Cisco Cisco IOS Software Release 12.4(2)XB6

Page de 12
 
Release Notes for Cisco IOS Release 12.4(24)GC4
  Caveats
7
Release Notes for Cisco IOS Release 12.4(24)GC4
OL-24057-03
The following exceptions will result in an immediate update:
a down interface
a down route
any change in a metric triggered outside the scope of the VMI metric update.
Note
No recommended values other than default are currently available.
For more information on EIGRP commands, refer to the following URL: 
Caveats
Caveats describe unexpected behavior in Cisco IOS releases. Caveats listed as open in a prior release are 
carried forward to the next release as either open or resolved.
This section lists caveats in the Cisco IOS Release 12.4(24) images:
Open Caveats for Cisco IOS Release 12.4(24)GC4
Cisco IOS Release 12.4(24)GC4 has no open caveats.
Closed Caveats for Cisco IOS Release 12.4(24)GC4
This section lists closed caveats in the Cisco IOS Release 12.4(24)GC4:
CSCth03022
Multiple vulnerabilities exist in the Session Initiation Protocol (SIP) implementation in Cisco IOS 
Software and Cisco IOS XE Software that could allow an unauthenticated, remote attacker to cause 
a reload of an affected device or trigger memory leaks that may result in system instabilities. 
Affected devices would need to be configured to process SIP messages for these vulnerabilities to 
be exploitable.
Cisco has released free software updates that address these vulnerabilities. There are no 
workarounds for devices that must run SIP; however, mitigations are available to limit exposure to 
the vulnerabilities.
This advisory is posted at 
CSCtj41194
Cisco IOS Software contains a vulnerability in the IP version 6 (IPv6) protocol stack 
implementation that could allow an unauthenticated, remote attacker to cause a reload of an affected 
device that has IPv6 enabled. The vulnerability may be triggered when the device processes a 
malformed IPv6 packet.