Return to site

Microsoft Excel Viewer Mac

broken image


  1. Microsoft Excel Viewer Mac Download
  2. Microsoft Excel Viewer Mac Catalina
  3. Microsoft Excel Viewer Mac Os
  4. Microsoft Viewers Download
  5. Microsoft Excel Viewer Mac Catalina

Note: Sheet views are currently limited to Excel 2007 or later files stored in OneDrive, OneDrive for Business, and SharePoint.If you save a local copy of a file that contains sheet views, the sheet views will be unavailable until the file is saved to SharePoint and opened from that environment. Start quickly with the most recent versions of Word, Excel, PowerPoint, Outlook, OneNote and OneDrive —combining the familiarity of Office and the unique Mac features you love. Work online or offline, on your own or with others in real time—whatever works for what you're doing.

-->

Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (3072620)

Published: July 14, 2015

Version: 1.0

Executive Summary

  1. Microsoft Excel Viewer For Mac Software. MOOS Project Viewer is a Microsoft Project viewer that can open any MS Project file type (.mpp,.mpt,.mpx,.xml) for any Microsoft Project version (2000, 2003, 2007 and 2010). Available views: WBS, Gantt chart, task sheet, resource sheet, calendars.
  2. Microsoft Report Viewer Redistributable 2008. Microsoft Office for Mac 2011 Service Pack 1 (14.1.0). Microsoft has released an update for Microsoft Excel 2010.
  3. 2: Enter Mac Safe Mode to isolate the issue caused by the other programs on your Mac. 3: Temporary remove Excel Add-Ins if you use any. Sometimes, Add-ins would slow down Excel performance as well. 4: Create a new user profile to determine whether the issue is caused by profile corruption.

This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

This security update is rated Important for all supported editions of the following software:

  • Microsoft Excel 2007, Microsoft PowerPoint 2007, Microsoft Word 2007
  • Microsoft Office 2010, Microsoft Excel 2010, Microsoft PowerPoint 2010, Microsoft Word 2010
  • Microsoft Excel 2013, Microsoft PowerPoint 2013, Microsoft Word 2013
  • Microsoft Excel 2013 RT, Microsoft PowerPoint 2013 RT, Microsoft Word 2013 RT
  • Microsoft Excel for Mac 2011
  • Microsoft Excel Viewer, Microsoft Office Compatibility Pack, Microsoft Word Viewer
  • Excel Services on Microsoft SharePoint Server 2007
  • Excel Services on Microsoft SharePoint Server 2010
  • Excel Services on Microsoft SharePoint Server 2013

For more information, see the Affected Software section.

The security update addresses the vulnerabilities by correcting how Office handles files in memory, by correcting how Excel handles the loading of certain specially crafted binaries, and by correcting how memory information is disclosed. For more information about the vulnerabilities, see the Vulnerability Information section.

For more information about this update, see Microsoft Knowledge Base Article 3072620.

Affected Software

The following software versions or editions are affected. Versions or editions that are not listed are either past their support life cycle or are not affected. To determine the support life cycle for your software version or edition, see Microsoft Support Lifecycle.

Microsoft Office Software

**Microsoft Office Suites Software****Component****Maximum Security Impact****Aggregate Severity Rating****Updates Replaced**
**Microsoft Office 2007**
Microsoft Office 2007 Service Pack 3[Microsoft Excel 2007 Service Pack 3](https://www.microsoft.com/download/details.aspx?familyid=a4dcc4b2-5482-4aad-8ab9-c264107eb838) (2965281)Remote Code ExecutionImportant2956103 in [MS15-022](http://go.microsoft.com/fwlink/?linkid=526461)
Microsoft PowerPoint 2007 Service Pack 3[Microsoft PowerPoint 2007 Service Pack 3](https://www.microsoft.com/download/details.aspx?familyid=1c1ae052-724c-4462-a4d6-59a885867bd6) (2965283)Remote Code ExecutionImportant2899580 in [MS15-022](http://go.microsoft.com/fwlink/?linkid=526461)
Microsoft Office 2007 Service Pack 3[Microsoft Word 2007 Service Pack 3](https://www.microsoft.com/download/details.aspx?familyid=46307352-a2d0-4431-a22a-b11282f861f8) (3054996)Remote Code ExecutionImportant2965284 in [MS15-033](http://go.microsoft.com/fwlink/?linkid=532628)
**Microsoft Office 2010**
Microsoft Office 2010 Service Pack 2 (32-bit editions)[Microsoft Office 2010 Service Pack 2 (32-bit editions)](https://www.microsoft.com/download/details.aspx?familyid=3d76fd63-1d12-46dc-9245-06639d6c37ac) (3054971)Remote Code ExecutionImportant3054841 in [MS15-046](http://go.microsoft.com/fwlink/?linkid=533724)
Microsoft Office 2010 Service Pack 2 (64-bit editions)[Microsoft Office 2010 Service Pack 2 (64-bit editions)](https://www.microsoft.com/download/details.aspx?familyid=bd9a8b23-f313-44ec-8efa-f9fec1606100) (3054971)Remote Code ExecutionImportant3054841 in [MS15-046](http://go.microsoft.com/fwlink/?linkid=533724)
Microsoft Office 2010 Service Pack 2 (32-bit editions)[Microsoft Excel 2010 Service Pack 2 (32-bit editions)](https://www.microsoft.com/download/details.aspx?familyid=627242e3-f079-4dd6-b019-b387f264de77) (3054981)Remote Code ExecutionImportant3054845 in [MS15-046](http://go.microsoft.com/fwlink/?linkid=533724)
Microsoft Office 2010 Service Pack 2 (64-bit editions)[Microsoft Excel 2010 Service Pack 2 (64-bit editions)](https://www.microsoft.com/download/details.aspx?familyid=610cef0f-fa41-42c1-8ca8-b38fe0086a50) (3054981)Remote Code ExecutionImportant3054845 in [MS15-046](http://go.microsoft.com/fwlink/?linkid=533724)
Microsoft PowerPoint 2010 Service Pack 2 (32-bit editions)[Microsoft PowerPoint 2010 Service Pack 2 (32-bit editions)](https://www.microsoft.com/download/details.aspx?familyid=4253bf84-cadf-47c9-9965-b37d12e10d67) (3054963)Remote Code ExecutionImportant3054835 in [MS15-046](http://go.microsoft.com/fwlink/?linkid=533724)
Microsoft PowerPoint 2010 Service Pack 2 (64-bit editions)[Microsoft PowerPoint 2010 Service Pack 2 (64-bit editions)](https://www.microsoft.com/download/details.aspx?familyid=7867d3ba-784a-4435-8c6f-cb4dc260fddf) (3054963)Remote Code ExecutionImportant3054835 in [MS15-046](http://go.microsoft.com/fwlink/?linkid=533724)
Microsoft Office 2010 Service Pack 2 (32-bit editions)[Microsoft Word 2010 Service Pack 2 (32-bit editions)](https://www.microsoft.com/download/details.aspx?familyid=ae88c2b6-730f-4e72-8dd8-d640799d9d62) (3054973)Remote Code ExecutionImportant3054842 in [MS15-046](http://go.microsoft.com/fwlink/?linkid=533724)
Microsoft Office 2010 Service Pack 2 (64-bit editions)[Microsoft Word 2010 Service Pack 2 (64-bit editions)](https://www.microsoft.com/download/details.aspx?familyid=78d6f668-f355-4298-981e-521edad3a493) (3054973)Remote Code ExecutionImportant3054842 in [MS15-046](http://go.microsoft.com/fwlink/?linkid=533724)
**Microsoft Office 2013**
Microsoft Office 2013 Service Pack 1 (32-bit editions)[Microsoft Excel 2013 Service Pack 1 (32-bit editions)](https://www.microsoft.com/download/details.aspx?familyid=197abd8f-78bf-4da7-bfe4-cb7772ff92d1) (3054949)Remote Code ExecutionImportant2986216 in [MS15-046](http://go.microsoft.com/fwlink/?linkid=533724)
Microsoft Office 2013 Service Pack 1 (64-bit editions)[Microsoft Excel 2013 Service Pack 1 (64-bit editions)](https://www.microsoft.com/download/details.aspx?familyid=a293c5b3-5a93-4233-8ea6-9194da4ff933) (3054949)Remote Code ExecutionImportant2986216 in [MS15-046](http://go.microsoft.com/fwlink/?linkid=533724)
Microsoft PowerPoint 2013 Service Pack 1 (32-bit editions)[Microsoft PowerPoint 2013 Service Pack 1 (32-bit editions)](https://www.microsoft.com/download/details.aspx?familyid=1832521b-c1d8-49c3-ad2b-14893f088eb0) (3054999)Remote Code ExecutionImportant2975816 in [MS15-046](http://go.microsoft.com/fwlink/?linkid=533724)
Microsoft PowerPoint 2013 Service Pack 1 (64-bit editions)[Microsoft PowerPoint 2013 Service Pack 1 (64-bit editions)](https://www.microsoft.com/download/details.aspx?familyid=51769525-e674-499a-8e3d-ed52764702ed) (3054999)Remote Code ExecutionImportant2975816 in [MS15-046](http://go.microsoft.com/fwlink/?linkid=533724)
Microsoft Office 2013 Service Pack 1 (32-bit editions)[Microsoft Word 2013 Service Pack 1 (32-bit editions)](https://www.microsoft.com/download/details.aspx?familyid=074c110f-2858-4948-b135-70a70af8f07b) (3054990)Remote Code ExecutionImportant2965307 in [MS15-046](http://go.microsoft.com/fwlink/?linkid=533724)
Microsoft Office 2013 Service Pack 1 (64-bit editions)[Microsoft Word 2013 Service Pack 1 (64-bit editions)](https://www.microsoft.com/download/details.aspx?familyid=e07208aa-7b66-4011-9e69-785d6e56048b) (3054990)Remote Code ExecutionImportant2965307 in [MS15-046](http://go.microsoft.com/fwlink/?linkid=533724)
**Microsoft Office 2013 RT**
Microsoft Office 2013 RT Service Pack 1Microsoft Excel 2013 RT Service Pack 1 (3054949) [1]Remote Code ExecutionImportant2986216 in [MS15-046](http://go.microsoft.com/fwlink/?linkid=533724)
Microsoft Office 2013 RT Service Pack 1Microsoft PowerPoint 2013 RT Service Pack 1 (3054999) [1]Remote Code ExecutionImportant2975816 in [MS15-046](http://go.microsoft.com/fwlink/?linkid=533724)
Microsoft Office 2013 RT Service Pack 1Microsoft Word 2013 RT Service Pack 1 (3054990) [1]Remote Code ExecutionImportant2965307 in [MS15-046](http://go.microsoft.com/fwlink/?linkid=533724)
**Microsoft Office for Mac**
Microsoft Office for Mac 2011[Microsoft Excel for Mac 2011](https://www.microsoft.com/download/details.aspx?familyid=f6d52c5e-2225-42d3-bbf9-37fbdbfbb419) (3073865)Remote Code ExecutionImportant3048688 in [MS15-046](http://go.microsoft.com/fwlink/?linkid=533724)
**Other Office Software**
Microsoft Excel Viewer 2007 Service Pack 3[Microsoft Excel Viewer 2007 Service Pack 3](https://www.microsoft.com/download/details.aspx?familyid=4f0eabb4-e28b-4767-9dfc-3620c534e8c3) (2965209)Remote Code ExecutionImportant2956189 in [MS15-022](http://go.microsoft.com/fwlink/?linkid=526461)
Microsoft Office Compatibility Pack Service Pack 3[Microsoft Office Compatibility Pack Service Pack 3](https://www.microsoft.com/download/details.aspx?familyid=05994e2c-51ef-4fdc-aab3-85b313154c51) (2965208)Remote Code ExecutionImportant2956106 in [MS15-022](http://go.microsoft.com/fwlink/?linkid=526461)
Microsoft Word Viewer[Microsoft Word Viewer](https://www.microsoft.com/download/details.aspx?familyid=3ec20892-a288-426a-a624-3ecd100cecf5) (3054958)Remote Code ExecutionImportant2965289 in [MS15-033](http://go.microsoft.com/fwlink/?linkid=532628)
[1]This update is available via [Windows Update](http://go.microsoft.com/fwlink/?linkid=21130).

