You are currently offline, waiting for your internet to reconnect

MS16-101: Description of the security update for Windows authentication methods: August 9, 2016

Summary
This security update resolves multiple vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker runs a specially crafted application on a domain-joined system.

To learn more about the vulnerability, see Microsoft Security Bulletin MS16-101.
More information
Important
  • All future security and non-security updates for Windows 8.1 and Windows Server 2012 R2 require update 2919355 to be installed. We recommend that you install update 2919355 on your Windows 8.1-based or Windows Server 2012 R2-based computer so that you receive future updates. 
  • If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

Non-security-related fixes that are included in this security update

This security update also fixes the following non-security-related issues:
  • In a Domain-joined Scale Out File Server (SoFS) on a domainless cluster, when an SMB client that is running either Windows 8.1 or Windows Server 2012 R2 connects to a node that is down, authentication fails. When this occurs, you may receive an error message that resembles the following message:

    STATUS_NO_TGT_REPLY

Known issues in this security update

  • Known issue 1

    The security updates that are provided in MS16-101 and newer updates disable the ability of the Negotiate process to fall back to NTLM when Kerberos authentication fails for password change operations with the STATUS_NO_LOGON_SERVERS (0xc000005e) error code. In this situation, you may receive one of the following error codes.

    HexadecimalDecimalSymbolicFriendly
    0xc00003881073740920STATUS_DOWNGRADE_DETECTEDThe system detected a possible attempt to compromise security. Please make sure that you can contact the server that authenticated you.
    0x4f11265ERROR_DOWNGRADE_DETECTEDThe system detected a possible attempt to compromise security. Please make sure that you can contact the server that authenticated you.


    Workaround

    If password changes that previously succeeded fail after the installation of MS16-101, it's likely that password changes were previously relying on NTLM fallback because Kerberos was failing. In order to change passwords successfully by using Kerberos protocols, follow these steps:

    1. Configure open communication on TCP port 464 between clients that have MS16-101 installed and the domain controller that is servicing password resets.

      Read-only domain controllers (RODCs) can service self-service password resets if the user is allowed by the RODCs password replication policy. Users who are not allowed by the RODC password policy require network connectivity to a read/write domain controller (RWDC) in the user account domain.

      Note To check whether TCP port 464 is open, follow these steps:

      1. Create an equivalent display filter for your network monitor parser. For example:
        ipv4.address== <ip address of client> && tcp.port==464
      2. In the results, look for the "TCP:[SynReTransmit" frame.

        Frame
    2. Make sure that the target Kerberos names are valid. (IP addresses are not valid for the Kerberos protocol. Kerberos supports short names and fully qualified domain names.)
    3. Make sure that service principal names (SPNs) are registered correctly.

      For more information, see Kerberos and Self-Service Password Reset.
  • Known issue 2

    We know about an issue in which programmatic password resets of domain user accounts fail and return the STATUS_DOWNGRADE_DETECTED (0x800704F1) error code if the expected failure is one of the following:

    • ERROR_INVALID_PASSWORD
    • ERROR_PWD_TOO_SHORT (rarely returned)
    • STATUS_WRONG_PASSWORD
    • STATUS_PASSWORD_RESTRICTION

    The following table shows the full error mapping.

    HexadecimalDecimalSymbolicFriendly
    0x5686ERROR_INVALID_PASSWORDThe specified network password is not correct.
    0x267615ERROR_PWD_TOO_SHORTThe password that was provided is too short to meet the policy of your user account. Please provide a longer password.
    0xc000006a-1073741718STATUS_WRONG_PASSWORDWhen you try to update a password, this return status indicates that the value that was provided as the current password is incorrect.
    0xc000006c-1073741716STATUS_PASSWORD_RESTRICTIONWhen you try to update a password, this return status indicates that some password update rule was violated. For example, the password may not meet the length criteria.
    0x800704F11265STATUS_DOWNGRADE_DETECTEDThe system cannot contact a domain controller to service the authentication request. Please try again later.
    0xc0000388-1073740920STATUS_DOWNGRADE_DETECTEDThe system cannot contact a domain controller to service the authentication request. Please try again later.


