Cisco Cisco IOS Software Release 12.2
294
Caveats for Cisco IOS Release 12.2
OL-3513-16 Rev. G0
Resolved Caveats—Cisco IOS Release 12.2(13e); Miscellaneous
•
CSCea32240
Cisco products running IOS contain vulnerabilities in the processing of H.323 messages, which are
typically used in packetized voice or multimedia applications. Features such as NAT and IOS
Firewall must inspect H.323 messages and may be vulnerable as well. A test suite has been
developed by the University of Oulu to target this protocol and identify vulnerabilities.
typically used in packetized voice or multimedia applications. Features such as NAT and IOS
Firewall must inspect H.323 messages and may be vulnerable as well. A test suite has been
developed by the University of Oulu to target this protocol and identify vulnerabilities.
Support for the H.323 protocol was introduced in Cisco IOS Software Release 11.3T, and all later
Cisco IOS releases are affected if configured for various types of Voice/Multimedia Application
support. The vulnerabilities can be exploited repeatedly to produce a denial of service (DoS).
Cisco IOS releases are affected if configured for various types of Voice/Multimedia Application
support. The vulnerabilities can be exploited repeatedly to produce a denial of service (DoS).
There are workarounds available that may mitigate the impact, but these techniques may not be
appropriate for use in all customer networks.
appropriate for use in all customer networks.
This advisory is available at
•
CSCea33065
Cisco products running IOS contain vulnerabilities in the processing of H.323 messages, which are
typically used in packetized voice or multimedia applications. Features such as NAT and IOS
Firewall must inspect H.323 messages and may be vulnerable as well. A test suite has been
developed by the University of Oulu to target this protocol and identify vulnerabilities.
typically used in packetized voice or multimedia applications. Features such as NAT and IOS
Firewall must inspect H.323 messages and may be vulnerable as well. A test suite has been
developed by the University of Oulu to target this protocol and identify vulnerabilities.
Support for the H.323 protocol was introduced in Cisco IOS Software Release 11.3T, and all later
Cisco IOS releases are affected if configured for various types of Voice/Multimedia Application
support. The vulnerabilities can be exploited repeatedly to produce a denial of service (DoS).
Cisco IOS releases are affected if configured for various types of Voice/Multimedia Application
support. The vulnerabilities can be exploited repeatedly to produce a denial of service (DoS).
There are workarounds available that may mitigate the impact, but these techniques may not be
appropriate for use in all customer networks.
appropriate for use in all customer networks.
This advisory is available at
http://www.cisco.com/warp/public/707/cisco-sa-20040113-h323.shtml
.
•
CSCea36231
Cisco products running IOS contain vulnerabilities in the processing of H.323 messages, which are
typically used in packetized voice or multimedia applications. Features such as NAT and IOS
Firewall must inspect H.323 messages and may be vulnerable as well. A test suite has been
developed by the University of Oulu to target this protocol and identify vulnerabilities.
typically used in packetized voice or multimedia applications. Features such as NAT and IOS
Firewall must inspect H.323 messages and may be vulnerable as well. A test suite has been
developed by the University of Oulu to target this protocol and identify vulnerabilities.
Support for the H.323 protocol was introduced in Cisco IOS Software Release 11.3T, and all later
Cisco IOS releases are affected if configured for various types of Voice/Multimedia Application
support. The vulnerabilities can be exploited repeatedly to produce a denial of service (DoS).
Cisco IOS releases are affected if configured for various types of Voice/Multimedia Application
support. The vulnerabilities can be exploited repeatedly to produce a denial of service (DoS).
There are workarounds available that may mitigate the impact, but these techniques may not be
appropriate for use in all customer networks.
appropriate for use in all customer networks.
This advisory is available at
•
CSCea46342
Cisco products running IOS contain vulnerabilities in the processing of H.323 messages, which are
typically used in packetized voice or multimedia applications. Features such as NAT and IOS
Firewall must inspect H.323 messages and may be vulnerable as well. A test suite has been
developed by the University of Oulu to target this protocol and identify vulnerabilities.
typically used in packetized voice or multimedia applications. Features such as NAT and IOS
Firewall must inspect H.323 messages and may be vulnerable as well. A test suite has been
developed by the University of Oulu to target this protocol and identify vulnerabilities.
Support for the H.323 protocol was introduced in Cisco IOS Software Release 11.3T, and all later
Cisco IOS releases are affected if configured for various types of Voice/Multimedia Application
support. The vulnerabilities can be exploited repeatedly to produce a denial of service (DoS).
Cisco IOS releases are affected if configured for various types of Voice/Multimedia Application
support. The vulnerabilities can be exploited repeatedly to produce a denial of service (DoS).