For all supported x64-based versions of Office 2016
File identifier File name File version File size Date Time
graph.exe graph.exe 16.0.5071.1000 5731192 18-Sep-20 02:05

↑ Back to the top


Information about protection and security

Protect yourself online: Windows Security support

Learn how we guard against cyber threats: Microsoft Security

↑ Back to the top


Keywords: kbBug, kbfix, kbExpertiseInter, kbSecReview, KbSECBulletin, KbSECVulnerability, ATdownload, kbMustLoc, kbLangAll, kbSecurity, kbsurveynew

↑ Back to the top

Article Info
Article ID : 4486682
Revision : 5
Created on : 10/12/2020
Published on : 10/13/2020
Exists online : False
Views : 210