Microsoft Office Services and Web Apps

**Microsoft Office Services and Web Apps****Component****Maximum Security Impact****Aggregate Severity Rating****Updates Replaced**
**Microsoft SharePoint Server 2007**
Microsoft SharePoint Server 2007 Service Pack 3 (32-bit editions)[Excel Services](https://www.microsoft.com/download/details.aspx?familyid=82504d36-6b1c-4683-a9ff-6ea69b8452ed) (2837612)Remote Code ExecutionImportant2827327 in [MS13-084](http://go.microsoft.com/fwlink/?linkid=324028)
Microsoft SharePoint Server 2007 Service Pack 3 (64-bit editions)[Excel Services](https://www.microsoft.com/download/details.aspx?familyid=bd4769dc-646d-4899-a1c2-0c18dee426e3) (2837612)Remote Code ExecutionImportant2827327 in [MS13-084](http://go.microsoft.com/fwlink/?linkid=324028)
**Microsoft SharePoint Server 2010**
Microsoft SharePoint Server 2010 Service Pack 2[Excel Services](https://www.microsoft.com/download/details.aspx?familyid=e4740c9c-7bc4-4acd-93ec-b796f953e1e1) (3054968)Remote Code ExecutionImportant3054839 in [MS15-046](http://go.microsoft.com/fwlink/?linkid=533724)
**Microsoft SharePoint Server 2013**
Microsoft SharePoint Server 2013 Service Pack 1[Excel Services](https://www.microsoft.com/download/details.aspx?familyid=9a27ae56-9e63-4ae9-b2fb-2bc5e9bf0c00) (3054861)Remote Code ExecutionImportant3039725 in [MS15-046](http://go.microsoft.com/fwlink/?linkid=533724)
Viewer

Update FAQ

I have Microsoft Word 2010 installed. Why am I not being offered the 3054971 update?
The 3054971 update only applies to systems running specific configurations of Microsoft Office 2010. Some configurations will not be offered the update.

I am being offered this update for software that is not specifically listed in the Affected Software table. Why am I being offered this update?
When updates address vulnerable code that exists in a component that is shared between multiple Microsoft Office products or shared between multiple versions of the same Microsoft Office product, the update is considered to be applicable to all supported products and versions that contain the vulnerable component.

For example, when an update applies to Microsoft Office 2007 products, only Microsoft Office 2007 may be specifically listed in the Affected Software table. However, the update could apply to Microsoft Word 2007, Microsoft Excel 2007, Microsoft Visio 2007, Microsoft Compatibility Pack, Microsoft Excel Viewer, or any other Microsoft Office 2007 product that is not specifically listed in the Affected Software table.

For example, when an update applies to Microsoft Office 2010 products, only Microsoft Office 2010 may be specifically listed in the Affected Software table. However, the update could apply to Microsoft Word 2010, Microsoft Excel 2010, Microsoft Visio 2010, Microsoft Visio Viewer, or any other Microsoft Office 2010 product that is not specifically listed in the Affected Software table.

For example, when an update applies to Microsoft Office 2013 products, only Microsoft Office 2013 may be specifically listed in the Affected Software table. However, the update could apply to Microsoft Word 2013, Microsoft Excel 2013, Microsoft Visio 2013, or any other Microsoft Office 2013 product that is not specifically listed in the Affected Software table.

Severity Ratings and Vulnerability Identifiers

The following severity ratings assume the potential maximum impact of the vulnerability. For information regarding the likelihood, within 30 days of this security bulletin's release, of the exploitability of the vulnerability in relation to its severity rating and security impact, please see the Exploitability Index in the July bulletin summary.

