– Description of Office Service Pack 2 – Microsoft Support

Looking for:

Eol/obsolete software microsoft office 2013 rtm (sp0) detected free –

Click here to Download

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Known issues and behavior changes The following Microsoft Knowledge Base KB article describes the known issues or behavior changes that occur when you install this service pack:.

Technical information For more information about this service pack that includes a list of files affected, click the following article number to view the article in the Microsoft Knowledge Base:.

Need more help? Expand your skills. Get new features first. Was this information helpful? Yes No. Thank you! Any more feedback? The more you tell us the more we can help. Can you help us improve? Resolved my issue. Clear instructions. Easy to follow. No jargon. Provides support for task pane apps in Outlook to enable third-party developers to extend the compose experience for email messages and calendar items. This service pack fixes the Lync issues that are described in the following Microsoft Knowledge Base KB articles:.

The following workbook is available for download. This workbook lists the issues that are fixed by this service pack. If the Service Pack 1 update is uninstalled on a computer that is running Windows 8 or 8. To work around this issue, repair the Office installation in the Programs and Features item in Control Panel.

Microsoft has identified several COM add-ins for Microsoft Office applications that are reported to crash in large volume. In this SP1, the problematic versions of these add-ins that are blocked from starting are listed as follows. If you want to re-enable these add-ins, follow these steps:. Open the Options dialog from the File tab. To download the latest working versions of the add-ins that are listed here, go to the following websites.

To install these add-ins, in the following Excel update:. For more information about this service pack that includes a list of files affected, click the following article number to view the article in the Microsoft Knowledge Base:.

The third-party products that this article discusses are manufactured by companies that are independent of Microsoft. Microsoft makes no warranty, implied or otherwise, about the performance or reliability of these products. SQL Server is no exception to this. Each version of SQL Server usually has both an end of support date and an end of extended support date. At the end of mainstream support, Microsoft will no longer provide non-security hotfixes unless you have an extended support agreement.

All warranty claims end and they will no longer accept feature and change requests. Once a product reaches its ‘Extended Support End Date’ there will be no patches, security updates or support from Microsoft. If you’re using any of these products and do nothing, it’s almost certain that your risks around security and compliance will increase, which may also impact productivity.

These risks will only grow over time, so it’s vital you take action. SQL Server will officially go end-of-life on July 12, , after being supported for over 10 years. This package lets you buy up to 3 additional years of support in case your organization isn’t prepared yet for a migration.

If you’re still using these SQL Server versions, there are Extended Security Update packages available that can extend the end-of-life to July 12, After the extended support date has passed, your SQL Servers might no longer be secure as they will not receive security updates. It’s highly recommended that if you have SQL servers that reached or surpassed their end-of-life date, you update them as soon as possible.

Recordset property. Changes to a macro may not be saved if you don’t change focus after making a change. July 2, Update KB July 2, Office Update KB March 5, Update KB February 5, Update KB Fixes an Access crash issue that occurs when a form that contains a modern chart in a tab control is loaded in an Access database.

July 10, Update KB May 1, Office Update KB March 13, Office Update KB January 2, Update KB Access may crash when you try to add a lookup column to a related table in the Datasheet view. October 3, Update KB September 5, Update KB July 5, Update KB EXE continues to run after close if accessibility tool or any application that requests an accessible interface is running.

June 13, Office Update KB May 2, Update KB March 7, Update KB December 6, Update KB August 2, Update KB May 3, Update KB April 5, Office Update KB March 8, Update KB February 9, Update KB When you link a Microsoft SharePoint list to an Access App, you receive the following error message: ” An error occurred in the client while attempting to communicate with the server.

November 10, Security Update KB This update changes the version number for Access object library. After you copy, paste, or import forms and reports in Access , the color property settings of existing themes are changes.

