Cisco Cisco Aironet 1400 Wireless Bridge Notas de publicación

Descargar
Página de 8
 
6
Release Notes for Cisco Aironet 1410 Wireless Bridges for Cisco IOS Release 12.3(8)JA2
OL-8238-02
  Caveats
Resolved Caveats
This caveat is resolved in Cisco IOS Release 12.3(8)JA2:
CSCek26492
Symptoms: A router may crash if it receives a packet with a specific crafted IP option as detailed in 
Cisco Security Advisory: Crafted IP Option Vulnerability:
Conditions: This DDTS resolves a symptom of CSCec71950. Cisco IOS with this specific DDTS 
are not at risk of crash if CSCec71950 has been resolved in the software.
Workaround: Cisco IOS versions with the fix for CSCec71950 are not at risk for this issue and no 
workaround is required. If CSCec71950 is not resolved, see the following Cisco Security Advisory: 
Crafted IP Option Vulnerability for workaround information:
CSCek37177
The Cisco IOS Transmission Control Protocol (TCP) listener in certain versions of Cisco IOS 
software is vulnerable to a remotely-exploitable memory leak that may lead to a denial of service 
condition. 
This vulnerability only applies to traffic destined to the Cisco IOS device. Traffic transiting the 
Cisco IOS device will not trigger this vulnerability. 
Cisco has made free software available to address this vulnerability for affected customers. 
This issue is documented as Cisco bug ID 
CSCek37177
.
There are workarounds available to mitigate the effects of the vulnerability. 
This advisory is posted at 
CSCsc88624—Devices in non-root bridge mode no longer modify VTP packets from SNAP format 
to DIX format.
If You Need More Information
If you need information about a specific caveat that does not appear in these release notes, you can use 
the Cisco Bug Toolkit to find select caveats of any severity. Click this URL to browse to the Bug Toolkit:
(If you request a defect that cannot be displayed, the defect number might not exist, the defect might not 
yet have a customer-visible description, or the defect might be marked Cisco Confidential.)