Cisco Cisco IPS 4255 Sensor

Pagina di 40
   
37
Release Notes for Cisco Intrusion Prevention System 6.0(3)E1
OL-20145-01
    Caveats
Caveats
This section lists the caveats, and contains the following topics:
Bug Toolkit
For the most complete and up-to-date list of caveats, use the Bug Toolkit to refer to the caveat release 
note. You can use the Bug Toolkit to search for known bugs based on software version, feature set, and 
keywords. The resulting matrix shows when each bug was integrated, or fixed if applicable. It also lets 
you save the results of a search in Bug Groups, and also create persistent Alert Agents that can feed those 
groups with new defect alerts. 
Note
You must be logged in to Cisco.com to access the Bug Toolkit.
If you are a registered Cisco.com user, you can view the Bug Toolkit at this URL:
To become a registered cisco.com user, go to this URL:
Resolved Caveats
The following known issues have been resolved in Cisco IPS 6.0(3)E.1: 
CSCsj03856—Upgrade from 6.0(1)E1 to IPS-K9-6.0-2-E1.7.pkg missing policies conf.
CSCsi58602—IPS evasion using Unicode encoding for HTTP-based attacks +
CSCsi42159—IPS mainapp memory leak due to SNMP
Known Caveats
The following known issues are found in Cisco IPS 6.0(3)E.1: 
CSCeh12238H225 sig 12505 subsig 5 is not alarming
CSCse40651—Config operation on heavily loaded system may cause unresponsive system
CSCsg09619—IPS accepts RSA keys with exponent 3 which are vulnerable to forgery
CSCsg21826—CISCO-CIDS-MIB v3.5 does not have denyPacket and blockHost defined
CSCsg24632—String.TCP sigs may fire out of order
CSCsg38169—IPS SNMP interface reports incorrect sensing interface stats
CSCsg96871—AnalysisEngine InspectorServiceAICWeb::ToServiceInspect abort
CSCsh05168—sensorApp fault during oversubscribed, heavily fragmented traffic input