Cisco Cisco IOS Software Release 12.4(23)

Page de 610
602
Caveats for Cisco IOS Release 12.4
OL-7656-15 Rev. J0
  Resolved Caveats—Cisco IOS Release 12.4(7c)
(951/33),process = VOIP_RTCP. 
-Traceback= 0x60EA5A78 0x60EA5C5C 0x614AD39C 0x614B55BC 0x614B59A0
Alternatively, the router may unexpectedly reload and generate the following error message and 
traceback:
%SYS-2-WATCHDOG: Process aborted on watchdog timeout, process = VOIP_RTCP. -
Traceback= 0x60EA5A58 0x60EA5C5C 0x614AD39C 0x614B55BC 0x614B59A0
%Software-forced reload
Preparing to dump core...
Conditions: This symptom is observed on a Cisco router that receives a badly formatted RTP Control 
Protocol (RTCP) packet.
Workaround: There is no workaround.
Further Problem Description: Typically, the badly formatted RTCP packet is produced by a device 
that does not conform to the RFC 3550 standard. 
CSCse68138
Multiple voice-related vulnerabilities are identified in Cisco IOS software, one of which is also 
shared with Cisco Unified Communications Manager. These vulnerabilities pertain to the following 
protocols or features:
Session Initiation Protocol (SIP) 
Media Gateway Control Protocol (MGCP) 
Signaling protocols H.323, H.254 
Real-time Transport Protocol (RTP) 
Facsimile reception 
Cisco has made free software available to address these vulnerabilities for affected customers. Fixed 
Cisco IOS software listed in the Software Versions and Fixes section contains fixes for all 
vulnerabilities mentioned in this advisory.
There are no workarounds available to mitigate the effects of any of the vulnerabilities apart from 
disabling the protocol or feature itself. 
This advisory is posted at 
CSCse68355
Multiple voice-related vulnerabilities are identified in Cisco IOS software, one of which is also 
shared with Cisco Unified Communications Manager. These vulnerabilities pertain to the following 
protocols or features:
Session Initiation Protocol (SIP) 
Media Gateway Control Protocol (MGCP) 
Signaling protocols H.323, H.254 
Real-time Transport Protocol (RTP) 
Facsimile reception 
Cisco has made free software available to address these vulnerabilities for affected customers. Fixed 
Cisco IOS software listed in the Software Versions and Fixes section contains fixes for all 
vulnerabilities mentioned in this advisory.
There are no workarounds available to mitigate the effects of any of the vulnerabilities apart from 
disabling the protocol or feature itself.