Cisco Cisco IOS Software Release 12.4(23) Notas de publicación

Descargar
Página de 610
692
Caveats for Cisco IOS Release 12.4
OL-7656-15 Rev. J0
  Resolved Caveats—Cisco IOS Release 12.4(5c)
Cisco response is posted at the following link:
CSCsi84017
Symptoms: When you reload a Cisco 2600 series, the router may hang.
Conditions: This symptom is observed on a Cisco 2600 series when you attempt to run the 
c2600-entservices-mz image of Cisco IOS Release 12.4(9)T4. The symptom may also occur in other 
releases.
Workaround: There is no workaround. 
CSCuk60910
Symptoms: A Cisco IOS router may detect a memory corruption and reload.
Conditions: An interface on the system must be configured for Van Jacobsen TCP header 
compression, using the ip tcp header-compression command, and connected to a third party 
system.
Workaround: There is no workaround. 
TCP/IP Host-Mode Services
CSCek37177
The Cisco IOS Transmission Control Protocol (TCP) listener in certain versions of Cisco IOS 
software is vulnerable to a remotely-exploitable memory leak that may lead to a denial of service 
condition.
This vulnerability only applies to traffic destined to the Cisco IOS device. Traffic transiting the 
Cisco IOS device will not trigger this vulnerability.
Cisco has made free software available to address this vulnerability for affected customers.
This issue is documented as Cisco bug ID CSCek37177
There are workarounds available to mitigate the effects of the vulnerability.
This advisory is posted at 
CSCse05736
Symptoms: A router that is running RCP can be reloaded by a specific packet.
Conditions: This symptom is seen under the following conditions:
The router must have RCP enabled.
The packet must come from the source address of the designated system configured to send RCP 
packets to the router.
The packet must have a specific data content.
Workaround: Put access lists on the edge of your network blocking RCP packets to prevent spoofed 
RSH packets. Use another protocol such as SCP. Use VTY ACLs.