Microsoft Office Software

**Vulnerability Severity Rating and Maximum Security Impact by Affected Software**
**Affected Software**[**Microsoft Office Memory Corruption Vulnerability – CVE-2015-2376**](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2376)[**Microsoft Office Memory Corruption Vulnerability – CVE-2015-2377**](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2377)[**Microsoft Office Memory Corruption Vulnerability – CVE-2015-2379**](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2379)[**Microsoft Office Memory Corruption Vulnerability – CVE-2015-2380**](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2380)[**Microsoft Office Memory Corruption Vulnerability – CVE-2015-2415**](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2415)[**Microsoft Office Memory Corruption Vulnerability – CVE-2015-2424**](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2424)[**Microsoft Excel ASLR Bypass Vulnerability – CVE-2015-2375**](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2375)[**Microsoft Excel DLL Remote Code Execution Vulnerability – CVE-2015-2378**](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2378)**Aggregate Severity Rating**
**Microsoft Office 2007**
Microsoft Excel 2007 Service Pack 3**Important**Remote Code Execution (2965281)**Important**Remote Code Execution (2965281)Not applicableNot applicable**Important**Remote Code Execution (2965281)Not applicableNot applicable**Important**Remote Code Execution (2965281)**Important**
Microsoft PowerPoint 2007 Service Pack 3Not applicableNot applicableNot applicableNot applicableNot applicable**Important**Remote Code Execution (2965283)Not applicableNot applicable**Important**
Microsoft Word 2007 Service Pack 3Not applicableNot applicable**Important**Remote Code Execution (3054996)**Important**Remote Code Execution (3054996)Not applicable**Important**Remote Code Execution (3054996)Not applicableNot applicable**Important**
**Microsoft Office 2010**
Microsoft Office 2010 Service Pack 2 (32-bit editions)Not applicableNot applicable**Important**Remote Code Execution (3054971)**Important**Remote Code Execution (3054971)Not applicableNot applicableNot applicableNot applicable**Important**
Microsoft Office 2010 Service Pack 2 (64-bit editions)Not applicableNot applicable**Important**Remote Code Execution (3054971)**Important**Remote Code Execution (3054971)Not applicableNot applicableNot applicableNot applicable**Important**
Microsoft Excel 2010 Service Pack 2 (32-bit editions)**Important**Remote Code Execution (3054981)**Important**Remote Code Execution (3054981)Not applicableNot applicable**Important**Remote Code Execution (3054981)Not applicable**Important**Information Disclosure (3054981)**Important**Remote Code Execution (3054981)**Important**
Microsoft Excel 2010 Service Pack 2 (64-bit editions)**Important**Remote Code Execution (3054981)**Important**Remote Code Execution (3054981)Not applicableNot applicable**Important**Remote Code Execution (3054981)Not applicable**Important**Information Disclosure (3054981)**Important**Remote Code Execution (3054981)**Important**
Microsoft PowerPoint 2010 Service Pack 2 (32-bit editions)Not applicableNot applicableNot applicableNot applicableNot applicable**Important**Remote Code Execution (3054963)Not applicableNot applicable**Important**
Microsoft PowerPoint 2010 Service Pack 2 (64-bit editions)Not applicableNot applicableNot applicableNot applicableNot applicable**Important**Remote Code Execution (3054963)Not applicableNot applicable**Important**
Microsoft Word 2010 Service Pack 2 (32-bit editions)Not applicableNot applicable**Important**Remote Code Execution (3054973)**Important**Remote Code Execution (3054973)Not applicable**Important**Remote Code Execution (3054973)Not applicableNot applicable**Important**
Microsoft Word 2010 Service Pack 2 (64-bit editions)Not applicableNot applicable**Important**Remote Code Execution (3054973)**Important**Remote Code Execution (3054973)Not applicable**Important**Remote Code Execution (3054973)Not applicableNot applicable**Important**
**Microsoft Office 2013**
Microsoft Excel 2013 Service Pack 1 (32-bit editions)**Important**Remote Code Execution (3054949)**Important**Remote Code Execution (3054949)Not applicableNot applicable**Important**Remote Code Execution (3054949)Not applicable**Important**Information Disclosure (3054949)Not applicable**Important**
Microsoft Excel 2013 Service Pack 1 (64-bit editions)**Important**Remote Code Execution (3054949)**Important**Remote Code Execution (3054949)Not applicableNot applicable**Important**Remote Code Execution (3054949)Not applicable**Important**Information Disclosure (3054949)Not applicable**Important**
Microsoft PowerPoint 2013 Service Pack 1 (32-bit editions)Not applicableNot applicableNot applicableNot applicableNot applicable**Important**Remote Code Execution (3054999)Not applicableNot applicable**Important**
Microsoft PowerPoint 2013 Service Pack 1 (64-bit editions)Not applicableNot applicableNot applicableNot applicableNot applicable**Important**Remote Code Execution (3054999)Not applicableNot applicable**Important**
Microsoft Word 2013 Service Pack 1 (32-bit editions)Not applicableNot applicable**Important**Remote Code Execution (3054990)**Important**Remote Code Execution (3054990)Not applicable**Important**Remote Code Execution (3054990)Not applicableNot applicable**Important**
Microsoft Word 2013 Service Pack 1 (64-bit editions)Not applicableNot applicable**Important**Remote Code Execution (3054990)**Important**Remote Code Execution (3054990)Not applicable**Important**Remote Code Execution (3054990)Not applicableNot applicable**Important**
**Microsoft Office 2013 RT**
Microsoft Excel 2013 RT Service Pack 1**Important**Remote Code Execution (3054949)**Important**Remote Code Execution (3054949)Not applicableNot applicable**Important**Remote Code Execution (3054949)Not applicable**Important**Information Disclosure (3054949)Not applicable**Important**
Microsoft PowerPoint 2013 RT Service Pack 1Not applicableNot applicableNot applicableNot applicableNot applicable**Important**Remote Code Execution (3054999)Not applicableNot applicable**Important**
Microsoft Word 2013 RT Service Pack 1Not applicableNot applicable**Important**Remote Code Execution (3054990)**Important**Remote Code Execution (3054990)Not applicableNot applicableNot applicableNot applicable**Important**
**Microsoft Office for Mac**
Microsoft Office for Mac 2011**Important**Remote Code Execution (3073865)Not applicable**Important**Remote Code Execution (3073865)Not applicableNot applicableNot applicableNot applicableNot applicable**Important**
**Other Office Software**
Microsoft Excel Viewer 2007 Service Pack 3**Important**Remote Code Execution (2965209)Not applicableNot applicableNot applicableNot applicableNot applicableNot applicable**Important**Remote Code Execution (2965209)**Important**
Microsoft Office Compatibility Pack Service Pack 3**Important**Remote Code Execution (2965208)**Important**Remote Code Execution (2965208)Not applicableNot applicable**Important**Remote Code Execution (2965208)Not applicableNot applicable**Important**Remote Code Execution (2965208)**Important**
Microsoft Word ViewerNot applicableNot applicable**Important**Remote Code Execution (3054958)Not applicableNot applicableNot applicableNot applicableNot applicable**Important**

Microsoft Office Services and Web Apps

**Vulnerability Severity Rating and Maximum Security Impact by Affected Software**
**Affected Software**[**Microsoft Office Memory Corruption Vulnerability – CVE-2015-2376**](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2376)[**Microsoft Office Memory Corruption Vulnerability – CVE-2015-2377**](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2377)[**Microsoft Office Memory Corruption Vulnerability – CVE-2015-2379**](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2379)[**Microsoft Office Memory Corruption Vulnerability – CVE-2015-2380**](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2380)[**Microsoft Office Memory Corruption Vulnerability – CVE-2015-2415**](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2415)[**Microsoft Office Memory Corruption Vulnerability – CVE-2015-2424**](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2424)[**Microsoft Excel ASLR Bypass Vulnerability – CVE-2015-2375**](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2375)[**Microsoft Excel DLL Remote Code Execution Vulnerability – CVE-2015-2378**](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2378)**Aggregate Severity Rating**
**Microsoft SharePoint Server 2007**
Excel Services on Microsoft SharePoint Server 2007 Service Pack 3 (32-bit editions)**Important**Remote Code Execution (2837612)Not applicableNot applicableNot applicableNot applicableNot applicableNot applicableNot applicable**Important**
Excel Services on Microsoft SharePoint Server 2007 Service Pack 3 (64-bit editions)**Important**Remote Code Execution (2837612)Not applicableNot applicableNot applicableNot applicableNot applicableNot applicableNot applicable**Important**
**Microsoft SharePoint Server 2010**
Excel Services on Microsoft SharePoint Server 2010 Service Pack 2**Important**Remote Code Execution (3054968)Not applicableNot applicableNot applicableNot applicableNot applicable**Important**Information Disclosure (3054968)Not applicable**Important**
**Microsoft SharePoint Server 2013**
Excel Services on Microsoft SharePoint Server 2013 Service Pack 1**Important**Remote Code Execution (3054861)Not applicableNot applicableNot applicableNot applicableNot applicable**Important**Information Disclosure (3054861)Not applicable**Important**

Vulnerability Information

Multiple Microsoft Office Memory Corruption Vulnerabilities

Remote code execution vulnerabilities exist in Microsoft Office software when the Office software fails to properly handle objects in memory.

