CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS
Percentile
97.0%
This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2018-8173.
Note To apply this security update, you must have the release version of Service Pack 1 for Microsoft Office 2013 installed on the computer.Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2013. It doesn’t apply to the Office 2013 Click-to-Run editions, such as Microsoft Office 365 Home (see Determining your Office version).
This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see Windows Update: FAQ.
To get the stand-alone package for this update, go to the Microsoft Update Catalog website.
You can get the stand-alone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.
For deployment information about this update, see security update deployment information: May 8, 2018.
This security update doesn’t replace any previously released update.
Package Name | Package Hash SHA 1 | Package Hash SHA 2 |
---|---|---|
ipeditor2013-kb3162075-fullfile-x64-glb.exe | CA84B9DBF5047A2C3CDD958E09AE0DC719B9700B | CAB389806F4B7F5CE79F4A32C73BFDE5893DE693B38FC7BC0F584000155CD96F |
ipeditor2013-kb3162075-fullfile-x86-glb.exe | 0C1A0141E5BD3F183B89BE2D329AD54134EDB863 | 8C00FC3B2DB4EFBFB6DBC15CDB921E55F5198BC8AAF530F200E9C39256F2A02F |
The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.
File identifier | File name | File version | File size | Date | Time |
---|---|---|---|---|---|
ipeditor.dll | ipeditor.dll | 15.0.5027.1000 | 5561040 | 11-Apr-18 | 03:51 |
ipomsec.dll | microsoft.office.infopath.client.internal.clrhost.dll | 15.0.4615.1000 | 20192 | 11-Apr-18 | 03:51 |
ipomint.dll | microsoft.office.infopath.client.internal.host.interop.dll | 15.0.4703.1000 | 134888 | 11-Apr-18 | 03:51 |
ipomload.dll | microsoft.office.infopath.clrloader.dll | 15.0.4615.1000 | 17128 | 11-Apr-18 | 03:51 |
offxml.dll | offxml.dll | 15.0.4919.1000 | 144624 | 11-Apr-18 | 03:51 |
File identifier | File name | File version | File size | Date | Time |
---|---|---|---|---|---|
ipeditor.dll | ipeditor.dll | 15.0.5027.1000 | 8659152 | 11-Apr-18 | 03:53 |
ipomsec.dll | microsoft.office.infopath.client.internal.clrhost.dll | 15.0.4615.1000 | 20192 | 11-Apr-18 | 03:53 |
ipomint.dll | microsoft.office.infopath.client.internal.host.interop.dll | 15.0.5017.1000 | 160576 | 11-Apr-18 | 03:53 |
ipclrsmi.dll | microsoft.office.interop.infopath.semitrust.dll | 15.0.4420.1017 | 408216 | 11-Apr-18 | 03:53 |
ipclrwrp.dll | microsoft.office.interop.infopath.semitrust.dll | 15.0.4420.1017 | 408216 | 11-Apr-18 | 03:53 |
ipomload.dll | microsoft.office.infopath.clrloader.dll | 15.0.4615.1000 | 17128 | 11-Apr-18 | 03:53 |
offxml.dll | offxml.dll | 15.0.4919.1000 | 193776 | 11-Apr-18 | 03:53 |
Help for installing updates: Windows Update FAQSecurity solutions for IT professionals: TechNet Security Support and TroubleshootingHelp for protecting your Windows-based products and services from viruses and malware: Microsoft SecureLocal support according to your country: International SupportPropose a feature or provide feedback on Office Core: Office User Voice portal
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS
Percentile
97.0%