New Serbian locale sr-latn-rs is added to replace the existing locale sr-latn-cs. Additionally, you receive the following error message in the import wizard: There is no object in this control. Templates get a Modern Look and Feel. Larger “Show Table” Dialog. Tell Me, New Themes. November 27, Manual Update KB When attempting to run an Update query, it may not run and displays the error: Query “query name” is corrupt. August 6, Office Update KB The security update addresses the vulnerability by correcting how Microsoft Access handles objects in the memory.

Note: To apply this security update, you must have the release version of Service Pack 1 for Microsoft Office installed on the computer. March 18, Office Update KB Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Access.

January 3, Update KB September 6, Update KB January 12, Update KB December 8, Update KB On cloud domain-joined computer that has Modern Authentication enabled, domain accounts seem to be logged in but can’t open files.

When you try to use the import text wizard to import a text file that contains DBCS characters in Access , the results don’t align correctly for newly created columns. August 11, Update KB EXE process becomes high. However, applying this update will reintroduce the problem that is addressed by the March 10, , update for Access KB As soon as this update is installed, fields that are bound to expressions on forms may not be recalculated when the computer has not been restarted for a long time.

July 14, Update KB When you undo a column deletion operation in table design view in Access , Access crashes. The Conditional Formatting button does not work if the ribbon is collapsed in Access After you import a form or report or you copy and paste an existing form or report in an Access app, the theme colors are changed unexpectedly under the control of the newly created form or report.

June 9, Update KB May 12, Update KB April 14, Update KB March 10, Update KB When you open an Access Web App that contains very large data macros in Access , you may receive an error message that resembles the following: There was a problem accessing a property or method of the OLE object. When you try to delete multiple columns from a table in Access , Access may crash. Assume that you create an Access Web App in Access An error may occur when you save the Web App in the following scenarios: You add a new field, then you set the Index property to Yes No Duplicates , then set the data type to Image.

You add more than 32 new fields and then set the Index properties to Yes No Duplicates. After, in this scenario, when you try to open the saved Web App, the error occurs again. February 10, Update KB You have to click [OK] again to start printing. November 11, Update KB When you click the [Browse] button in the References dialog box, Access may crash. October 10, Hotfix KB For example, when you try to delete a nonexistent object by invoking the DoCmd DeleteObject method, you receive an error code instead of April 8, Hotfix KB Run-Time error ”.

When you try to package an Access Web application, an. Please contact your system administrator or technical support. February 25, SP1 KB This service pack includes two kinds of fixes: Previously unreleased fixes that are included in this service pack. In addition to general product fixes, these fixes include improvements in stability, performance and security. All the monthly security updates that were released through January and all the Cumulative Updates that were released through December December 10, Update KB Additionally, this update contains stability and performance improvements.

December 10, Hotfix KB Additionally, assume that the table contains a currency field. When you open the Access Web App, you receive the following error message: ” Access Services: an error has occurred “. October 8, Update KB September 10, Update KB February 12, Update KB Text and Memo field types renamed to short and long text. Requires Windows 7, Server R2 or later. Note: To enable this improvement, you also need to install KB and KB together with this update.

January 18, Update KB Note: To enable this improvement, you must install December 4, , update for Office KB together with this update. After you install this security update, Microsoft Access and Excel stop working.

December 4, Office Update KB Additional updates may be required for Office applications because of expected changes in the Japanese era. This issue occurs after you apply the March 10, update for Access KB This issue occurs after you apply the July 14, , update for Access KB However, applying this update will reintroduce the problem that is addressed by the Hotfix KB for Access November 11, November 11, Hotfix KB Access may consume excessive CPU resources.

Background tasks do not execute. August 13, Hotfix KB July 22, Extra Free Download Connectivity to existing text files is also supported. May SP2 KB All the public updates that were released through May and all the cumulative updates that were released through April April 9, Hotfix KB Assure that the drivers that are included in Microsoft Office or Access Database Engine are installed on a computer.

You create an Excel spreadsheet that contains a data connection to an Access database on the computer. When you open the spreadsheet in Microsoft Excel and then update the data in the spreadsheet, you receive the following error message: ” Could not find installable ISAM “.

