Cisco Cisco IOS Software Release 12.4(23)

Page de 610
420
Caveats for Cisco IOS Release 12.4
OL-7656-15 Rev. J0
  Resolved Caveats—Cisco IOS Release 12.4(10c)
Conditions: This symptom is observed on a Cisco router that has an OSPFv3 IPSecv6 configuration.
Workaround: There is no workaround. To prevent the symptom from occurring, do not enter the 
show crypto socket command in an OSPFv3 IPSecv6 configuration. 
CSCek45344
Symptoms: A Cisco AS5400XM gateway crashes after 24 hour stress with E1-R2 calls.
Conditions: This symptom occurs in stress conditions after a period of 24 hours.
Workaround: There is no workaround. 
CSCek64789
Symptoms: A router that is configured as a voice gateway may crash because of a bus error. Just 
before the crash occurs, messages of the following type may be generated:
%ALIGN-1-FATAL: Corrupted program counter
Conditions: This symptom is observed on a Cisco 2811 that is configured as a Cisco Multiservice 
IP-to-IP Gateway (IPIPGW). However, the symptom is not platform-dependent.
Workaround: There is no workaround. 
CSCsd28214
Symptoms: A Cisco router may crash because of a watch dog timeout while running the RIP routing 
protocol.
Conditions: This symptom is observed on a router that runs Cisco IOS Release 12.3(19) when an 
interface changes state at the exact same time that a RIP route that was learned on this interface is 
being replaced with a better metric redistributed route. For example, when RIP has learned the 
192.168.1.0 network from Fast Ethernet 1/0 interface and then RIP learns the 192.168.1.0 network 
from a redistributed protocol that has a better metric, the RIP route is removed. However, when 
during this time the Fast Ethernet 1/0 interface goes down, the router may crash because of a watch 
dog timeout. Note that the symptom may also affect other releases.
Workaround: There is no workaround. 
CSCsd81407
Multiple voice-related vulnerabilities are identified in Cisco IOS software, one of which is also 
shared with Cisco Unified Communications Manager. These vulnerabilities pertain to the following 
protocols or features:
Session Initiation Protocol (SIP) 
Media Gateway Control Protocol (MGCP) 
Signaling protocols H.323, H.254 
Real-time Transport Protocol (RTP) 
Facsimile reception 
Cisco has made free software available to address these vulnerabilities for affected customers. Fixed 
Cisco IOS software listed in the Software Versions and Fixes section contains fixes for all 
vulnerabilities mentioned in this advisory.
There are no workarounds available to mitigate the effects of any of the vulnerabilities apart from 
disabling the protocol or feature itself. 
This advisory is posted at