    Status

    The root cause of this issue is understood. We plan to release a fix that resolves this issue in October 2016. This release date is subject to change. This article will be updated with additional details as they become available.

  • Known issue 3

    We know about an issue in which programmatic resets of local user account password changes may fail and return the STATUS_DOWNGRADE_DETECTED (0x800704F1) error code.

    The following table shows the full error mapping.

    HexadecimalDecimalSymbolicFriendly
    0x4f11265ERROR_DOWNGRADE_DETECTEDThe system cannot contact a domain controller to service the authentication request. Please try again later.


    Status

    The root cause of this issue is understood. We plan to release a fix that resolves this issue in October 2016. This release date is subject to change. This article will be updated with additional details as they become available.

  • Known issue 4

    Passwords for disabled and locked-out user accounts cannot be changed.

    Workaround

    These accounts require an administrator to make password resets. This behavior is by design after you install MS16-101 and later fixes.

  • Known issue 5

    Applications that use the NetUserChangePassword API and that pass a servername in the domainname parameter will no longer work after MS16-101 and later updates are installed.

    Microsoft documentation states that providing a remote server name in the domainname parameter of the NetUserChangePassword function is supported. For example, the NetUserChangePassword function MSDN topic states the following:

    domainname [in]
    A pointer to a constant string that specifies the DNS or NetBIOS name of a remote server or domain on which the function is to execute. If this parameter is NULL, the logon domain of the caller is used.
    However, this guidance has been superseded by MS16-101, unless the password reset is for a local account on the local computer. The latter scenario is expected to work but does not work, as stated in Known issue 3 in this section.
How to obtain and install the update

Method 1: Windows Update

This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see Get security updates automatically.

Method 2: Microsoft Update Catalog

To get the stand-alone package for this update, go to the Microsoft Update Catalog website.

Method 3: Microsoft Download Center

You can obtain the stand-alone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.

Click the download link in Microsoft Security Bulletin MS16-101 that corresponds to the version of Windows that you are running.
More information

How to obtain help and support for this security update

Help for installing updates: Support for Microsoft Update

Security solutions for IT professionals: TechNet Security Troubleshooting and Support

Help for protecting your Windows-based computer from viruses and malware: Virus Solution and Security Center

Local support according to your country: International Support
File Information

File hash information

File nameSHA1 hashSHA256 hash
Windows8.1-KB3177108-x86.msu56DD46107F56F6EE47481B48E79A47074775B64BC08D2F31ED85EB93BD1D021AE63197227C879D6565CD1E81E872A317C34C91E8
Windows8.1-KB3177108-x64.msu3D7C85C7A6C5C0F4630F6E7950C60BFE09B002B3C4104862D4FBC7DA6ECD4A9C609F1E1F910D9EF4895C140554DAD35FEC84DE93
Windows8-RT-KB3177108-x64.msuA65945511227612F442BA9B2D858AB13B8F56297F75D17F4F1680532A2B951F10BA88E7025C4C48C6C7EAE507EA0F1C53EBD04C5

File information

The English (United States) version of this software update installs files that have the attributes that are listed in the following tables.

Windows 8.1 and Windows Server 2012 R2 file information

Notes
  • The files that apply to a specific product, milestone (RTM, SPn), and service branch (LDR, GDR) can be identified by examining the file version numbers as shown in the following table:
    VersionProductMilestoneService branch
    6.3.960 0.16xxxWindows RT 8.1, Windows 8.1, and Windows Server 2012 R2RTMGDR
    6.3.960 0.17xxxWindows RT 8.1, Windows 8.1, and Windows Server 2012 R2RTMGDR
    6.3.960 0.18xxxWindows RT 8.1, Windows 8.1, and Windows Server 2012 R2RTMGDR
  • GDR service branches contain only those fixes that are widely released to address widespread, critical issues. LDR service branches contain hotfixes in addition to widely released fixes.
  • The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.
For all supported x86-based versions
File nameFile versionFile sizeDateTimePlatform
Bcryptprimitives.dll6.3.9600.18340340,87216-May-201621:13x86
Cng.sys6.3.9600.18340479,31216-May-201621:16x86
Ksecpkg.sys6.3.9600.18340148,82416-May-201621:16x86
Lsasrv.dll6.3.9600.184051,118,20808-Jul-201614:18x86
Adtschema.dll6.3.9600.17415736,76829-Oct-201402:06x86
Msaudite.dll6.3.9600.17415154,11229-Oct-201402:06x86
Msobjs.dll6.3.9600.1638461,95222-Aug-201304:17x86
Netlogon.dll6.3.9600.18405696,83208-Jul-201614:17x86
Msv1_0.dll6.3.9600.18405332,63209-Jul-201600:08x86
Mrxsmb10.sys6.3.9600.18298229,37606-Apr-201616:48x86
Mrxsmb20.sys6.3.9600.18404153,08807-Jul-201620:35x86
Mrxsmb.sys6.3.9600.18298328,70406-Apr-201616:48x86
For all supported x64-based versions
File nameFile versionFile sizeDateTimePlatformSP requirementService branch
Bcryptprimitives.dll6.3.9600.18344397,23218-May-201623:18x64NoneNot applicable
Certcli.dll6.3.9600.18404445,44007-Jul-201621:53x64NoneNot applicable
Cng.sys6.3.9600.18344563,02418-May-201623:18x64NoneNot applicable
Ksecpkg.sys6.3.9600.18344178,01618-May-201623:16x64NoneNot applicable
Lsasrv.dll6.3.9600.184051,445,37608-Jul-201614:22x64NoneNot applicable
Adtschema.dll6.3.9600.17415736,76829-Oct-201402:50x64NoneNot applicable
Msaudite.dll6.3.9600.17415154,11229-Oct-201402:51x64NoneNot applicable
Msobjs.dll6.3.9600.1638461,95222-Aug-201311:46x64NoneNot applicable
Ocspisapi.dll6.3.9600.17415293,37629-Oct-201401:43x64SPSAMD64_MICROSOFT-WINDOWS-OCSP
Ocspisapictrs.hNot applicable1,42118-Jun-201315:06Not applicableSPSAMD64_MICROSOFT-WINDOWS-OCSP
Ocspisapictrs.iniNot applicable2,63618-Jun-201315:06Not applicableSPSAMD64_MICROSOFT-WINDOWS-OCSP
Ocspsvcctrs.iniNot applicable2,96022-Aug-201319:26Not applicableSPSAMD64_MICROSOFT-WINDOWS-OCSP
Ocspsvcctrs.iniNot applicable3,13422-Aug-201319:44Not applicableSPSAMD64_MICROSOFT-WINDOWS-OCSP
Ocspsvcctrs.iniNot applicable2,91822-Aug-201312:30Not applicableSPSAMD64_MICROSOFT-WINDOWS-OCSP