This issue also occurs if you create the spreadsheet in Excel and then open the spreadsheet in Excel However, the application does not run on a computer that is running an earlier version of Windows. This issue does not occur if the hotfix that is described in the following Microsoft Knowledge Base article is installed on the computer that is running an earlier version of Windows: For more information, see Microsoft’s page “Type Mismatch” error message when you run a VBA macro in a bit version of an Office application KB June 28, SP1 July 15, RTM

 
 

 

Eol/obsolete software microsoft office 2013 rtm (sp0) detected free

 

Highest score default Date modified newest first Date created oldest first. I guess you got above list from your security team’s scanning result? MS is the Microsoft Security Bulletin number. You need to apply the latest service pack Microsoft Skype have changed name to Lync.

You may refer to this page and select the patch fit your environment if i do update or apply patch does it effect my sharepoint farm or site or applications? Improve this answer. Mark L Mark L 4, 7 7 gold badges 59 59 silver badges bronze badges.

Thanks Mark.. Few Clarification like I have not done any update or patch from IS now i need to apply every patch month wise and year wise or only alone just latest CU update will remedies for previous all patch updates? Below are few list i have pasted for your understanding. You only need to apply the latest CU update e.

Oct because the patch is “cumulative”. It contains all the previous updates. Thank you so much :- — Deepak Hadpad. Please mark as answer if it helps. Sign up or log in Sign up using Google. Sign up using Facebook. Sign up using Email and Password. Post as a guest Name. Email Required, but never shown. The Overflow Blog. Run your microservices in no-fail mode Ep. Featured on Meta. Workaround refers to a setting or configuration change that does not correct the underlying vulnerability but would help block known attack vectors before you apply the update.

Microsoft has tested the following workarounds and states in the discussion whether a workaround reduces functionality:. This vulnerability could be exploited when a user opens a specially crafted file.

You can disable attempts to instantiate the TabStrip ActiveX control in Internet Explorer by setting the kill bit for the control in the registry. Warning If you use Registry Editor incorrectly, you may cause serious problems that may require you to reinstall your operating system. Microsoft cannot guarantee that you can solve problems that result from using Registry Editor incorrectly. Use Registry Editor at your own risk. For detailed steps that you can use to prevent a control from running in Internet Explorer, see Microsoft Knowledge Base Article Follow the steps in the article to create a Compatibility Flags value in the registry to prevent a COM object from being instantiated in Internet Explorer.

Double-click the. Note You must restart Internet Explorer for your changes to take effect. You can also apply it across domains by using Group Policy. Impact of workaround. Office documents that use embedded ActiveX controls may not display as intended. You can help protect against exploitation of this vulnerability by changing your settings for the Internet security zone to block ActiveX controls and Active Scripting. You can do this by setting your browser security to High.

Note If no slider is visible, click Default Level , and then move the slider to High. Note Setting the level to High may cause some websites to work incorrectly. If you have difficulty using a website after you change this setting, and you are sure the site is safe to use, you can add that site to your list of trusted sites. This will allow the site to work correctly even with the security setting set to High. Many websites that are on the Internet or on an intranet use ActiveX or Active Scripting to provide additional functionality.

For example, an online e-commerce site or banking site may use ActiveX Controls to provide menus, ordering forms, or even account statements. If you do not want to block ActiveX Controls or Active Scripting for such sites, use the steps outlined in “Add sites that you trust to the Internet Explorer Trusted sites zone”.

After you set Internet Explorer to block ActiveX controls and Active Scripting in the Internet zone and in the Local intranet zone, you can add sites that you trust to the Internet Explorer Trusted sites zone.

This will allow you to continue to use trusted websites exactly as you do today, while helping to protect yourself from this attack on untrusted sites. We recommend that you add only sites that you trust to the Trusted sites zone. Note Add any sites that you trust not to take malicious action on your system.

