Cisco Cisco IOS Software Release 12.2(27)SBC

Page de 284
5
Bugs for Cisco IOS Release 12.2(33)SB3 through 12.2(33)SB17
OL-9967-04 Rev. C1
  Open and Resolved Bugs
Workaround: This has been observed on a ESR running Cisco IOS Release 12.2(33)SB15 but may 
affect other versions. 
CSCul07133
Symptom: A Cisco C10k router might experience a PRE switchover caused due to multiple PXF 
failures on the active PRE. 
Conditions: This may be seen on a Cisco C10K router with multiple BGP neighborships as well as 
huge number of virtual-access sessions being churned out in the network. 
Workaround: There is no workaround. 
Resolved Bugs—Cisco IOS Release 12.2(33)SB15
CSCua40273
Symptoms: The ASR1k crashes when displaying MPLS VPN MIB information.
Conditions: Occurs on the ASR1K with version 15.1(02)S software.
Workaround: Avoid changing the VRF while querying for MIB information. 
CSCud24977
Symptom: Crashes are observed on Cisco ISG ASR device. 
Conditions: Customer experienced this crash and the same crash was seen in ES special image 
asr1000rp2-adventerprisek9.V152_1_S1_CSCTY21366_2.bin in Cisco IOS Release 15.2(1)S2.
Workaround: There is no workaround. 
CSCud31424
Symptom: Missing forwarding for the VRF traffic after the PXF crash. 
Conditions: This behavior is observed following the PXF crash. 
Workaround: Shut/no shut on all PVC of VRF impacted. 
CSCui22578
Symptom: One or more Atm vcs go to down state during IOS upgrade from Cisco IOS Release 
12.2(33)SB10 to a test image based on the same version. 
Conditions: The issue happens only if the redundancy mode configured is RPRPLUS. The issue is 
also seen with the image in Cisco IOS Release 12.2(33)SB14.
Workaround: Removing and reconfiguring the affected ATM vcs subinterface solves the issue. Fix 
is available form Cisco IOS Release 12.2(33)SB15.
CSCug34485
Symptom: Multiple Cisco products are affected by a vulnerability involving the Open Shortest Path 
First (OSPF) Routing Protocol Link State Advertisement (LSA) database. This vulnerability could 
allow an unauthenticated attacker to take full control of the OSPF Autonomous System (AS) domain 
routing table, blackhole traffic, and intercept traffic.
Condition: The attacker could trigger this vulnerability by injecting crafted OSPF packets. 
Successful exploitation could cause flushing of the routing table on a targeted router, as well as 
propagation of the crafted OSPF LSA type 1 update throughout the OSPF AS domain.
To exploit this vulnerability, an attacker must accurately determine certain parameters within the 
LSA database on the target router. This vulnerability can only be triggered by sending crafted 
unicast or multicast LSA type 1 packets. No other LSA type packets can trigger this vulnerability.