Exploitation of these vulnerabilities requires that a user open a specially crafted file with an affected version of Microsoft Office software. In an email attack scenario an attacker could exploit the vulnerabilities by sending the specially crafted file to the user and convincing the user to open the file. In a web-based attack scenario an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file that is designed to exploit the vulnerabilities. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or Instant Messenger message.

Microsoft Excel Viewer Mac Download

An attacker who successfully exploited these vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

The security update addresses the vulnerabilities by correcting how Microsoft Office handles files in memory.

The following tables contain links to the standard entry for each vulnerability in the Common Vulnerabilities and Exposures list:

Vulnerability titleCVE numberPublicly DisclosedExploited
Microsoft Office Memory Corruption VulnerabilityCVE-2015-2376NoNo
Microsoft Office Memory Corruption VulnerabilityCVE-2015-2377NoNo
Microsoft Office Memory Corruption VulnerabilityCVE-2015-2379NoNo
Microsoft Office Memory Corruption VulnerabilityCVE-2015-2380NoNo
Microsoft Office Memory Corruption VulnerabilityCVE-2015-2415NoNo
Microsoft Office Memory Corruption VulnerabilityCVE-2015-2424NoYes
Microsoft

Update FAQ

I have Microsoft Word 2010 installed. Why am I not being offered the 3054971 update?
The 3054971 update only applies to systems running specific configurations of Microsoft Office 2010. Some configurations will not be offered the update.

I am being offered this update for software that is not specifically listed in the Affected Software table. Why am I being offered this update?
When updates address vulnerable code that exists in a component that is shared between multiple Microsoft Office products or shared between multiple versions of the same Microsoft Office product, the update is considered to be applicable to all supported products and versions that contain the vulnerable component.

For example, when an update applies to Microsoft Office 2007 products, only Microsoft Office 2007 may be specifically listed in the Affected Software table. However, the update could apply to Microsoft Word 2007, Microsoft Excel 2007, Microsoft Visio 2007, Microsoft Compatibility Pack, Microsoft Excel Viewer, or any other Microsoft Office 2007 product that is not specifically listed in the Affected Software table.

For example, when an update applies to Microsoft Office 2010 products, only Microsoft Office 2010 may be specifically listed in the Affected Software table. However, the update could apply to Microsoft Word 2010, Microsoft Excel 2010, Microsoft Visio 2010, Microsoft Visio Viewer, or any other Microsoft Office 2010 product that is not specifically listed in the Affected Software table.

For example, when an update applies to Microsoft Office 2013 products, only Microsoft Office 2013 may be specifically listed in the Affected Software table. However, the update could apply to Microsoft Word 2013, Microsoft Excel 2013, Microsoft Visio 2013, or any other Microsoft Office 2013 product that is not specifically listed in the Affected Software table.

Severity Ratings and Vulnerability Identifiers

The following severity ratings assume the potential maximum impact of the vulnerability. For information regarding the likelihood, within 30 days of this security bulletin's release, of the exploitability of the vulnerability in relation to its severity rating and security impact, please see the Exploitability Index in the July bulletin summary.

