Microsoft Releases Security Update For Office 2016 For Mac: Boosts Productivity and Collaboration
- stefan-scott1989
- Aug 11, 2023
- 5 min read
Office for Mac that comes with a Microsoft 365 subscription is updated on a regular basis to provide new features, security updates, and non-security updates. The following information is primarily intended for IT professionals who are deploying Office for Mac to the users in their organizations.
The following table provides release history information and download links for Office for Mac. The table is ordered by release date, with the most recent release date listed first. The build date is listed in parentheses, in a YYMMDD format, after the version number. All releases after August 22, 2016 are 64-bit only. All releases prior to August 22, 2016 are 32-bit only.
Microsoft Releases Security Update For Office 2016 For Mac
DOWNLOAD: https://tinurll.com/2vzKJQ
Microsoft releases security and quality updates for the Click-To-Run (C2R) version of Office 2016 and for Office 2019, which is exclusively C2R. These updates are released approximately once a month, usually on the second Tuesday of the month.
The following tables provide the update history for the volume licensed version of Office 2019, as well as the retail versions of Office 2016 C2R and Office 2019, with the most recent release date listed first.
Although you'll still be able to use Office 2016 for Mac, you will no longer receive security updates and bug fixes after October 13, 2020. Upgrade to a newer version of Office so you can stay up to date with all the latest features, patches, and security updates.
On Tuesday, October 13, 2015, Microsoft released the following security and nonsecurity updates. These monthly updates are intended to help our customers keep their computers secure and up-to-date. We recommend that you install all updates that apply to you.
On Tuesday, November 8, 2016, Microsoft released the following security and nonsecurity updates. These monthly updates are intended to help our customers keep their computers secure and up-to-date. We recommend that you install all updates that apply to you.
On Tuesday, January 12, 2016, Microsoft released the following security and nonsecurity updates. These monthly updates are intended to help our customers keep their computers secure and up-to-date. We recommend that you install all updates that apply to you.
Office 2016 for Mac users can get the updates by using Microsoft AutoUpdate. To do this, open a Microsoft Office program, and then click Check for Updates on the Help menu. Otherwise, the updates are also available for download and installation from the Microsoft Download Center:
One visual change from the initial public beta release is that Microsoft has decided the unifying color scheme of Office products should extend to the title bars at the top of windows. In the first beta, Excel's top bar was Yosemite-style monochrome, but there was a nod to Excel Green in the status bar at the bottom. In the final version of Office 2016, the title bar is full-on green in Excel, blue in Word, and so forth. It's bold and not quite Mac-like, but fits exactly with the look of the product on iOS. I kind of dig it, but if you want to flip the appearance so things are monochrome up top and colorful down at the bottom, you can--in the General section of the Preferences window, you can switch from the "Colorful" theme to the "Classic" model and that selection will be applied to all office apps.
According to Microsoft's blog post, the public beta was the largest Office for Mac beta ever, providing more than 100,000 pieces of feedback. In the post, Microsoft VP Kirk Koenigsbauer said that the company is committed to releasing updates and new features for Office for Mac "at least once per quarter." That's good news for Mac users who have gotten accustomed to a long, long time between major releases, with very little in the way of updates in between.
One final note: Since I was using the preview version of Office 2016 for Mac, it didn't automatically update me to the final version. But there was an easy workaround: I logged into office.com/myaccount, de-authorized my iMac as one of my Office installations, and then clicked to re-install. I downloaded a 1.16GB installer package, reinstalled, and was up and running without even needing to re-enter my Office 365 password.
Microsoft has released Cumulative Security Updates for Internet Explorer which addresses various vulnerabilities found in Internet Explorer 8 (IE 8), Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10) and Internet Explorer 11 (IE 11). The security updated is rated Moderate for for Internet Explorer 9 (IE 9) and Internet Explorer 10 (IE 10) and Critical for Internet Explorer 11 (IE 11). The Security Update addresses the vulnerabilities by fixing:1) The update addresses the vulnerability by fixing how Microsoft browser handles redirect requests. (CVE-2017-8592)2) The update addresses the vulnerability by modifying how Internet Explorer handles objects in memory. (CVE-2017-8594)3) The update addresses the vulnerability by fixing how Microsoft browser parse HTTP responses. (CVE-2017-8602)4) The update addresses the vulnerability by modifying how Microsoft browser JavaScript scripting engines objects in memory. (CVE-2017-8606)5) The update addresses the