Cisco Cisco Aironet 1200 Access Point
10
Release Notes for Cisco Aironet 1100, 1130, 1200, 1230, 1240, and 1300 Series Access Points for Cisco IOS Release 12.3(11)JX1
OL-10752-02
Caveats
Resolved Caveats in Cisco IOS Release 12.3(11)JX1
•
CSCse64027—LWAPP-enabled IOS access points joined to a controller running software release
3.2.150.6 or 4.0.155.0 may disconnect and reconnect every 120 hours when the access point's
heartbeat timer is set to the default value of 30 seconds. When the heartbeat timer is set to a smaller
value (such as 10 seconds), the disconnect occurs more frequently (such as every 40 hours). While
the access point is disconnected from the controller, clients are unable to associate to this access
point.
3.2.150.6 or 4.0.155.0 may disconnect and reconnect every 120 hours when the access point's
heartbeat timer is set to the default value of 30 seconds. When the heartbeat timer is set to a smaller
value (such as 10 seconds), the disconnect occurs more frequently (such as every 40 hours). While
the access point is disconnected from the controller, clients are unable to associate to this access
point.
Resolved Caveats in Cisco IOS Release 12.3(11)JX
•
CSCek26492—Symptoms: A router may crash if it receives a packet with a specific crafted IP
option as detailed in Cisco Security Advisory: Crafted IP Option Vulnerability:
option as detailed in Cisco Security Advisory: Crafted IP Option Vulnerability:
Conditions: This DDTS resolves a symptom of CSCec71950. Cisco IOS with this specific DDTS
are not at risk of crash if CSCec71950 has been resolved in the software.
are not at risk of crash if CSCec71950 has been resolved in the software.
Workaround: Cisco IOS versions with the fix for CSCec71950 are not at risk for this issue and no
workaround is required. If CSCec71950 is not resolved, see the following Cisco Security Advisory:
Crafted IP Option Vulnerability for workaround information:
workaround is required. If CSCec71950 is not resolved, see the following Cisco Security Advisory:
Crafted IP Option Vulnerability for workaround information:
•
CSCek37177—The Cisco IOS Transmission Control Protocol (TCP) listener in certain versions of
Cisco IOS software is vulnerable to a remotely-exploitable memory leak that may lead to a denial
of service condition.
Cisco IOS software is vulnerable to a remotely-exploitable memory leak that may lead to a denial
of service condition.
This vulnerability only applies to traffic destined to the Cisco IOS device. Traffic transiting the
Cisco IOS device will not trigger this vulnerability.
Cisco IOS device will not trigger this vulnerability.
Cisco has made free software available to address this vulnerability for affected customers.
This issue is documented as Cisco bug ID
CSCek37177
.
There are workarounds available to mitigate the effects of the vulnerability.
This advisory is posted at
•
CSCsd85747—When an access point sends out a discovery broadcast and receives responses from
two controllers, it now attempts to join the second controller if it fails to join the first.
two controllers, it now attempts to join the second controller if it fails to join the first.
If You Need More Information
If you need information about a specific caveat that does not appear in these release notes, you can use
the Cisco Bug Toolkit to find select caveats of any severity. Click this URL to browse to the Bug Toolkit:
the Cisco Bug Toolkit to find select caveats of any severity. Click this URL to browse to the Bug Toolkit:
(If you request a defect that cannot be displayed, the defect number might not exist, the defect might not
yet have a customer-visible description, or the defect might be marked Cisco Confidential.)
yet have a customer-visible description, or the defect might be marked Cisco Confidential.)