Cisco Cisco Aironet 1200 Access Point Notas de publicación

Descargar
Página de 24
 
20
Release Notes for Cisco Aironet 350, 1100, 1130AG, 1200 and 1230AG Series Access Points for Cisco IOS Release 12.3(4)JA2
OL-10198-01
Caveats
CSCee45312
Remote Authentication Dial In User Service (RADIUS) authentication on a device that is running 
certain versions of Cisco Internetworking Operating System (IOS) and configured with a fallback 
method to none can be bypassed.
Systems that are configured for other authentication methods or that are not configured with a 
fallback method to none are not affected.
Only the systems that are running certain versions of Cisco IOS are affected. Not all configurations 
using RADIUS and none are vulnerable to this issue. Some configurations using RADIUS, none and 
an additional method are not affected.
Cisco has made free software available to address this vulnerability. There are workarounds 
available to mitigate the effects of the vulnerability.
More details can be found in the security advisory which posted at the following URL: 
.
CSCef67660—SSHv2 malform client ignore message no longer causes damage to router
Resolved Caveats in Cisco IOS Release 12.3(4)JA1
The following caveat is resolved in Cisco IOS Release 12.3(4)JA1:
CSCei61732
Cisco IOS may permit arbitrary code execution after exploitation of a heap-based buffer overflow 
vulnerability. Cisco has included additional integrity checks in its software, as further described 
below, that are intended to reduce the likelihood of arbitrary code execution.
Cisco has made free software available that includes the additional integrity checks for affected 
customers.
This advisory is posted at the following URL: 
CSCei76358—Through normal software maintenance processes, Cisco is removing depreciated 
functionality. These changes have no impact on system operation or feature availability..
Resolved Caveats in Cisco IOS Release 12.3(4)JA
These caveats are resolved in Cisco IOS Release 12.3(4)JA:
CSCeb82510—You can now configure authentication, authorization, and accounting (AAA) 
methods for telnet and HTTP independent of the console.
CSCec12884—The AAA user command authorization no longer fails through HTTP access. 
CSCee42617—Users are now correctly authenticated through the RADIUS server, and accounting 
information is sent to the RADIUS server.
CSCee87287—Access points no longer fail to generate accounting records when a wireless client is 
re-authenticated on an automatic interval (for example, when the access point is configured using 
the dot1x reauthentication seconds command). 
CSCee93036—Access points now support the archive upload rcp:/hostname/file-path command.
CSCef43007—Logging system messages to the console is now disabled by default on 1100 series 
access points.