SMB connections from non-Microsoft clients may fail after applying security update MS11-014

Are you having problems connecting from non-windows SMB clients to Windows 2003 servers after installing the Microsoft Security Bulletin MS11-014 – Important Vulnerability in Local Security Authority Subsystem Service Could Allow Local Elevation of Privilege (2478960) security patch?

 

Third-party SMB client software including but not limited to NetApp filers, Samba v3.0.22, and Vintela/Quest Authentication Services (VAS\QAS) clients may have a dependency on a field that was removed. Client software with this dependency will abort SMB session setup attempts after the negotiate response is received from the server. This problem occurs because the QFE version of the security update has an unexpected interaction with an encapsulated hotfix that causes the negotiate hint to be dropped from the negotiate protocol response. This is an optional field per RFC 4178 and is not required for Windows clients to perform negotiation correctly; however third-party SMB clients may have a dependency on this field.

 

We have confirmed that customers using earlier versions of the Samba smbclient (version 3.0.11 and earlier) and VAS\QAS clients (prior to 3.5.2.80) may experience problems. Customers running older versions of NetApp filers may experience problems if those filers are acting as SMB clients. Customers running VAS\QAS clients on Unix file servers may also experience this issue.

 

Below you will see an example network trace of the situation that may occur:

 

UNIX server with VAS Client = 192.168.1.100

Windows 2003 Server w/ MS11-014 = 192.168.1.123

 

Source IP

Destination IP

Protocol

Description

192.168.1.100

192.168.1.123

TCP

61603 > microsoft-ds [SYN] Seq=0

Win=16384 Len=0 MSS=1460

192.168.1.123

192.168.1.100

TCP

microsoft-ds > 61603 [SYN, ACK] Seq=0

Ack=1 Win=64240 Len=0 MSS=1460

192.168.1.100

192.168.1.123

TCP

61603 > microsoft-ds [ACK] Seq=1

Ack=1 Win=17520 Len=0

192.168.1.100

192.168.1.123

SMB

Negotiate Protocol Request

192.168.1.123

192.168.1.100

SMB

Negotiate Protocol Response

192.168.1.100

192.168.1.123

TCP

61603 > microsoft-ds [FIN, ACK] Seq=63

Ack=154 Win=17520 Len=0

192.168.1.123

192.168.1.100

TCP

microsoft-ds > 61603 [FIN, ACK] Seq=154

Ack=64 Win=64178 Len=0

192.168.1.100

192.168.1.123

TCP

61603 > microsoft-ds [ACK] Seq=64

Ack=155 Win=17520 Len=0

 

Many third-party vendors have removed this dependency in recent updates. Later versions of the software listed above have been used to work around the problem. As a workaround, customers should contact their software vendors to see if an updated version of their client software is available.

Comments

  • Anonymous
    February 22, 2015
    Paswad
  • Anonymous
    March 16, 2015
    192.168.1.100
  • Anonymous
    April 21, 2016
    Nce "upgrade". What are you going to break next?