vulnerability by modifying how Microsoft browser JavaScript scripting engines objects in memory. (CVE-2017-8607)6) The update addresses the vulnerability by modifying how Microsoft browser JavaScript scripting engines objects in memory. (CVE-2017-8608)7) The update addresses the vulnerability by modifying how VBScript scripting engine handles objects in memory. (CVE-2017-8618)KB Articles associated with the Update:1)40253412)40252523)40253444)40253365)40253396)40253387)40253428)4025331QID Detection Logic (Authenticated):Operating Systems: Windows XP Embedded, Windows Server 2008, Windows Server 2008 R2, Windows 7, Windows 8.1, Windows RT 8.1, Windows10, Windows Server 2012, Windows Server 2012 R2, Windows Server 2016 This QID checks for the file version of %windir%\System32\mshtml.dllThe following KBs are checked:The patch version of 8.0.6001.23962(KB4025252) The patch version of 9.0.8112.16918 (KB4025252) The patch version of 9.0.8112.21029 (KB4025252) The patch version of 10.0.9200.22207 (KB4025252 or KB4025331) The patch version of 11.0.9600.18739 (KB4025341 or KB4025252 or KB4025336) The patch version of 11.0.10240.17488 (KB4025338) The patch version of 11.0.10586.1007 (KB4025344) The patch version of 11.0.14393.1478 (KB4025339) The patch version of 11.0.15063.483 (KB4025342) ConsequenceSuccessful exploitation of the vulnerability allows:1) Remote Code Execution 2) Spoofing 3) Security Feature BypassSolutionFor more information, Customers are advised to refer the Security Update Guide.Patches:The following are links for downloading patches to fix these vulnerabilities:Microsoft Security Update Guide
- Microsoft Office Remote Code Execution Vulnerability(CVE-2017-0243). - Microsoft Office Memory Corruption Vulnerability(CVE-2017-8501). - Microsoft Office Memory Corruption Vulnerability(CVE-2017-8502). - SharePoint Server XSS Vulnerability(CVE-2017-8569) - Microsoft Office Remote Code Execution Vulnerability(CVE-2017-8570)This security updates contain following KBs:KB2880514KB3191833KB3191894KB3191897KB3191902KB3191907KB3203459KB3203468KB3203469KB3203477KB3212224KB3213537KB3213544KB3213545KB3213555KB3213559KB3213624KB3213640KB3213657New KBs added in detection for CVE-2017-8571, CVE-2017-8572, CVE-2017-8663 (on 07/27/2017):KB4011052KB4011078KB2956078KB3213643ConsequenceAn attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user.SolutionCustomers are advised to refer to Microsoft Security Guidance for more details pertaining to this vulnerability.Patches:The following are links for downloading patches to fix these vulnerabilities:KB2880514(Microsoft Office 2007)KB2956078 32-bit version of Outlook 2010(Microsoft Office 2010)KB2956078 64-bit version of Outlook 2010(Microsoft Office 2010)KB3191833(Microsoft Office 2007)KB3191894(Microsoft Office 2007)KB3191897(Microsoft Office 2007)KB3191902(SharePoint Server 2010)KB3191907 32-bit version of Excel 2010(Microsoft Office 2010)KB3191907 64-bit version of Excel 2010(Microsoft Office 2010)KB3203459 64-bit version of SharePoint Server 2010(Microsoft Office 2010)KB3203468 32-bit version of Office 2010(Microsoft Office 2010)KB3203468 64-bit version of Office 2010(Microsoft Office 2010)KB3203469(Microsoft Office Web Apps 2010)KB3203477 32-bit version of Excel 2016(Microsoft Office 2016)KB3203477 64-bit version of Excel 2016(Microsoft Office 2016)KB3213537 32-bit version of Excel 2013(Microsoft Office 2013)KB3213537 64-bit version of Excel 2013(Microsoft Office 2013)KB3213544(Microsoft SharePoint Server 2016)KB3213545 32-bit version of Office 2016(Microsoft Office 2016)KB3213545 64-bit version of Office 2016(Microsoft Office 2016)KB3213555 32-bit version of Office 2013(Microsoft Office 2013)KB3213555 64-bit version of Office 2013(Microsoft Office 2013)KB3213559(Microsoft SharePoint Server 2013)KB3213624 32-bit version of Office 2010(Microsoft Office 2010)KB3213624 64-bit version of Office 2010(Microsoft Office 2010)KB3213640(Microsoft Office 2010)KB3213643 32-bit version of Outlook 2007(Microsoft Office 2007)KB4011052 32-bit version of Outlook 2016(Microsoft Office 2016)KB4011052 64-bit version of Outlook 2016(Microsoft Office 2016)KB4011078 32-bit version of Outlook 2013(Microsoft Office 2013)KB4011078 32-bit version of Outlook 2013(Microsoft Office 2013)Mac 2011 14.7.6 update(Microsoft Office for Mac 2011)
KB Articles associated with this update are: 4018588QID Detection Logic:This authenticated detection works by checking for the existence of the following registry keys:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Updates\Exchange 2010\SP3\KB4018588HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Updates\Exchange 2013\KB4018588HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Updates\Exchange 2013\SP1\KB4018588HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Updates\Exchange 2016\KB4018588The following files are also checked:Exsetup.exe lesser than 15.1.845.36Exsetup.exe lesser than 15.0.1293.4Exsetup.exe lesser than 15.0.847.55Exsetup.exe lesser than 14.3.361.1ConsequenceSuccessful exploitation allows an attacker to execute arbitrary code and take control of an affected system.SolutionCustomers are advised to refer to Microsoft Security Guidance for more details pertaining to this vulnerability.Patches:The following are links for downloading patches to fix these vulnerabilities:KB4018588 2ff7e9595c
Comments