Ocspsvcctrs.iniNot applicable3,21022-Aug-201319:43Not applicableSPSAMD64_MICROSOFT-WINDOWS-OCSP
Ocspsvcctrs.iniNot applicable3,09822-Aug-201319:30Not applicableSPSAMD64_MICROSOFT-WINDOWS-OCSP
Ocspsvcctrs.iniNot applicable3,02822-Aug-201319:46Not applicableSPSAMD64_MICROSOFT-WINDOWS-OCSP
Ocspsvcctrs.iniNot applicable3,14022-Aug-201319:31Not applicableSPSAMD64_MICROSOFT-WINDOWS-OCSP
Ocspsvcctrs.iniNot applicable2,64222-Aug-201319:30Not applicableSPSAMD64_MICROSOFT-WINDOWS-OCSP
Ocspsvcctrs.iniNot applicable2,57622-Aug-201319:31Not applicableSPSAMD64_MICROSOFT-WINDOWS-OCSP
Ocspsvcctrs.iniNot applicable3,02622-Aug-201319:23Not applicableSPSAMD64_MICROSOFT-WINDOWS-OCSP
Ocspsvcctrs.iniNot applicable3,02822-Aug-201319:23Not applicableSPSAMD64_MICROSOFT-WINDOWS-OCSP
Ocspsvcctrs.iniNot applicable3,18822-Aug-201319:23Not applicableSPSAMD64_MICROSOFT-WINDOWS-OCSP
Ocspsvcctrs.iniNot applicable3,12622-Aug-201319:33Not applicableSPSAMD64_MICROSOFT-WINDOWS-OCSP
Ocspsvcctrs.iniNot applicable3,06422-Aug-201319:36Not applicableSPSAMD64_MICROSOFT-WINDOWS-OCSP
Ocspsvcctrs.iniNot applicable3,09222-Aug-201319:36Not applicableSPSAMD64_MICROSOFT-WINDOWS-OCSP
Ocspsvcctrs.iniNot applicable2,82822-Aug-201319:32Not applicableSPSAMD64_MICROSOFT-WINDOWS-OCSP
Ocspsvcctrs.iniNot applicable2,46422-Aug-201319:20Not applicableSPSAMD64_MICROSOFT-WINDOWS-OCSP
Ocspsvcctrs.iniNot applicable2,48022-Aug-201319:20Not applicableSPSAMD64_MICROSOFT-WINDOWS-OCSP
Ocspsvcctrs.iniNot applicable2,46022-Aug-201319:21Not applicableSPSAMD64_MICROSOFT-WINDOWS-OCSP
Ocspsvc.exe6.3.9600.17415219,13629-Oct-201402:19x64SPSAMD64_MICROSOFT-WINDOWS-OCSP
Ocspsvcctrs.hNot applicable1,56918-Jun-201315:06Not applicableSPSAMD64_MICROSOFT-WINDOWS-OCSP
Ocspsvcctrs.iniNot applicable2,91818-Jun-201315:06Not applicableSPSAMD64_MICROSOFT-WINDOWS-OCSP
Netlogon.dll6.3.9600.18405840,70408-Jul-201614:19x64NoneNot applicable
Msv1_0.dll6.3.9600.18405442,71209-Jul-201600:09x64NoneNot applicable
Mrxsmb10.sys6.3.9600.18298284,67206-Apr-201618:19x64NoneNot applicable
Mrxsmb20.sys6.3.9600.18404201,72807-Jul-201622:33x64NoneNot applicable
Mrxsmb.sys6.3.9600.18298401,92006-Apr-201618:19x64NoneNot applicable
Netlogon.dll6.3.9600.18405696,83208-Jul-201614:17x86NoneNot applicable
Msv1_0.dll6.3.9600.18405332,63209-Jul-201600:08x86NoneNot applicable
Bcryptprimitives.dll6.3.9600.18344340,88018-May-201622:28x86NoneNot applicable
Certcli.dll6.3.9600.18404324,09607-Jul-201620:06x86NoneNot applicable
Adtschema.dll6.3.9600.17415736,76829-Oct-201402:06x86NoneNot applicable
Msaudite.dll6.3.9600.17415154,11229-Oct-201402:06x86NoneNot applicable
Msobjs.dll6.3.9600.1638461,95222-Aug-201304:17x86NoneNot applicable

