Cisco Cisco IOS Software Release 12.2(13)ZF
11
Release Notes for the Cisco 1700 Series Routers for Cisco IOS Release 12.2(13)ZF
OL-3897-03
Caveats
Note
If you have an account with Cisco.com, you can also use the Bug Toolkit to find select caveats of any
severity. To reach the Bug Toolkit, log in toCisco.com and click Service & Support: Technical
Assistance Center: Tool Index: Bug Toolkit. Another option is to go to
severity. To reach the Bug Toolkit, log in toCisco.com and click Service & Support: Technical
Assistance Center: Tool Index: Bug Toolkit. Another option is to go to
.
Resolved Caveats for Release 12.2(13)ZF2
Cisco IOS Release 12.2(13)ZF2 is a rebuild release for Cisco IOS Release 12.2(13)ZF. This section
describes unexpected behavior that is fixed in Release 12.2(13)ZF2.
describes unexpected behavior that is fixed in Release 12.2(13)ZF2.
CSCdz71127
Cisco routers and switches running Cisco IOS software and configured to process Internet Protocol
version 4 (IPv4) packets are vulnerable to a Denial of Service (DoS) attack. A rare sequence of crafted
IPv4 packets sent directly to the device may cause the input interface to stop processing traffic once the
input queue is full. No authentication is required to process the inbound packet. Processing of IPv4
packets is enabled by default. Devices running only IP version 6 (IPv6) are not affected. A workaround
is available.
version 4 (IPv4) packets are vulnerable to a Denial of Service (DoS) attack. A rare sequence of crafted
IPv4 packets sent directly to the device may cause the input interface to stop processing traffic once the
input queue is full. No authentication is required to process the inbound packet. Processing of IPv4
packets is enabled by default. Devices running only IP version 6 (IPv6) are not affected. A workaround
is available.
Cisco has made software available, free of charge, to correct the problem.
This advisory is available at
CSCea02355
Cisco routers and switches running Cisco IOS software and configured to process Internet Protocol
version 4 (IPv4) packets are vulnerable to a Denial of Service (DoS) attack. A rare sequence of crafted
IPv4 packets sent directly to the device may cause the input interface to stop processing traffic once the
input queue is full. No authentication is required to process the inbound packet. Processing of IPv4
packets is enabled by default. Devices running only IP version 6 (IPv6) are not affected. A workaround
is available.
version 4 (IPv4) packets are vulnerable to a Denial of Service (DoS) attack. A rare sequence of crafted
IPv4 packets sent directly to the device may cause the input interface to stop processing traffic once the
input queue is full. No authentication is required to process the inbound packet. Processing of IPv4
packets is enabled by default. Devices running only IP version 6 (IPv6) are not affected. A workaround
is available.
Cisco has made software available, free of charge, to correct the problem.
This advisory is available at
Open Caveats for Release 12.2(13)ZF
The following sections lists the open caveats for the Cisco IOS release 12.2(13)ZF.
CSCea33219
The throughput of the tx-ring size 1 feature on the Cisco 1700 router XDSL interface decreases when
the pack latency is reduced.
the pack latency is reduced.