These are the sites that will host the update, and it requires an ActiveX Control to install the update. You can help protect against exploitation of this vulnerability by changing your settings to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone.

To do this, perform the following steps:. Note Disabling Active Scripting in the Internet and Local intranet security zones may cause some websites to work incorrectly. This will allow the site to work correctly. There are side effects to prompting before running Active Scripting.

Many websites that are on the Internet or on an intranet use Active Scripting to provide additional functionality. For example, an online e-commerce site or banking site may use Active Scripting to provide menus, ordering forms, or even account statements. Prompting before running Active Scripting is a global setting that affects all Internet and intranet sites.

You will be prompted frequently when you enable this workaround. For each prompt, if you feel you trust the site that you are visiting, click Yes to run Active Scripting. If you do not want to be prompted for all these sites, use the steps outlined in “Add sites that you trust to the Internet Explorer Trusted sites zone”. After you set Internet Explorer to require a prompt before it runs ActiveX controls and Active Scripting in the Internet zone and in the Local intranet zone, you can add sites that you trust to the Internet Explorer Trusted sites zone.

This will allow you to continue to use trusted websites exactly as you do today, while helping to protect you from this attack on untrusted sites. The following registry scripts can be saved in registry entry. For more information on how to use registry scripts, see Microsoft Knowledge Base Article In order to use ‘FileOpenBlock’ with Microsoft Office , all of the latest security updates for Office must be applied.

Alternatively, file block can be applied using Group Policy. For more information, see the TechNet article, Plan file block settings for Office For Microsoft Office and Microsoft Office , users who have configured the File Block policy and have not configured a special exempt directory or have not moved files to a trusted location will be unable to open Office files or earlier versions.

For Microsoft Office , Office files or earlier versions will either be blocked from opening or will be opened in protected mode depending on the open behavior that was selected.

For more information about the impact of file block setting in Microsoft Office software, see Microsoft Knowledge Base Article For Microsoft Office and Microsoft Office , use the following registry scripts to undo the settings used to set the File Block policy:. What is the scope of the vulnerability? This is a remote code execution vulnerability. What causes the vulnerability? The vulnerability is caused when an ActiveX control corrupts the system state in such a way as to allow an attacker to execute arbitrary code.

What are the Windows common controls? OCX file. What might an attacker use the vulnerability to do? An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. How could an attacker exploit the vulnerability? In an e-mail attack scenario, an attacker could exploit the vulnerability by sending a specially crafted document to the user and convincing the user to open the document. In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the website.

This can include compromised websites and websites that accept or host user-provided content or advertisements. Such websites could contain specially crafted content designed to exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these websites.

Instead, an attacker would have to convince users to visit a website, typically by getting them to click a link in an email message or in an Instant Messenger request that takes them to the attacker’s website. Then, specially crafted web content could be used to exploit the vulnerability on affected systems. What systems are primarily at risk from the vulnerability?

Workstations and terminal servers are primarily at risk. Servers could be at more risk if administrators allow users to log on to servers and to run programs. However, best practices strongly discourage allowing this. Does this mitigate this vulnerability? Enhanced Security Configuration is a group of preconfigured settings in Internet Explorer that can reduce the likelihood of a user or administrator downloading and running specially crafted web content on a server.

This is a mitigating factor for websites that you have not added to the Internet Explorer Trusted sites zone. Which components of Microsoft Office , Microsoft Office , and Microsoft Office require updating to mitigate this vulnerability? OCX is present in your installation. What does the update do? The update addresses the vulnerability by disabling the vulnerable version of the Windows common controls. It does this by setting the kill bit for the following class identifiers hosted in the library files:.

The update also replaces the vulnerable version of the Windows common controls with a new version that does not contain the vulnerability.

What is a kill bit? This is done by making a registry setting and is referred to as setting the kill bit. After the kill bit is set, the control can never be loaded, even when it is fully installed. Setting the kill bit makes sure that even if a vulnerable component is introduced or is re-introduced to a system, it remains inert and harmless. When this security bulletin was issued, had this vulnerability been publicly disclosed? Microsoft received information about this vulnerability through coordinated vulnerability disclosure.

