Cisco Cisco IOS Software Release 12.4(23)
![Cisco](https://files.manualsbrain.com/attachments/7380d0050044647c30f5c24bbbf5d0c0b6d9bb84/common/fit/150/50/faa183d287233c52228cfea3dbc2a127fe780f60564fcb0955d9c3d1cd23/brand_logo.png)
433
Caveats for Cisco IOS Release 12.4
OL-7656-15 Rev. J0
Resolved Caveats—Cisco IOS Release 12.4(10b)
Conditions: This symptom occurs when MGCP receives a modification request from PGW for echo
cancellation three seconds after the call is established.
cancellation three seconds after the call is established.
Workaround: There is no workaround.
•
CSCsg15598
The Intrusion Prevention System (IPS) feature set of Cisco IOS contains several vulnerabilities.
These include:
These include:
–
Fragmented IP packets may be used to evade signature inspection.
–
IPS signatures utilizing the regular expression feature of the ATOMIC.TCP signature engine
may cause a router to crash resulting in a denial of service.
may cause a router to crash resulting in a denial of service.
There are mitigations and workarounds for these vulnerabilities. Cisco has made free software
available to address these vulnerabilities for affected customers.
available to address these vulnerabilities for affected customers.
This advisory is posted at:
•
CSCsg16908
Multiple vulnerabilities exist in the Cisco IOS File Transfer Protocol (FTP) Server feature. These
vulnerabilities include Denial of Service, improper verification of user credentials and the ability to
read or write any file in the device’s filesystem, including the device’s saved configuration, which
may include passwords or other sensitive information.
vulnerabilities include Denial of Service, improper verification of user credentials and the ability to
read or write any file in the device’s filesystem, including the device’s saved configuration, which
may include passwords or other sensitive information.
The Cisco IOS FTP Server is an optional service that is disabled by default. Devices that are not
specifically configured to enable the Cisco IOS FTP Server service are unaffected by these
vulnerabilities.
specifically configured to enable the Cisco IOS FTP Server service are unaffected by these
vulnerabilities.
This vulnerability does not apply to the Cisco IOS FTP Client feature.
This advisory is posted at
.
•
CSCsg18933
Symptoms: A RIP route is learned from a RIP neighbor via a dialer interface (or other virtual
interface type). When the neighbor disconnects and the interface goes down, the RIP route is
removed from the RIP database. However, the RIP route remains in the routing table.
interface type). When the neighbor disconnects and the interface goes down, the RIP route is
removed from the RIP database. However, the RIP route remains in the routing table.
Conditions:
–
RIP is configured with the no validate-update-source command.
–
RIP routes are learned via a virtual interface.
–
The virtual interface is using a negotiated address.
–
The problem is platform-independent.
Workaround: Use the clear ip route command to remove the affected routes from the routing table.
•
CSCsg28628
Symptoms: NAS pkg asynchronous calls fail after a redundancy switchover has occurred, and the
following error message is generated:
following error message is generated:
Modems unavailable
Conditions: This symptom is observed on a Cisco AS5850 that functions in RPR+ mode. This
situation may impact service.
situation may impact service.
Workaround: There is no workaround to prevent the symptom from occurring. When the symptom
has occurred, enter the redundancy switchover command a couple of times to restore the
Cisco AS5850 to normal operation.
has occurred, enter the redundancy switchover command a couple of times to restore the
Cisco AS5850 to normal operation.