Cisco Cisco IOS Software Release 12.2

Page de 242
 
293
Caveats for Cisco IOS Release 12.2
OL-3513-16 Rev. G0
  Resolved Caveats—Cisco IOS Release 12.2(13e);  IP Routing Protocols
Resolved Caveats—Cisco IOS Release 12.2(13e)
Cisco IOS Release 12.2(13e) is a rebuild release for Cisco IOS Release 12.2(13). The caveats in this 
section are resolved in Cisco IOS Release 12.2(13e) but may be open in previous Cisco IOS releases.
IP Routing Protocols
CSCed28873
Cisco products running IOS contain vulnerabilities in the processing of H.323 messages, which are 
typically used in packetized voice or multimedia applications. Features such as NAT and IOS 
Firewall must inspect H.323 messages and may be vulnerable as well. A test suite has been 
developed by the University of Oulu to target this protocol and identify vulnerabilities. 
Support for the H.323 protocol was introduced in Cisco IOS Software Release 11.3T, and all later 
Cisco IOS releases are affected if configured for various types of Voice/Multimedia Application 
support. The vulnerabilities can be exploited repeatedly to produce a denial of service (DoS).
There are workarounds available that may mitigate the impact, but these techniques may not be 
appropriate for use in all customer networks.
This advisory is available at
Miscellaneous
CSCdx76632
Symptoms: A Cisco AS5300 that is functioning as a voice gateway may reload because of an 
incoming bus error exception.
Conditions: This symptom is observed on a Cisco AS5300 that is running Cisco IOS Release 
12.2(6d). 
Workaround: There is no workaround. 
CSCdx77253
Cisco products running IOS contain vulnerabilities in the processing of H.323 messages, which are 
typically used in packetized voice or multimedia applications. Features such as NAT and IOS 
Firewall must inspect H.323 messages and may be vulnerable as well. A test suite has been 
developed by the University of Oulu to target this protocol and identify vulnerabilities.
Support for the H.323 protocol was introduced in Cisco IOS Software Release 11.3T, and all later 
Cisco IOS releases are affected if configured for various types of Voice/Multimedia Application 
support. The vulnerabilities can be exploited repeatedly to produce a denial of service (DoS).
There are workarounds available that may mitigate the impact, but these techniques may not be 
appropriate for use in all customer networks.
This advisory is available at