Cisco Cisco Aironet 1400 Wireless Bridge Notas de publicación
7
Release Notes for Cisco Aironet 1410 Bridges for Cisco IOS Release 12.2(13)JA2
OL-4530-02
Caveats
Caveats
This section lists open and resolved caveats in Cisco IOS Release 12.2(13)JA2 for the bridge.
Open Caveats
These caveats are open in Cisco IOS Release 12.2(13)JA2 for the bridge:
•
CSCeb14603—When the bridge is transmitting and receiving heavy traffic, you cannot start a Telnet
session and existing Telnet sessions freeze or hang. There is no workaround for this issue.
session and existing Telnet sessions freeze or hang. There is no workaround for this issue.
•
CSCec40452—When you run a link test or install the bridge using the autoinstall mode, the RSSI
reading is 4 dB lower than actual at room temperature and 8 dB lower than actual when the outdoor
ambient temperature is higher than approximately 45° C. There is no workaround for this issue.
reading is 4 dB lower than actual at room temperature and 8 dB lower than actual when the outdoor
ambient temperature is higher than approximately 45° C. There is no workaround for this issue.
•
CSCin57580—MAC address filtering sometimes fails to stop traffic from filtered addresses. There
is no workaround for this issue.
is no workaround for this issue.
Resolved Caveats
These caveats are resolved in Cisco IOS Release 12.2(13)JA2:
•
CSCed21588—Bridges no longer disassociate bridges when WEP is enabled.
•
CSCed27956—A vulnerability in the Transmission Control Protocol (TCP) specification (RFC793)
has been discovered by an external researcher. The successful exploitation enables an adversary to
reset any established TCP connection in a much shorter time than was previously discussed publicly.
Depending on the application, the connection may get automatically re-established. In other cases,
a user will have to repeat the action (for example, open a new Telnet or SSH session). Depending
upon the attacked protocol, a successful attack may have additional consequences beyond
terminated connection which must be considered. This attack vector is only applicable to the
sessions which are terminating on a device (such as a router, switch, or computer) and not to the
sessions that are only passing through the device (for example, transit traffic that is being routed by
a router). In addition, this attack vector does not directly compromise data integrity or
confidentiality.
has been discovered by an external researcher. The successful exploitation enables an adversary to
reset any established TCP connection in a much shorter time than was previously discussed publicly.
Depending on the application, the connection may get automatically re-established. In other cases,
a user will have to repeat the action (for example, open a new Telnet or SSH session). Depending
upon the attacked protocol, a successful attack may have additional consequences beyond
terminated connection which must be considered. This attack vector is only applicable to the
sessions which are terminating on a device (such as a router, switch, or computer) and not to the
sessions that are only passing through the device (for example, transit traffic that is being routed by
a router). In addition, this attack vector does not directly compromise data integrity or
confidentiality.
All Cisco products which contain TCP stack are susceptible to this vulnerability.
This advisory is available at
and it describes this vulnerability as it applies to Cisco products that run Cisco IOS® software.
A companion advisory that describes this vulnerability for products that do not run Cisco IOS
software is available at
software is available at
These caveats are resolved in Cisco IOS Release 12.2(13)JA, 12.2(13)JA1, and 12.2(13)JA2:
•
CSCea28990—The bridge now passes IP traffic when the bridge # route IP command is configured.
•
CSCea57649—The CLI Help command no longer produces incorrect output for the radio interface.
•
CSCea77473—HTTP software upgrade no longer fails with Netscape version 7.x.
•
CSCea81730—The web interface for the non-root bridge now correctly displays the root-bridge MAC
address on the radio page.
address on the radio page.