File management functions fail after applying Microsoft Security Update KB885250

Version 1

    File management functions fail after applying Microsoft Security Update KB885250




    Updated 03/15/2005

    A security update affecting numerous Windows OSes introduced compatibility issues between Windows clients and Snap Servers. This update from Microsoft changes the behavior of how a Windows client responds to previously working SMB (Server Message Block) calls. Affected functions may include copying, renaming, or deleting files.


    Here is an example of an error during a copy operation in Windows Explorer.

    "Error Copying File or Folder

    Cannot copy FILENAME: The specified server cannot perform the requested operation."


    For information on this Microsoft security bulletin, see this URL.<br><br>Vulnerability in Server Message Block Could Allow Remote Code Execution (885250): MS05-Adaptec has released a patch for all current SnapOS 4.x customers available in">Answer ID 13180. If the Snap Server is running 3.x or earlier and it is under a contract that entitles upgrades please contact Customer Service Department at 888-338-7627 to confirm your eligibility. For a Snap Server not covered in either case this release is available with the purchase of a Software Maintenance contract from the
    Please note this issue does not impact the Guardian OS.


    It is possible to work around this issue by deselecting the "Enable NT SMBs" on the Snap server. This option is displayed in the web administration tool under Network Settings -> Microsoft Networking -> Advanced. Reboot the server for the change to take effect. Note disabling this option limits the maximum file size allowable for Windows clients to 4GB. Disabling the option may also present incompatibility with some third party applications. To ensure a new incompatibility is not introduced with the option disabled, run applications normally used with the Snap Server to verify this choice is viable.


    As the above option will not work in all environments users may with a full understanding of its implications choose to not install or un-install the security update and follow the security practice suggested in the workarounds section of the security bulletin. In the bulletin, follow the links to Vulnerability Details -> Server Message Block Vulnerability - CAN-2005-0045: -> Workarounds for Server Message Block Vulnerability - CAN-2005-0045.