Cisco Cisco IOS Software Release 12.4(2)XB6
Release Notes for Cisco IOS Release 12.4(24)GC5
Caveats
12
Release Notes for Cisco IOS Release 12.4(24)GC5
OL-24057-05
•
CSCtw55976
Cisco IOS Software contains a vulnerability in the Intrusion Prevention System (IPS) feature that
could allow an unauthenticated, remote attacker to cause a reload of an affected device if specific
Cisco IOS IPS configurations exist.
could allow an unauthenticated, remote attacker to cause a reload of an affected device if specific
Cisco IOS IPS configurations exist.
Cisco has released free software updates that address this vulnerability.
Workarounds that mitigate this vulnerability are available.
This advisory is available at the following link:
Open Caveats for Cisco IOS Release 12.4(24)GC4
This section lists open caveats in the Cisco IOS Release 12.4(24)GC4:
•
CSCua68693
When the composite link cost changes due to changes reported by the radio on a Cisco 3250 MAR,
OSPFv3 sends out LSA updates with the changed cost even though the cost is still within the defined
hysteresis threshold.
OSPFv3 sends out LSA updates with the changed cost even though the cost is still within the defined
hysteresis threshold.
Workaround: There is no workaround.
Closed Caveats for Cisco IOS Release 12.4(24)GC4
This section lists closed caveats in the Cisco IOS Release 12.4(24)GC4:
•
CSCtb29889
OSPFv3 may get stuck in the Database Exchange state, which prevents routing updates from being
propagated. The problem will only occur with large OSPFv3 LSA databases.
propagated. The problem will only occur with large OSPFv3 LSA databases.
Workaround: There is no workaround.
•
CSCth03022
Multiple vulnerabilities exist in the Session Initiation Protocol (SIP) implementation in Cisco IOS
Software and Cisco IOS XE Software that could allow an unauthenticated, remote attacker to cause
a reload of an affected device or trigger memory leaks that may result in system instabilities.
Affected devices would need to be configured to process SIP messages for these vulnerabilities to
be exploitable.
Software and Cisco IOS XE Software that could allow an unauthenticated, remote attacker to cause
a reload of an affected device or trigger memory leaks that may result in system instabilities.
Affected devices would need to be configured to process SIP messages for these vulnerabilities to
be exploitable.
Cisco has released free software updates that address these vulnerabilities. There are no
workarounds for devices that must run SIP; however, mitigations are available to limit exposure to
the vulnerabilities.
workarounds for devices that must run SIP; however, mitigations are available to limit exposure to
the vulnerabilities.
This advisory is posted at
.
•
CSCtj41194
Cisco IOS Software contains a vulnerability in the IP version 6 (IPv6) protocol stack
implementation that could allow an unauthenticated, remote attacker to cause a reload of an affected
device that has IPv6 enabled. The vulnerability may be triggered when the device processes a
malformed IPv6 packet.
implementation that could allow an unauthenticated, remote attacker to cause a reload of an affected
device that has IPv6 enabled. The vulnerability may be triggered when the device processes a
malformed IPv6 packet.
Cisco has released free software updates that address this vulnerability. There are no workarounds
to mitigate this vulnerability.
to mitigate this vulnerability.
This advisory is posted at
.