Cisco Cisco Aironet 1400 Wireless Bridge
6
Release Notes for Cisco Aironet 1410 Bridges for Cisco IOS Release 12.3(4)JA1
OL-8219-01
Caveats
Caveats
This section lists open caveats in Cisco IOS Release 12.3(4)JA and and resolved caveats in Cisco IOS
Release 12/3(4)JA and 12.3(4)JA1.
Release 12/3(4)JA and 12.3(4)JA1.
Open Caveats
These caveats are open in Cisco IOS Release 12.3(4)JA:
•
CSCsa72936—The results for the show controller d0 command do not include the radio serial
number.
number.
Workaround: Enter show interface d0 mem 5fd4 12 in privileged EXEC mode and then do a
hexadecimal/ASCII conversion on the 12-byte result. This example shows the command and the
command output:
hexadecimal/ASCII conversion on the 12-byte result. This example shows the command and the
command output:
AP# sh int d0 mem 5fd4 12
5FD4: 4F46 3043 3338 4234 4831 004C
The 12-byte output converts to the ASCII serial number FOC0834B1HL.
Resolved Caveats in Cisco IOS Release 12.3(4)JA1
The following caveat is resolved in Cisco IOS Release 12.3(4)JA1:
•
CSCei61732
Cisco IOS may permit arbitrary code execution after exploitation of a heap-based buffer overflow
vulnerability. Cisco has included additional integrity checks in its software, as further described
below, that are intended to reduce the likelihood of arbitrary code execution.
vulnerability. Cisco has included additional integrity checks in its software, as further described
below, that are intended to reduce the likelihood of arbitrary code execution.
Cisco has made free software available that includes the additional integrity checks for affected
customers.
customers.
This advisory is posted at
.
•
CSCei76358—Through normal software maintenance processes, Cisco is removing depreciated
functionality. These changes have no impact on system operation or feature availability.
functionality. These changes have no impact on system operation or feature availability.
Resolved Caveats in Cisco IOS Release 12.3(4)JA
These caveats are resolved in Cisco IOS Release 12.3(4)JA:
•
CSCed36477—The CLI now warns users that bridges do not support different encryption settings
on multiple VLANs.
on multiple VLANs.
•
CSCef60659—A document that describes how the Internet Control Message Protocol (ICMP) could
be used to perform a number of Denial of Service (DoS) attacks against the Transmission Control
Protocol (TCP) has been made publicly available. This document has been published through the
Internet Engineering Task Force (IETF) Internet Draft process, and is entitled “ICMP Attacks
Against TCP” (draft-gont-tcpm-icmp-attacks-03.txt).
be used to perform a number of Denial of Service (DoS) attacks against the Transmission Control
Protocol (TCP) has been made publicly available. This document has been published through the
Internet Engineering Task Force (IETF) Internet Draft process, and is entitled “ICMP Attacks
Against TCP” (draft-gont-tcpm-icmp-attacks-03.txt).
These attacks, which only affect sessions terminating or originating on a device itself, can be of
three types:
three types: