CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
98.1%
This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Security Bulletin MS16-088.
Note To apply this security update, you must have the release version of Service Pack 2 for Office 2010 installed on the computer.
For a complete list of affected versions of Microsoft Office software, see Microsoft Knowledge Base article KB3170008.
Note This security update changes the behavior of Excel add-ins and files that contain HTML content. For more information, see the More information section.
This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see the “Turn on automatic updating in Control Panel” section of this Safety & Security Center article.
You can get the stand-alone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.
This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. One change that’s included in this update applies to how Excel handles documents that are opened from untrusted locations that are not supported in Protected View. These include untrusted Excel add-ins (.xla or .xlam) and HTML content (.htm or .html, including those documents that are renamed with an .xls extension). Previously, these files bypassed Protected View when opened. This could lead to a security vulnerability. This security update now blocks these files from being opened from untrusted locations. This security update may break compatibility with existing solutions. To work around these issues, users have to manually trust the file before they open it in Excel.
For more information about Office trusted locations and how to trust a file, see the following Microsoft webpage:Plan Trusted Locations settings for Office 2010Alternatively, follow these steps to manually unblock an Excel add-in (.xla or .xlam).
Note This action cannot be undone.
Important We do not recommend that you uninstall any security update. Doing so will leave your system vulnerable.
The Office security team is considering changes in future updates to preserve security and to help customers resolve any workflow issues that are caused by this security update. For more information, see the following Excel Support team blog:Excel workbooks may not open after installing MS16-088
For deployment information about this update, see Microsoft Knowledge Base article KB3170008.
This security update replaces previously released security update KB3115130.
Package Name | Package Hash SHA 1 | Package Hash SHA 2 |
---|---|---|
excel2010-kb3115322-fullfile-x86-glb.exe | 874100C8A76764C8F310D2E8DB238C67CAE81A20 | 2FD028C7EFA647A7368EB9EE84ED5ECA10E3DB12EA97DB006B08DBCDEA0B97FC |
excel2010-kb3115322-fullfile-x64-glb.exe | 57903BBBB4DC7C3CB4DF6C9ADA55A51B0660CF0C | C0DDF409D95389306003ACC2F4679A66A4F2EB4EA31C0C3958E1EFE201EBFFE8 |
__
File information
The English version of this security update has the file attributes (or later file attributes) that are listed in the following table.
For all supported x86-based versions of Excel 2010File identifier | File name | File version | File size | Date | Time |
---|---|---|---|---|---|
excel.exe | excel.exe | 14.0.7171.5000 | 20,411,584 | 16-Jun-2016 | 10:32 |
excel.man | excel.exe.manifest | 1,194 | 05-Nov-2009 | 11:00 | |
xl12cnv.exe | excelcnv.exe | 14.0.7170.5000 | 17,848,000 | 17-May-2016 | 02:04 |
xlcall32.dll | xlcall32.dll | 14.0.7162.5000 | 10,432 | 13-Oct-2015 | 06:52 |
xlicons.exe | xlicons.exe | 14.0.7120.5000 | 1,480,360 | 05-Mar-2014 | 06:06 |
For all supported x64-based versions of Excel 2010File identifier | File name | File version | File size | Date | Time |
— | — | — | — | — | — |
excel.exe | excel.exe | 14.0.7171.5000 | 27,667,136 | 16-Jun-2016 | 10:36 |
excel.man | excel.exe.manifest | 1,196 | 05-Nov-2009 | 11:23 | |
xl12cnv.exe | excelcnv.exe | 14.0.7170.5000 | 25,059,520 | 17-May-2016 | 02:18 |
xlcall32.dll | xlcall32.dll | 14.0.7162.5000 | 10,944 | 13-Oct-2015 | 07:00 |
xlicons.exe | xlicons.exe | 14.0.7120.5000 | 1,480,360 | 05-Mar-2014 | 06:06 |
__
How to get help and support for this security update
Help for installing updates:
Support for Microsoft Update
Security solutions for IT professionals:
TechNet Security Troubleshooting and Support
Help for protecting your Windows-based computer from viruses and malware:
Virus Solution and Security Center
Local support according to your country: International Support
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
98.1%