Cisco Cisco IOS Software Release 12.4(2)XB6

Page de 32
 
12
Release Notes for Cisco 2691 and Cisco 2600XM Series Routers with Cisco IOS Release 12.4(11)XJ
OL-12255-02
  Caveats
CSCsg70474
Multiple voice-related vulnerabilities are identified in Cisco IOS software, one of which is also 
shared with Cisco Unified Communications Manager. These vulnerabilities pertain to the following 
protocols or features:
Session Initiation Protocol (SIP) 
Media Gateway Control Protocol (MGCP) 
Signaling protocols H.323, H.254 
Real-time Transport Protocol (RTP) 
Facsimile reception 
Cisco has made free software available to address these vulnerabilities for affected customers. Fixed 
Cisco IOS software listed in the Software Versions and Fixes section contains fixes for all 
vulnerabilities mentioned in this advisory.
There are no workarounds available to mitigate the effects of any of the vulnerabilities apart from 
disabling the protocol or feature itself. 
This advisory is posted at 
CSCsi01470
A vulnerability in the Cisco implementation of Multicast Virtual Private Network (MVPN) is 
subject to exploitation that can allow a malicious user to create extra multicast states on the core 
routers or receive multicast traffic from other Multiprotocol Label Switching (MPLS) based Virtual 
Private Networks (VPN) by sending specially crafted messages.
Cisco has released free software updates that address this vulnerability. Workarounds that mitigate 
this vulnerability are available.
This advisory is posted at 
.
CSCsi60004
Multiple voice-related vulnerabilities are identified in Cisco IOS software, one of which is also 
shared with Cisco Unified Communications Manager. These vulnerabilities pertain to the following 
protocols or features:
Session Initiation Protocol (SIP) 
Media Gateway Control Protocol (MGCP) 
Signaling protocols H.323, H.254 
Real-time Transport Protocol (RTP) 
Facsimile reception 
Cisco has made free software available to address these vulnerabilities for affected customers. Fixed 
Cisco IOS software listed in the Software Versions and Fixes section contains fixes for all 
vulnerabilities mentioned in this advisory.
There are no workarounds available to mitigate the effects of any of the vulnerabilities apart from 
disabling the protocol or feature itself. 
This advisory is posted at