Cisco Cisco TelePresence Video Communication Server Expressway 릴리즈 노트
Resolved caveats
Cisco TelePresence Video Communication Server X7.2.4 Software Release Notes
Page 26 of 50
Identifier
Summary
Workaround: Upgrade to Cisco VCS X7.2.x
Additional Information: Cisco VCS version X7.2.x runs Apache version 2.4.2 which resolves
these issues.
Additional Information: Cisco VCS version X7.2.x runs Apache version 2.4.2 which resolves
these issues.
Resolved in X7.1
Identifier
Summary
CSCtt13556
When a new policy service is created or modified its status defaults to Active:
Symptom: when a policy service is created or modified its status defaults to Active. It can
remain as Active for 30 seconds - long enough to convince the user that it really is active, even
if it subsequently fails.
Workaround: after creating or modifying a policy service, wait 30 seconds and then refresh the
policy services page.
Symptom: when a policy service is created or modified its status defaults to Active. It can
remain as Active for 30 seconds - long enough to convince the user that it really is active, even
if it subsequently fails.
Workaround: after creating or modifying a policy service, wait 30 seconds and then refresh the
policy services page.
CSCtx34916
Duplicate of CSCtx34918.
CSCtr80175
Cisco VCS Starter Pack Express and remote authentication of login account credentials
requires lower case usernames: when setting up user (FindMe) accounts you must enter the
account usernames in lower case. If usernames are created with mixed or upper case the user
will not be able to log in to the Cisco VCS. Note that passwords are case sensitive.
This issue applies only if you have a Cisco VCS Starter Pack Express and are using remote
(LDAP) authentication of login account credentials.
requires lower case usernames: when setting up user (FindMe) accounts you must enter the
account usernames in lower case. If usernames are created with mixed or upper case the user
will not be able to log in to the Cisco VCS. Note that passwords are case sensitive.
This issue applies only if you have a Cisco VCS Starter Pack Express and are using remote
(LDAP) authentication of login account credentials.
CSCtr37987
During normal operation the system temp alarm got raised on the VCS but didn't clear:
The user might see the following in the /var/log/messages:
hwstatus: Event="Application Crash" Detail="Traceback (most recent call last):, File
'/bin/hwstatus.py'
The user might see the following in the /var/log/messages:
hwstatus: Event="Application Crash" Detail="Traceback (most recent call last):, File
'/bin/hwstatus.py'
CSCtr80189
Viewing web pages with IE8 in compatibility mode: there are display problems with the
Cisco VCS web interface when viewing web pages with IE8 in compatibility mode. The
workaround is to switch off IE8 compatibility mode.
Cisco VCS web interface when viewing web pages with IE8 in compatibility mode. The
workaround is to switch off IE8 compatibility mode.
CSCtr77658
Cisco VCS sends SIP INFO for content channel without stream ID: when interworking calls
from H.323 to SIP, Fast Update Requests do not contain a stream ID.
from H.323 to SIP, Fast Update Requests do not contain a stream ID.
CSCtx71406
Symptoms: Make an interworked call from an H.323 MCU 4.3 to Movi and send some content
to Movi. Then from the participants list page disable content to Movi. Movi continues to display
content but the content freezes at the point of disabling.
If instead of disabling content via the MCU web interface, you actually stop sending content
from the endpoint, then Movi stops showing content correctly.
Both cases work when using an interworked E20 instead of Movi though.
Conditions: MCU 4.3 H.323 Movi.
Workaround: None.
to Movi. Then from the participants list page disable content to Movi. Movi continues to display
content but the content freezes at the point of disabling.
If instead of disabling content via the MCU web interface, you actually stop sending content
from the endpoint, then Movi stops showing content correctly.
Both cases work when using an interworked E20 instead of Movi though.
Conditions: MCU 4.3 H.323 Movi.
Workaround: None.
CSCtq73481
SSH configuration allows for port forwarding:
Symptoms: SSH configuration allows port forwarding to be enabled.
Conditions: none.
Workaround: ensure that SSH access to VCS is only available to trusted users.
PSIRT Evaluation: the Cisco PSIRT has assigned this bug the following CVSS version 2
score. The Base and Temporal CVSS scores as of the time of evaluation are 1.4/1.3:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=
1&version=2&vector=AV:L/AC:L/Au:M/C:N/I:P/A:N/E:F/RL:U/RC:C
No CVE ID has been assigned to this issue.
Additional information on Cisco's security vulnerability policy can be found at the following
URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
Symptoms: SSH configuration allows port forwarding to be enabled.
Conditions: none.
Workaround: ensure that SSH access to VCS is only available to trusted users.
PSIRT Evaluation: the Cisco PSIRT has assigned this bug the following CVSS version 2
score. The Base and Temporal CVSS scores as of the time of evaluation are 1.4/1.3:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=
1&version=2&vector=AV:L/AC:L/Au:M/C:N/I:P/A:N/E:F/RL:U/RC:C
No CVE ID has been assigned to this issue.
Additional information on Cisco's security vulnerability policy can be found at the following
URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
CSCtw53707
The VCS contains an experimental section that is disabled by default but can be enabled if one
knows the password. It is a violation of the Product Security Baseline to have hidden
commands. This experimental interface should either be enabled for everyone or removed
knows the password. It is a violation of the Product Security Baseline to have hidden
commands. This experimental interface should either be enabled for everyone or removed