Windows Server 2012 file information

Notes
  • The files that apply to a specific product, milestone (RTM, SPn), and service branch (LDR, GDR) can be identified by examining the file version numbers as shown in the following table:
    Version Product Milestone Service branch
    6.2.920 0.17xxxWindows 8, Windows RT, or Windows Server 2012RTMGDR
    6.2.920 0.21xxxWindows 8, Windows RT, or Windows Server 2012RTMLDR
  • GDR service branches contain only those fixes that are widely released to address widespread, critical issues. LDR service branches contain hotfixes in addition to widely released fixes.
  • The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.
For all supported x64-based versions
File nameFile versionFile sizeDateTimePlatformSP requirementService branch
Ksecdd.sys6.2.9200.21473100,18402-May-201506:23x64NoneNot applicable
Lsass.exe6.2.9200.2052135,84020-Sep-201206:33x64NoneNot applicable
Sspicli.dll6.2.9200.21703164,35217-Nov-201508:00x64NoneNot applicable
Sspisrv.dll6.2.9200.2052127,64820-Sep-201206:32x64NoneNot applicable
Cng.sys6.2.9200.21637566,07222-Sep-201513:43x64NoneNot applicable
Ksecpkg.sys6.2.9200.21858171,36010-May-201619:18x64NoneNot applicable
Lsasrv.dll6.2.9200.219411,281,53623-Jul-201618:10x64NoneNot applicable
Adtschema.dll6.2.9200.21289719,36010-Nov-201404:43x64NoneNot applicable
Msaudite.dll6.2.9200.21269146,94411-Oct-201405:38x64NoneNot applicable
Msobjs.dll6.2.9200.1638461,95226-Jul-201202:36x64NoneNot applicable
Ocspsvcctrs.iniNot applicable2,96026-Jul-201205:07Not applicableSPSAMD64_MICROSOFT-WINDOWS-OCSP
Ocspsvcctrs.iniNot applicable3,13426-Jul-201208:00Not applicableSPSAMD64_MICROSOFT-WINDOWS-OCSP
Ocspsvcctrs.iniNot applicable2,91826-Jul-201204:43Not applicableSPSAMD64_MICROSOFT-WINDOWS-OCSP
Ocspsvcctrs.iniNot applicable3,21026-Jul-201207:59Not applicableSPSAMD64_MICROSOFT-WINDOWS-OCSP
Ocspsvcctrs.iniNot applicable3,09826-Jul-201208:00Not applicableSPSAMD64_MICROSOFT-WINDOWS-OCSP
Ocspsvcctrs.iniNot applicable3,02826-Jul-201207:59Not applicableSPSAMD64_MICROSOFT-WINDOWS-OCSP
Ocspsvcctrs.iniNot applicable3,14026-Jul-201205:21Not applicableSPSAMD64_MICROSOFT-WINDOWS-OCSP
Ocspsvcctrs.iniNot applicable2,64226-Jul-201208:11Not applicableSPSAMD64_MICROSOFT-WINDOWS-OCSP
Ocspsvcctrs.iniNot applicable2,57626-Jul-201205:20Not applicableSPSAMD64_MICROSOFT-WINDOWS-OCSP
Ocspsvcctrs.iniNot applicable3,02626-Jul-201207:36Not applicableSPSAMD64_MICROSOFT-WINDOWS-OCSP
Ocspsvcctrs.iniNot applicable3,02826-Jul-201207:48Not applicableSPSAMD64_MICROSOFT-WINDOWS-OCSP
Ocspsvcctrs.iniNot applicable3,18826-Jul-201205:30Not applicableSPSAMD64_MICROSOFT-WINDOWS-OCSP
Ocspsvcctrs.iniNot applicable3,12626-Jul-201205:08Not applicableSPSAMD64_MICROSOFT-WINDOWS-OCSP
Ocspsvcctrs.iniNot applicable3,06426-Jul-201207:49Not applicableSPSAMD64_MICROSOFT-WINDOWS-OCSP
Ocspsvcctrs.iniNot applicable3,09226-Jul-201207:52Not applicableSPSAMD64_MICROSOFT-WINDOWS-OCSP
Ocspsvcctrs.iniNot applicable2,82826-Jul-201205:12Not applicableSPSAMD64_MICROSOFT-WINDOWS-OCSP
Ocspsvcctrs.iniNot applicable2,46426-Jul-201208:05Not applicableSPSAMD64_MICROSOFT-WINDOWS-OCSP
Ocspsvcctrs.iniNot applicable2,48026-Jul-201205:13Not applicableSPSAMD64_MICROSOFT-WINDOWS-OCSP