Microsoft Office Software

**Vulnerability Severity Rating and Maximum Security Impact by Affected Software**
**Affected Software**[**Microsoft Office Memory Corruption Vulnerability – CVE-2015-2376**](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2376)[**Microsoft Office Memory Corruption Vulnerability – CVE-2015-2377**](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2377)[**Microsoft Office Memory Corruption Vulnerability – CVE-2015-2379**](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2379)[**Microsoft Office Memory Corruption Vulnerability – CVE-2015-2380**](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2380)[**Microsoft Office Memory Corruption Vulnerability – CVE-2015-2415**](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2415)[**Microsoft Office Memory Corruption Vulnerability – CVE-2015-2424**](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2424)[**Microsoft Excel ASLR Bypass Vulnerability – CVE-2015-2375**](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2375)[**Microsoft Excel DLL Remote Code Execution Vulnerability – CVE-2015-2378**](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2378)**Aggregate Severity Rating**
**Microsoft Office 2007**
Microsoft Excel 2007 Service Pack 3**Important**Remote Code Execution (2965281)**Important**Remote Code Execution (2965281)Not applicableNot applicable**Important**Remote Code Execution (2965281)Not applicableNot applicable**Important**Remote Code Execution (2965281)**Important**
Microsoft PowerPoint 2007 Service Pack 3Not applicableNot applicableNot applicableNot applicableNot applicable**Important**Remote Code Execution (2965283)Not applicableNot applicable**Important**
Microsoft Word 2007 Service Pack 3Not applicableNot applicable**Important**Remote Code Execution (3054996)**Important**Remote Code Execution (3054996)Not applicable**Important**Remote Code Execution (3054996)Not applicableNot applicable**Important**
**Microsoft Office 2010**
Microsoft Office 2010 Service Pack 2 (32-bit editions)Not applicableNot applicable**Important**Remote Code Execution (3054971)**Important**Remote Code Execution (3054971)Not applicableNot applicableNot applicableNot applicable**Important**
Microsoft Office 2010 Service Pack 2 (64-bit editions)Not applicableNot applicable**Important**Remote Code Execution (3054971)**Important**Remote Code Execution (3054971)Not applicableNot applicableNot applicableNot applicable**Important**
Microsoft Excel 2010 Service Pack 2 (32-bit editions)**Important**Remote Code Execution (3054981)**Important**Remote Code Execution (3054981)Not applicableNot applicable**Important**Remote Code Execution (3054981)Not applicable**Important**Information Disclosure (3054981)**Important**Remote Code Execution (3054981)**Important**
Microsoft Excel 2010 Service Pack 2 (64-bit editions)**Important**Remote Code Execution (3054981)**Important**Remote Code Execution (3054981)Not applicableNot applicable**Important**Remote Code Execution (3054981)Not applicable**Important**Information Disclosure (3054981)**Important**Remote Code Execution (3054981)**Important**
Microsoft PowerPoint 2010 Service Pack 2 (32-bit editions)Not applicableNot applicableNot applicableNot applicableNot applicable**Important**Remote Code Execution (3054963)Not applicableNot applicable**Important**
Microsoft PowerPoint 2010 Service Pack 2 (64-bit editions)Not applicableNot applicableNot applicableNot applicableNot applicable**Important**Remote Code Execution (3054963)Not applicableNot applicable**Important**
Microsoft Word 2010 Service Pack 2 (32-bit editions)Not applicableNot applicable**Important**Remote Code Execution (3054973)**Important**Remote Code Execution (3054973)Not applicable**Important**Remote Code Execution (3054973)Not applicableNot applicable**Important**
Microsoft Word 2010 Service Pack 2 (64-bit editions)Not applicableNot applicable**Important**Remote Code Execution (3054973)**Important**Remote Code Execution (3054973)Not applicable**Important**Remote Code Execution (3054973)Not applicableNot applicable**Important**
**Microsoft Office 2013**
Microsoft Excel 2013 Service Pack 1 (32-bit editions)**Important**Remote Code Execution (3054949)**Important**Remote Code Execution (3054949)Not applicableNot applicable**Important**Remote Code Execution (3054949)Not applicable**Important**Information Disclosure (3054949)Not applicable**Important**
Microsoft Excel 2013 Service Pack 1 (64-bit editions)**Important**Remote Code Execution (3054949)**Important**Remote Code Execution (3054949)Not applicableNot applicable**Important**Remote Code Execution (3054949)Not applicable**Important**Information Disclosure (3054949)Not applicable**Important**
Microsoft PowerPoint 2013 Service Pack 1 (32-bit editions)Not applicableNot applicableNot applicableNot applicableNot applicable**Important**Remote Code Execution (3054999)Not applicableNot applicable**Important**
Microsoft PowerPoint 2013 Service Pack 1 (64-bit editions)Not applicableNot applicableNot applicableNot applicableNot applicable**Important**Remote Code Execution (3054999)Not applicableNot applicable**Important**
Microsoft Word 2013 Service Pack 1 (32-bit editions)Not applicableNot applicable**Important**Remote Code Execution (3054990)**Important**Remote Code Execution (3054990)Not applicable**Important**Remote Code Execution (3054990)Not applicableNot applicable**Important**
Microsoft Word 2013 Service Pack 1 (64-bit editions)Not applicableNot applicable**Important**Remote Code Execution (3054990)**Important**Remote Code Execution (3054990)Not applicable**Important**Remote Code Execution (3054990)Not applicableNot applicable**Important**
**Microsoft Office 2013 RT**
Microsoft Excel 2013 RT Service Pack 1**Important**Remote Code Execution (3054949)**Important**Remote Code Execution (3054949)Not applicableNot applicable**Important**Remote Code Execution (3054949)Not applicable**Important**Information Disclosure (3054949)Not applicable**Important**
Microsoft PowerPoint 2013 RT Service Pack 1Not applicableNot applicableNot applicableNot applicableNot applicable**Important**Remote Code Execution (3054999)Not applicableNot applicable**Important**
Microsoft Word 2013 RT Service Pack 1Not applicableNot applicable**Important**Remote Code Execution (3054990)**Important**Remote Code Execution (3054990)Not applicableNot applicableNot applicableNot applicable**Important**
**Microsoft Office for Mac**
Microsoft Office for Mac 2011**Important**Remote Code Execution (3073865)Not applicable**Important**Remote Code Execution (3073865)Not applicableNot applicableNot applicableNot applicableNot applicable**Important**
**Other Office Software**
Microsoft Excel Viewer 2007 Service Pack 3**Important**Remote Code Execution (2965209)Not applicableNot applicableNot applicableNot applicableNot applicableNot applicable**Important**Remote Code Execution (2965209)**Important**
Microsoft Office Compatibility Pack Service Pack 3**Important**Remote Code Execution (2965208)**Important**Remote Code Execution (2965208)Not applicableNot applicable**Important**Remote Code Execution (2965208)Not applicableNot applicable**Important**Remote Code Execution (2965208)**Important**
Microsoft Word ViewerNot applicableNot applicable**Important**Remote Code Execution (3054958)Not applicableNot applicableNot applicableNot applicableNot applicable**Important**

Microsoft Office Services and Web Apps

**Vulnerability Severity Rating and Maximum Security Impact by Affected Software**
**Affected Software**[**Microsoft Office Memory Corruption Vulnerability – CVE-2015-2376**](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2376)[**Microsoft Office Memory Corruption Vulnerability – CVE-2015-2377**](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2377)[**Microsoft Office Memory Corruption Vulnerability – CVE-2015-2379**](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2379)[**Microsoft Office Memory Corruption Vulnerability – CVE-2015-2380**](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2380)[**Microsoft Office Memory Corruption Vulnerability – CVE-2015-2415**](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2415)[**Microsoft Office Memory Corruption Vulnerability – CVE-2015-2424**](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2424)[**Microsoft Excel ASLR Bypass Vulnerability – CVE-2015-2375**](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2375)[**Microsoft Excel DLL Remote Code Execution Vulnerability – CVE-2015-2378**](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2378)**Aggregate Severity Rating**
**Microsoft SharePoint Server 2007**
Excel Services on Microsoft SharePoint Server 2007 Service Pack 3 (32-bit editions)**Important**Remote Code Execution (2837612)Not applicableNot applicableNot applicableNot applicableNot applicableNot applicableNot applicable**Important**
Excel Services on Microsoft SharePoint Server 2007 Service Pack 3 (64-bit editions)**Important**Remote Code Execution (2837612)Not applicableNot applicableNot applicableNot applicableNot applicableNot applicableNot applicable**Important**
**Microsoft SharePoint Server 2010**
Excel Services on Microsoft SharePoint Server 2010 Service Pack 2**Important**Remote Code Execution (3054968)Not applicableNot applicableNot applicableNot applicableNot applicable**Important**Information Disclosure (3054968)Not applicable**Important**
**Microsoft SharePoint Server 2013**
Excel Services on Microsoft SharePoint Server 2013 Service Pack 1**Important**Remote Code Execution (3054861)Not applicableNot applicableNot applicableNot applicableNot applicable**Important**Information Disclosure (3054861)Not applicable**Important**

Vulnerability Information

Multiple Microsoft Office Memory Corruption Vulnerabilities

Remote code execution vulnerabilities exist in Microsoft Office software when the Office software fails to properly handle objects in memory.

Exploitation of these vulnerabilities requires that a user open a specially crafted file with an affected version of Microsoft Office software. In an email attack scenario an attacker could exploit the vulnerabilities by sending the specially crafted file to the user and convincing the user to open the file. In a web-based attack scenario an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file that is designed to exploit the vulnerabilities. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or Instant Messenger message.

