Cisco Cisco IOS Software Release 12.2(27)SBC

Page de 284
10
Bugs for Cisco IOS Release 12.2(33)SB3 through 12.2(33)SB17
OL-9967-04 Rev. C1
  Open and Resolved Bugs
Workaround: Configure the client to authenticate using a different authentication protocol (CHAP, 
PAP, MS-CHAP, MS-CHAP-V2). 
CSCtz13818
Symptoms: In a rare situation when route-map (export-map) is updated, IOS is not sending refreshed 
updates to the peer.
Conditions: The symptom is observed when route-map (export-map) is configured under VRF and 
the route-map is updated with a new route-target. Then the IOS does not send refreshed updates with 
modified route-targets.
Workaround 1: Refresh the updated route-target to use clear ip route vrf vrf-name net mask.
Workaround 2: Hard clear the BGP session with the peer. 
CSCtz61815
Symptoms: After the PRE failover, the interfaces on SONET AUG/TUG controller on 
ESR-4OC3-CHSTM1 stay UP/DOWN and impact the traffic.
Conditions: This symptom occurs when users remove the AU-4-TUG-3 controller through no mode 
command and reconfigure the same followed by a PRE failover.
Workaround: Reconfigure the SONET controller or hw-mod reset the chstm card. 
CSCtz89608
Symptoms: A router that is operating in an ISG environment experiences a crash due to memory 
corruption.
Conditions: This symptom occurs within the SSS context.
Workaround: There is no workaround. 
CSCub75120
Symptoms: Traffic is not flowing after PRE switchover.
Conditions: This symptom is observed on PTA based PPPoE sessions with QinQ encapsulation.
Workaround: Clear all the sessions and re-establish the sessions. 
Resolved Bugs—Cisco IOS Release 12.2(33)SB12
Cisco IOS Release 12.2(33)SB12 is a rebuild release for Cisco IOS Release 12.2(33)SB. The bugs in this 
section are resolved in Cisco IOS Release 12.2(33)SB12 but may be open in previous Cisco IOS 
releases.
CSCtg47129
The Cisco IOS Software implementation of the virtual routing and forwarding (VRF) aware network 
address translation (NAT) feature contains a vulnerability when translating IP packets that could 
allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.
Cisco has released free software updates that address this vulnerability. Workarounds that mitigate 
this vulnerability are not available.
This advisory is available at the following link: