Cisco Cisco IOS Software Release 12.4(2)XB6
Release Notes for Cisco IOS Release 12.4(24)GC4
Caveats
7
Release Notes for Cisco IOS Release 12.4(24)GC4
OL-24057-03
•
The following exceptions will result in an immediate update:
–
a down interface
–
a down route
–
any change in a metric triggered outside the scope of the VMI metric update.
Note
No recommended values other than default are currently available.
For more information on EIGRP commands, refer to the following URL:
Caveats
Caveats describe unexpected behavior in Cisco IOS releases. Caveats listed as open in a prior release are
carried forward to the next release as either open or resolved.
carried forward to the next release as either open or resolved.
This section lists caveats in the Cisco IOS Release 12.4(24) images:
•
•
•
•
•
Open Caveats for Cisco IOS Release 12.4(24)GC4
Cisco IOS Release 12.4(24)GC4 has no open caveats.
Closed Caveats for Cisco IOS Release 12.4(24)GC4
This section lists closed caveats in the Cisco IOS Release 12.4(24)GC4:
•
CSCth03022
Multiple vulnerabilities exist in the Session Initiation Protocol (SIP) implementation in Cisco IOS
Software and Cisco IOS XE Software that could allow an unauthenticated, remote attacker to cause
a reload of an affected device or trigger memory leaks that may result in system instabilities.
Affected devices would need to be configured to process SIP messages for these vulnerabilities to
be exploitable.
Software and Cisco IOS XE Software that could allow an unauthenticated, remote attacker to cause
a reload of an affected device or trigger memory leaks that may result in system instabilities.
Affected devices would need to be configured to process SIP messages for these vulnerabilities to
be exploitable.
Cisco has released free software updates that address these vulnerabilities. There are no
workarounds for devices that must run SIP; however, mitigations are available to limit exposure to
the vulnerabilities.
workarounds for devices that must run SIP; however, mitigations are available to limit exposure to
the vulnerabilities.
This advisory is posted at
.
•
CSCtj41194
Cisco IOS Software contains a vulnerability in the IP version 6 (IPv6) protocol stack
implementation that could allow an unauthenticated, remote attacker to cause a reload of an affected
device that has IPv6 enabled. The vulnerability may be triggered when the device processes a
malformed IPv6 packet.
implementation that could allow an unauthenticated, remote attacker to cause a reload of an affected
device that has IPv6 enabled. The vulnerability may be triggered when the device processes a
malformed IPv6 packet.