Cisco Cisco Aironet 1200 Access Point Notas de publicación
20
Release Notes for Cisco Aironet 350, 1100, 1130AG, 1200 and 1230AG Series Access Points for Cisco IOS Release 12.3(4)JA2
OL-10198-01
Caveats
•
CSCee45312
Remote Authentication Dial In User Service (RADIUS) authentication on a device that is running
certain versions of Cisco Internetworking Operating System (IOS) and configured with a fallback
method to none can be bypassed.
certain versions of Cisco Internetworking Operating System (IOS) and configured with a fallback
method to none can be bypassed.
Systems that are configured for other authentication methods or that are not configured with a
fallback method to none are not affected.
fallback method to none are not affected.
Only the systems that are running certain versions of Cisco IOS are affected. Not all configurations
using RADIUS and none are vulnerable to this issue. Some configurations using RADIUS, none and
an additional method are not affected.
using RADIUS and none are vulnerable to this issue. Some configurations using RADIUS, none and
an additional method are not affected.
Cisco has made free software available to address this vulnerability. There are workarounds
available to mitigate the effects of the vulnerability.
available to mitigate the effects of the vulnerability.
More details can be found in the security advisory which posted at the following URL:
.
•
CSCef67660—SSHv2 malform client ignore message no longer causes damage to router
Resolved Caveats in Cisco IOS Release 12.3(4)JA1
The following caveat is resolved in Cisco IOS Release 12.3(4)JA1:
•
CSCei61732
Cisco IOS may permit arbitrary code execution after exploitation of a heap-based buffer overflow
vulnerability. Cisco has included additional integrity checks in its software, as further described
below, that are intended to reduce the likelihood of arbitrary code execution.
vulnerability. Cisco has included additional integrity checks in its software, as further described
below, that are intended to reduce the likelihood of arbitrary code execution.
Cisco has made free software available that includes the additional integrity checks for affected
customers.
customers.
This advisory is posted at the following URL:
•
CSCei76358—Through normal software maintenance processes, Cisco is removing depreciated
functionality. These changes have no impact on system operation or feature availability..
functionality. These changes have no impact on system operation or feature availability..
Resolved Caveats in Cisco IOS Release 12.3(4)JA
These caveats are resolved in Cisco IOS Release 12.3(4)JA:
•
CSCeb82510—You can now configure authentication, authorization, and accounting (AAA)
methods for telnet and HTTP independent of the console.
methods for telnet and HTTP independent of the console.
•
CSCec12884—The AAA user command authorization no longer fails through HTTP access.
•
CSCee42617—Users are now correctly authenticated through the RADIUS server, and accounting
information is sent to the RADIUS server.
information is sent to the RADIUS server.
•
CSCee87287—Access points no longer fail to generate accounting records when a wireless client is
re-authenticated on an automatic interval (for example, when the access point is configured using
the dot1x reauthentication seconds command).
re-authenticated on an automatic interval (for example, when the access point is configured using
the dot1x reauthentication seconds command).
•
CSCee93036—Access points now support the archive upload rcp:/hostname/file-path command.
•
CSCef43007—Logging system messages to the console is now disabled by default on 1100 series
access points.
access points.