Microsoft Excel Viewer Mac Download

An attacker who successfully exploited these vulnerabilities could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

The security update addresses the vulnerabilities by correcting how Microsoft Office handles files in memory.

The following tables contain links to the standard entry for each vulnerability in the Common Vulnerabilities and Exposures list:

Vulnerability titleCVE numberPublicly DisclosedExploited
Microsoft Office Memory Corruption VulnerabilityCVE-2015-2376NoNo
Microsoft Office Memory Corruption VulnerabilityCVE-2015-2377NoNo
Microsoft Office Memory Corruption VulnerabilityCVE-2015-2379NoNo
Microsoft Office Memory Corruption VulnerabilityCVE-2015-2380NoNo
Microsoft Office Memory Corruption VulnerabilityCVE-2015-2415NoNo
Microsoft Office Memory Corruption VulnerabilityCVE-2015-2424NoYes
### Mitigating Factors Microsoft has not identified any [mitigating factors](https://technet.microsoft.com/library/security/dn848375.aspx) for these vulnerabilities. ### Workarounds Microsoft has not identified any [workarounds](https://technet.microsoft.com/library/security/dn848375.aspx) for these vulnerabilities. Microsoft Excel ASLR Bypass Vulnerability - CVE-2015-2375 --------------------------------------------------------- A security feature bypass vulnerability exists in Microsoft Excel when memory is released in an unintended manner. The vulnerability could allow an attacker to bypass the [Address Space Layout Randomization (ASLR)](https://technet.microsoft.com/en-us/library/security/dn848375.aspx) security feature, and potentially allow remote code execution. The security feature bypass by itself does not allow arbitrary code execution. However, an attacker could use this security feature bypass vulnerability in conjunction with another vulnerability, such as a remote code execution vulnerability, to run arbitrary code. An attacker who successfully exploited this vulnerability could bypass the ASLR security feature. Exploitation of this vulnerability requires that a user open a specially crafted Excel (.xls) file with an affected version of Microsoft Office software. In an email attack scenario, an attacker could exploit the vulnerability by sending a specially crafted Excel (.xls) file to the user and then convincing the user to open the file in an affected version of Microsoft Office software. In a web-based attack scenario, an attacker could host a website that contains a file that is used to attempt to exploit the vulnerability. In addition, compromised websites and websites that accept or host user-provided content could contain specially crafted content that could exploit this vulnerability. An attacker would have no way to force users to visit a specially crafted website. Instead, an attacker would have to convince them to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's site, and then convince them to open the specially crafted Excel (.xls) file in an affected version of Microsoft Office software. The update addresses the vulnerability by correcting how memory information is disclosed. Microsoft received information about the vulnerability through coordinated vulnerability disclosure. When this security bulletin was issued, Microsoft had not received any information to indicate that this vulnerability had been publicly used to attack customers. ### Mitigating Factors Microsoft has not identified any [mitigating factors](https://technet.microsoft.com/library/security/dn848375.aspx) for this vulnerability. ### Workarounds Microsoft has not identified any [workarounds](https://technet.microsoft.com/library/security/dn848375.aspx) for this vulnerability. Microsoft Excel DLL Remote Code Execution Vulnerability - CVE-2015-2378 ----------------------------------------------------------------------- A remote code execution vulnerability exists when Microsoft Excel improperly handles the loading of dynamic link library (DLL) files. An attacker who successfully exploited the vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit the vulnerability, an attacker would first have to place a specially crafted DLL file in the target user's current working directory. The attacker would then have to convince the user to launch a program designed to load a trusted DLL, but which mistakenly loads the malicious specially crafted DLL file. The update addresses the vulnerability by correcting how Excel handles the loading of certain specially crafted binaries. Microsoft received information about the vulnerability through coordinated vulnerability disclosure. When this security bulletin was issued, Microsoft had not received any information to indicate that this vulnerability had been publicly used to attack customers. ### Mitigating Factors Microsoft has not identified any [mitigating factors](https://technet.microsoft.com/library/security/dn848375.aspx) for this vulnerability. ### Workarounds Microsoft has not identified any [workarounds](https://technet.microsoft.com/library/security/dn848375.aspx) for this vulnerability. Security Update Deployment -------------------------- For Security Update Deployment information, see the Microsoft Knowledge Base article referenced in the Executive Summary. Acknowledgments --------------- Microsoft recognizes the efforts of those in the security community who help us protect customers through coordinated vulnerability disclosure. See [Acknowledgments](https://technet.microsoft.com/library/security/dn903755.aspx) for more information. Disclaimer ---------- The information provided in the Microsoft Knowledge Base is provided 'as is' without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. Revisions --------- - V1.0 (July 14, 2015): Bulletin published. *Page generated 2015-07-14 13:22Z-07:00.* -->

Originally published: October 29, 2018
Updated: July 17, 2020

Please go here to search for your product's lifecycle.

The following list represents products retiring or reaching the end of support in 2020. Upon retirement or end of support, there will be no new security updates, non-security updates, free or paid assisted support options or online technical content updates. Go here to learn about Fixed and Modern Lifecycle policies and service packs.

For a comprehensive list of Microsoft products and their lifecycle policy timelines, including migration options, please search the Microsoft Lifecycle Product Database.

If you have any questions regarding support for a product, please contact your Microsoft Account Representative. If you need technical support, visit the Microsoft Support website.

Products governed by the Modern Policy

The following products, governed by the Modern Policy, will retire in 2020.

Products (Modern Policy)Retirement
System Center, version 1807 (all editions)January 24, 2020
Azure Container Service
Windows Analytics
January 31, 2020
Visio Services in SharePoint OnlineSeptember 30, 2020
Windows 10, version 1709 (Enterprise, Education, IoT Enterprise)October 13, 2020
Windows 10, version 1803 (Enterprise, Education, IoT Enterprise)
Windows 10, version 1809 (Home, Pro, Pro Education, Pro for Workstation, IoT Core)
Windows Server version 1809 (Datacenter Core, Standard Core)
November 10, 2020
Configuration Manager (current branch), version 1810December 1, 2020
Windows 10, version 1903 (Enterprise, Home, Pro, Pro Education, Pro for Workstations, IoT Enterprise)
Windows Server, version 1903 (Datacenter, Standard)
December 8, 2020
InMage/ASR ScoutDecember 31, 2020

Microsoft Excel Viewer Mac Catalina

Products governed by the Fixed Policy

The following products, governed by the Fixed Policy, will end support in 2020.