Ocspsvcctrs.iniNot applicable2,46026-Jul-201208:11Not applicableSPSAMD64_MICROSOFT-WINDOWS-OCSP
Ocspsvc.exe6.2.9200.21345272,38415-Jan-201505:27x64SPSAMD64_MICROSOFT-WINDOWS-OCSP
Ocspsvcctrs.hNot applicable1,56902-Jun-201214:34Not applicableSPSAMD64_MICROSOFT-WINDOWS-OCSP
Ocspsvcctrs.iniNot applicable2,91802-Jun-201214:34Not applicableSPSAMD64_MICROSOFT-WINDOWS-OCSP
Credssp.dll6.2.9200.2170320,48017-Nov-201507:59x64SP_AMD64_MICROSOFT-WINDOWS-SECURITY-CREDSSP
Tspkg.dll6.2.9200.2170394,72017-Nov-201508:01x64SP_AMD64_MICROSOFT-WINDOWS-SECURITY-CREDSSP
Tspkg.mofNot applicable96402-Jun-201214:33Not applicableSP_AMD64_MICROSOFT-WINDOWS-SECURITY-CREDSSP
Wdigest.dll6.2.9200.21858208,89610-May-201617:07x64NoneNot applicable
Kerberos.dll6.2.9200.21830829,95209-Apr-201616:01x64NoneNot applicable
Netlogon.dll6.2.9200.21941746,49623-Jul-201618:10x64NoneNot applicable
Msv1_0.dll6.2.9200.21941317,44023-Jul-201618:10x64NoneNot applicable
Shcore.dll6.2.9200.21703590,84817-Nov-201508:00x64NoneNot applicable
Mrxsmb10.sys6.2.9200.21529281,60025-Jun-201518:52x64NoneNot applicable
Mrxsmb20.sys6.2.9200.21548205,31211-Jul-201517:07x64NoneNot applicable
Mrxsmb.sys6.2.9200.21342396,80006-Jan-201523:17x64NoneNot applicable
Lsm.dll6.2.9200.21703439,80817-Nov-201508:00x64NoneNot applicable
Workerdd.dll6.2.9200.2101214,84812-Apr-201406:58x64NoneNot applicable
Usercpl.dll6.2.9200.217031,043,96817-Nov-201508:01x64NoneNot applicable
Usercpl.ptxmlNot applicable78911-Oct-201200:40Not applicableNoneNot applicable
Winlogon.exe6.2.9200.21703578,04817-Nov-201508:01x64NoneNot applicable
Sspicli.dll6.2.9200.2098499,84010-Mar-201401:34x86NoneNot applicable
Wdigest.dll6.2.9200.21858176,64010-May-201617:55x86NoneNot applicable
Kerberos.dll6.2.9200.21830666,11209-Apr-201616:48x86NoneNot applicable
Netlogon.dll6.2.9200.21941636,41623-Jul-201618:51x86NoneNot applicable
Msv1_0.dll6.2.9200.21941274,94423-Jul-201618:51x86NoneNot applicable
Adtschema.dll6.2.9200.21289719,36010-Nov-201403:40x86NoneNot applicable
Msaudite.dll6.2.9200.21269146,94411-Oct-201404:35x86NoneNot applicable
Msobjs.dll6.2.9200.1638461,95226-Jul-201202:47x86NoneNot applicable
Credssp.dll6.2.9200.2170317,40817-Nov-201508:08x86SP_X86_MICROSOFT-WINDOWS-SECURITY-CREDSSP
Tspkg.dll6.2.9200.2170376,80017-Nov-201508:09x86SP_X86_MICROSOFT-WINDOWS-SECURITY-CREDSSP
Tspkg.mofNot applicable96402-Jun-201214:33Not applicableSP_X86_MICROSOFT-WINDOWS-SECURITY-CREDSSP
Shcore.dll6.2.9200.21703460,80017-Nov-201508:09x86NoneNot applicable
Usercpl.dll6.2.9200.21703961,53617-Nov-201508:09x86NoneNot applicable
Usercpl.ptxmlNot applicable78911-Oct-201200:42Not applicableNoneNot applicable
malicious attacker exploit
Properties

Article ID: 3177108 - Last Review: 09/15/2016 20:42:00 - Revision: 5.0

Windows Server 2012 R2 Datacenter, Windows Server 2012 R2 Standard, Windows Server 2012 R2 Essentials, Windows Server 2012 R2 Foundation, Windows 8.1 Enterprise, Windows 8.1 Pro, Windows 8.1, Windows Server 2012 Datacenter, Windows Server 2012 Standard, Windows Server 2012 Essentials, Windows Server 2012 Foundation, Windows Server 2008 R2 Service Pack 1, Windows 7 Service Pack 1, Windows Server 2008 Service Pack 2, Windows Vista Service Pack 2

  • atdownload kbbug kbexpertiseinter kbfix kbsecbulletin kbsecurity kbsecvulnerability KB3177108
Feedback
>