When this security bulletin was issued, had Microsoft received any reports that this vulnerability was being exploited? Microsoft is aware of limited, targeted attacks attempting to exploit the vulnerability. However, when the security bulletin was released, Microsoft had not seen any examples of proof of concept code published.

Manage the software and security updates you need to deploy to the servers, desktop, and mobile systems in your organization. The Microsoft TechNet Security website provides additional information about security in Microsoft products.

Security updates are available from Microsoft Update and Windows Update. Security updates are also available from the Microsoft Download Center. You can find them most easily by doing a keyword search for “security update. Finally, security updates can be downloaded from the Microsoft Update Catalog. The Microsoft Update Catalog provides a searchable catalog of content made available through Windows Update and Microsoft Update, including security updates, drivers and service packs.

By searching using the security bulletin number such as, “MS” , you can add all the applicable updates to your basket including different languages for an update , and download to the folder of your choosing. Microsoft provides detection and deployment guidance for security updates. This guidance contains recommendations and information that can help IT professionals understand how to use various tools for detection and deployment of security updates. For more information, see Microsoft Knowledge Base Article Microsoft Baseline Security Analyzer MBSA lets administrators scan local and remote systems for missing security updates as well as common security misconfigurations.

For more information, see Microsoft Baseline Security Analyzer. Windows Server Update Services WSUS enables information technology administrators to deploy the latest Microsoft product updates to computers that are running the Windows operating system. Note Microsoft discontinued support for SMS 2.

Customers are encouraged to upgrade to System Center Configuration Manager. See also Downloads for Systems Management Server For more information, see System Center.

For more detailed information, see Microsoft Knowledge Base Article : Summary list of monthly detection and deployment guidance articles. Updates often write to the same files and registry settings required for your applications to run. This can trigger incompatibilities and increase the time it takes to deploy security updates.

You can streamline testing and validating Windows updates against installed applications with the Update Compatibility Evaluator components included with Application Compatibility Toolkit. The Application Compatibility Toolkit ACT contains the necessary tools and documentation to evaluate and mitigate application compatibility issues before deploying Windows Vista, a Windows Update, a Microsoft Security Update, or a new version of Windows Internet Explorer in your environment.

For information about the specific security update for your affected software, click the appropriate link:. The following table contains the security update information for this software.

You can find additional information in the Deployment Information subsection below. Note You can combine these switches into one command. For backward compatibility, the security update also supports many of the setup switches that the earlier version of the Setup program uses.

For more information about the supported installation switches, see Microsoft Knowledge Base Article See the section, Detection and Deployment Tools and Guidance , earlier in this bulletin for more information. File Version Verification Because there are several editions of Microsoft Windows, the following steps may be different on your system.

If they are, see your product documentation to complete these steps. You can find additional information in the subsection, Deployment Information , in this section. Click Start and then enter an update file name in the Start Search box. When the file appears under Programs , right-click the file name and click Properties.

On the General tab, compare the file size with the file information tables provided in the bulletin KB article. Note Depending on the edition of the operating system, or the programs that are installed on your system, some files that are listed in the file information table may not be installed. You can also click the Details tab and compare information, such as file version and date modified, with the file information tables provided in the bulletin KB article.

Note Attributes other than the file version may change during installation. Comparing other file attributes to the information in the file information table is not a supported method of verifying that the update has been applied.

Also, in certain cases, files may be renamed during installation. If the file or version information is not present, use one of the other available methods to verify update installation. Finally, you can also click the Previous Versions tab and compare file information for the previous version of the file with the file information for the new, or updated, version of the file. When you install this security update, the installer checks to see if one or more of the files that are being updated on your system have previously been updated by a Microsoft hotfix.

For more information about the terminology that appears in this bulletin, such as hotfix , see Microsoft Knowledge Base Article