Cisco Cisco IOS Software Release 12.4(23)
378
Caveats for Cisco IOS Release 12.4
OL-7656-15 Rev. J0
Resolved Caveats—Cisco IOS Release 12.4(12b)
•
CSCsg59326
Symptoms: When an ATM (that is, a cash machine, not a WAN platform) is connected to a switch
service module, significant packet loss may occur.
service module, significant packet loss may occur.
Conditions: This symptom is observed on a Cisco 2800 series router.
Workaround: Change the Ethernet speed to 10 Mbps at both ends.
•
CSCsg70474
Multiple voice-related vulnerabilities are identified in Cisco IOS software, one of which is also
shared with Cisco Unified Communications Manager. These vulnerabilities pertain to the following
protocols or features:
shared with Cisco Unified Communications Manager. These vulnerabilities pertain to the following
protocols or features:
–
Session Initiation Protocol (SIP)
–
Media Gateway Control Protocol (MGCP)
–
Signaling protocols H.323, H.254
–
Real-time Transport Protocol (RTP)
–
Facsimile reception
Cisco has made free software available to address these vulnerabilities for affected customers. Fixed
Cisco IOS software listed in the Software Versions and Fixes section contains fixes for all
vulnerabilities mentioned in this advisory.
Cisco IOS software listed in the Software Versions and Fixes section contains fixes for all
vulnerabilities mentioned in this advisory.
There are no workarounds available to mitigate the effects of any of the vulnerabilities apart from
disabling the protocol or feature itself.
disabling the protocol or feature itself.
This advisory is posted at
•
CSCsg78414
Symptoms: A sweep ping with a size of 4571 bytes may fail.
Conditions: This symptom is observed on a Cisco 7500 series when an ATM-IMA interface is
configured with an MTU size of 7000 bytes.
configured with an MTU size of 7000 bytes.
Workaround: There is no workaround.
•
CSCsg96319
Symptoms: Anyone can have unprivileged Telnet access to a system without being authenticated,
when a reverse SSH session is established with valid authentication credentials. This only affects
reverse SSH sessions where a connection is made with the command ssh -l userid:number ip-
address command.
when a reverse SSH session is established with valid authentication credentials. This only affects
reverse SSH sessions where a connection is made with the command ssh -l userid:number ip-
address command.
Conditions: This symptom has been seen only when Reverse SSH Enhancement is used. This
enhancement is documented at the following URL:
enhancement is documented at the following URL:
Workaround: Configure reverse SSH with the ip ssh port portno rotary rotarygroup command. This
configuration is explained at the following URL:
configuration is explained at the following URL:
•
CSCsh33430
Symptoms: A traceback may occur in an HSRP function and the platform may reload unexpectedly.