Cisco Cisco IOS Software Release 12.2

Page de 292
69
Caveats for Cisco IOS Release 12.2
OL-3513-16 Rev. G0
  Resolved Caveats—Cisco IOS Release 12.2(27a)
Symptoms: A description of what is observed when the caveat occurs. 
Conditions: The conditions under which the caveat has been known to occur. 
Workaround: Solutions, if available, to counteract the caveat.
IP Routing Protocols
CSCeh13489
Symptoms: A router may reset its Border Gateway Protocol (BGP) session.
Conditions: This symptom is observed when a Cisco router that peers with other routers receives an 
Autonomous System (AS) path with a length that is equal to or greater than 255.
Workaround: Configure the bgp maxas limit command in such as way that the maximum length of 
the AS path is a value below 255. When the router receives an update with an excessive AS path 
value, the prefix is rejected and recorded the event in the log. 
Miscellaneous
CSCei61732
Cisco IOS may permit arbitrary code execution after exploitation of a heap-based buffer overflow 
vulnerability. Cisco has included additional integrity checks in its software, as further described 
below, that are intended to reduce the likelihood of arbitrary code execution.
Cisco has made free software available that includes the additional integrity checks for affected 
customers.
This advisory is posted at 
Resolved Caveats—Cisco IOS Release 12.2(27a)
Cisco IOS Release 12.2(27a) is a rebuild release for Cisco IOS Release 12.2(27). The caveats in this 
section are resolved in Cisco IOS Release 12.2(27a) but may be open in previous Cisco IOS releases.
The following information is provided for each caveat:
Symptoms: A description of what is observed when the caveat occurs. 
Conditions: The conditions under which the caveat has been known to occur. 
Workaround: Solutions, if available, to counteract the caveat.
IP Routing Protocols
CSCef60659
A document that describes how the Internet Control Message Protocol (ICMP) could be used to 
perform a number of Denial of Service (DoS) attacks against the Transmission Control Protocol 
(TCP) has been made publicly available. This document has been published through the Internet 
Engineering Task Force (IETF) Internet Draft process, and is entitled “ICMP Attacks Against TCP” 
(draft-gont-tcpm-icmp-attacks-03.txt).