Cisco Cisco IOS Software Release 12.0 S 릴리즈 노트
1033
Cross-Platform Release Notes for Cisco IOS Release 12.0S
OL-1617-14 Rev. Q0
Resolved Caveats—Cisco IOS Release 12.0(29)S
TCP/IP Host-Mode Services
•
CSCed78149
A document that describes how the Internet Control Message Protocol (ICMP) could be used to
perform a number of Denial of Service (DoS) attacks against the Transmission Control Protocol
(TCP) has been made publicly available. This document has been published through the Internet
Engineering Task Force (IETF) Internet Draft process, and is entitled “ICMP Attacks Against TCP”
(draft-gont-tcpm-icmp-attacks-03.txt).
perform a number of Denial of Service (DoS) attacks against the Transmission Control Protocol
(TCP) has been made publicly available. This document has been published through the Internet
Engineering Task Force (IETF) Internet Draft process, and is entitled “ICMP Attacks Against TCP”
(draft-gont-tcpm-icmp-attacks-03.txt).
These attacks, which only affect sessions terminating or originating on a device itself, can be of
three types:
three types:
1.
Attacks that use ICMP “hard” error messages.
2.
Attacks that use ICMP “fragmentation needed and Don’t Fragment (DF) bit set” messages, also
known as Path Maximum Transmission Unit Discovery (PMTUD) attacks.
known as Path Maximum Transmission Unit Discovery (PMTUD) attacks.
3.
Attacks that use ICMP “source quench” messages.
Successful attacks may cause connection resets or reduction of throughput in existing connections,
depending on the attack type.
depending on the attack type.
Multiple Cisco products are affected by the attacks described in this Internet draft.
Cisco has made free software available to address these vulnerabilities. In some cases there are
workarounds available to mitigate the effects of the vulnerability.
workarounds available to mitigate the effects of the vulnerability.
This advisory is posted at
The disclosure of these vulnerabilities is being coordinated by the National Infrastructure Security
Coordination Centre (NISCC), based in the United Kingdom. NISCC is working with multiple
vendors whose products are potentially affected.
Coordination Centre (NISCC), based in the United Kingdom. NISCC is working with multiple
vendors whose products are potentially affected.
Resolved Caveats—Cisco IOS Release 12.0(29)S
All the caveats listed in this section are resolved in Cisco IOS Release 12.0(29)S. This section describes
only severity 1, severity 2, and select severity 3 caveats.
only severity 1, severity 2, and select severity 3 caveats.
Basic System Services
•
CSCdx55178
Symptoms: Difficulties may occur when you attempt to remotely log in to a Cisco router that
supports ATM. After you have established a virtual terminal connection to the system, the following
user access verification sequence may be displayed, and the connection terminated:
supports ATM. After you have established a virtual terminal connection to the system, the following
user access verification sequence may be displayed, and the connection terminated:
Password:
Password:
Password:
% Bad passwords
Conditions: This symptom is observed on a Cisco router that support ATM when an interactive ATM
ping is terminated abnormally.
ping is terminated abnormally.
Workaround: Instead of using an interactive ATM ping, enter the ping atm interface atm interface
vpi vci [seg-loopback | end-loopback] [repeat [timeout]] privileged EXEC command.
vpi vci [seg-loopback | end-loopback] [repeat [timeout]] privileged EXEC command.