Cisco Cisco IOS Software Release 12.4(2)XB6

Page de 16
 
Release Notes for Cisco IOS Release 12.4(24)GC5
  Caveats
12
Release Notes for Cisco IOS Release 12.4(24)GC5
OL-24057-05
CSCtw55976
Cisco IOS Software contains a vulnerability in the Intrusion Prevention System (IPS) feature that 
could allow an unauthenticated, remote attacker to cause a reload of an affected device if specific 
Cisco IOS IPS configurations exist.
Cisco has released free software updates that address this vulnerability. 
Workarounds that mitigate this vulnerability are available.
This advisory is available at the following link: 
Open Caveats for Cisco IOS Release 12.4(24)GC4
This section lists open caveats in the Cisco IOS Release 12.4(24)GC4:
CSCua68693
When the composite link cost changes due to changes reported by the radio on a Cisco 3250 MAR, 
OSPFv3 sends out LSA updates with the changed cost even though the cost is still within the defined 
hysteresis threshold. 
Workaround: There is no workaround. 
Closed Caveats for Cisco IOS Release 12.4(24)GC4
This section lists closed caveats in the Cisco IOS Release 12.4(24)GC4:
CSCtb29889
OSPFv3 may get stuck in the Database Exchange state, which prevents routing updates from being 
propagated. The problem will only occur with large OSPFv3 LSA databases. 
Workaround: There is no workaround.
CSCth03022
Multiple vulnerabilities exist in the Session Initiation Protocol (SIP) implementation in Cisco IOS 
Software and Cisco IOS XE Software that could allow an unauthenticated, remote attacker to cause 
a reload of an affected device or trigger memory leaks that may result in system instabilities. 
Affected devices would need to be configured to process SIP messages for these vulnerabilities to 
be exploitable.
Cisco has released free software updates that address these vulnerabilities. There are no 
workarounds for devices that must run SIP; however, mitigations are available to limit exposure to 
the vulnerabilities.
This advisory is posted at 
CSCtj41194
Cisco IOS Software contains a vulnerability in the IP version 6 (IPv6) protocol stack 
implementation that could allow an unauthenticated, remote attacker to cause a reload of an affected 
device that has IPv6 enabled. The vulnerability may be triggered when the device processes a 
malformed IPv6 packet.
Cisco has released free software updates that address this vulnerability. There are no workarounds 
to mitigate this vulnerability.
This advisory is posted at
.