Microsoft Excel Viewer Mac Os

Product (Fixed Policy)End of Support
Dynamics NAV 2009 R2
Expression Blend 3
Expression Design 3
Expression Encoder 3
Expression Studio 3
Expression Web 3
Hyper-V Server 2008
Hyper-V Server 2008 R2
Windows 7
Windows Embedded Handheld 6.5
Windows Server 2008 R2
Windows Server 2008
Windows Server Update Services 3.0
Windows Storage Server 2008 (all editions)
January 14, 2020
Internet Explorer 10January 31, 2020
Forefront Unified Access Gateway 2010
Forefront Threat Management Gateway 2010 (all editions)
Microsoft HPC Pack 2008 (all editions)
Windows Identity Foundation
April 14, 2020
WunderlistMay 6, 2020
Expression Encoder 4
Expression Studio 4
Expression Web 4
Expression Studio Ultimate 4
Microsoft Application Virtualization 4.6 for Terminal Services
Microsoft Application Virtualization 4.6 for Windows Desktops
Microsoft Application Virtualization 4.6 for Remote Desktop Services
Microsoft Application Virtualization 4.6 Sequencer
Microsoft Application Virtualization Hosting 4.6 for Windows Desktops
Visual Studio Team Foundation Server 2010
Visual Studio 2010 (all editions)
Visual Basic 2010 Express
Visual C# 2010 Express
Visual C++ 2010 Express
Visual Web Developer 2010 Express
Windows MultiPoint Server 2010 (all editions)
July 14, 2020
Internet Information Services Smooth Streaming Client 1.0
Microsoft Report Viewer Redistributable 2010
System Center Service Manager 2010
Windows Communication Foundation RIA Services
September 8, 2020
Access 2010
Dynamics GP 2010
Excel 2010
Excel Mobile 2010
Exchange Server 2010 (all editions)
FAST Search Server 2010 (all editions)
Groove Server 2010
Office 2010 (all editions)
OneNote 2010
PowerPoint 2010
Project 2010
Publisher 2010
Search Server 2010
System Center Data Protection Manager 2010
System Center Essentials 2010
Visio 2010 (all editions)
Word 2010
Windows Embedded Standard 7
Office 2016 for Mac (all editions)
Excel 2016 for Mac
Outlook 2016 for Mac
PowerPoint 2016 for Mac
Word 2016 for Mac
October 13, 2020

Service Packs

The following service packs apply to Fixed Policy products, and will end support in 2020.

Service PackEnd of Support
Dynamics 365 Business Central on-premisesApril 14, 2020
Microsoft Identity Manager 2016 Service Pack 1November 4, 2020

Products moving to Extended Support

The following products will be moving from Mainstream to Extended Support in 2020. Extended Support includes security updates at no cost, and paid non-security updates and support. Additionally, Microsoft will not accept requests for design changes or new features during the Extended Support phase.

ProductEnd of Mainstream Support
Dynamics C5 2015
Dynamics CRM 2015
Dynamics SL 2015
Dynamics NAV 2015
January 14, 2020
Cloud Platform System
Cloud Platform System Standard
Dynamics GP 2015
Dynamics GP 2015 R2
Microsoft User Experience Virtualization 2.1 Service Pack 1
April 14, 2020
Azure StorSimple 8000 Series
Microsoft Azure StorSimple 1200 Series
StorSimple Data Manager
July 1, 2020
Access 2016
Excel 2016
Exchange Server 2016 (Enterprise, Standard)
Office Home and Business 2016
Office Home and Student 2016
Office Professional 2016
Office Professional Plus 2016
Office Standard 2016
Project Professional 2016
Project Standard 2016
Microsoft Publisher 2016
Outlook 2016
PowerPoint 2016
Skype for Business 2016
Skype for Business Server 2015
Visio Professional 2016
Visio Standard 2016
Visual Studio 2015 (all editions)
Visual Studio Team Foundation Server 2015 (all editions)
Windows 10 Enterprise 2015 LTSB
Windows 10 IoT Enterprise 2015 LTSB
Windows Defender Exploit Guard
Word 2016
October 13, 2020

Change Log

September 2019 editsADDED: Windows Analytics, Windows Storage Server 2008 (all editions), Internet Explorer 10, StorSimple Data Manager, Visio Services in SharePoint Online
ADDED: Windows 10, version 1903 (Enterprise, Home, Pro, Pro for Workstations, IoT Enterprise) and Windows Server, version 1903 (Datacenter, Standard, IoT Enterprise)
EDITED: Exchange Server 2010 (all editions) support extended from January 14, 2020 to October 13, 2020

Microsoft Viewers Download

January 2020 edits
ADDED: Exchange Server 2010, Microsoft Application Virtualization 4.6 for Remote Desktop Services, Expression Studio 4, Windows 10 Pro Education,
EDITED: Visual Basic 2010 Express, Visual Basic C# 2010 Express, Visual Basic C++ 2010 Express, Visual Web Developer 2010 Express, Expression Encoder 4, Expression Web 4 date updated to July 14, 2020
EDITED: OneNote 2016 Mainstream Support extended from October 13, 2020 to October 10, 2023
EDITED: specific editions removed, 'all editions' added to parent listing

February 2020 edits
ADDED: Dynamics 365 Business Central on-premises, Microsoft Identity Manager 2016 Service Pack 1

Microsoft Excel Viewer Mac Catalina

April 2020 edits
EDITED: Windows 10, version 1709 (Enterprise, Education, IoT Enterprise) extended to October 13, 2020
EDITED: Windows 10, version 1809 (Home, Pro, Pro Education, Pro for Workstation, IoT Core), Windows Server version 1809 (Datacenter Core, Standard Core) extended to November 10, 2020
REMOVED: PerformancePoint Services in SharePoint Server 2010, Project Server 2010, SharePoint Server 2010 (support extended from October 13, 2020 to April 13, 2021)

June 2020 edits
REMOVED: Windows Defender Antivirus for Windows 10

July 2020 edits
ADDED: Expression Studio Ultimate 4
EDITED: Visual Basic 2010 Express, Visual C# 2010 Express, and Visual C++ 2010 Express corrections






broken image