Cisco Cisco IOS Software Release 12.4(23) 릴리즈 노트
424
Caveats for Cisco IOS Release 12.4
OL-7656-15 Rev. J0
Resolved Caveats—Cisco IOS Release 12.4(10c)
•
CSCsh94526
Symptoms: When an acct-stop message is received for a non-RADIUS proxy user (that is, a normal
IP user), a router that is configured for SSG crashes.
IP user), a router that is configured for SSG crashes.
Conditions: This symptom is observed when SSG is configured for RADIUS proxy mode and when
the ssg wlan reconnect command is enabled.
the ssg wlan reconnect command is enabled.
Workaround: There is no workaround.
•
CSCsh97579
Cisco devices running affected versions of Cisco IOS Software are vulnerable to a denial of service
(DoS) attack if configured for IP tunnels and Cisco Express Forwarding.
(DoS) attack if configured for IP tunnels and Cisco Express Forwarding.
Cisco has released free software updates that address this vulnerability.
This advisory is posted at
.
•
CSCsi01470
A vulnerability in the Cisco implementation of Multicast Virtual Private Network (MVPN) is
subject to exploitation that can allow a malicious user to create extra multicast states on the core
routers or receive multicast traffic from other Multiprotocol Label Switching (MPLS) based Virtual
Private Networks (VPN) by sending specially crafted messages.
subject to exploitation that can allow a malicious user to create extra multicast states on the core
routers or receive multicast traffic from other Multiprotocol Label Switching (MPLS) based Virtual
Private Networks (VPN) by sending specially crafted messages.
Cisco has released free software updates that address this vulnerability. Workarounds that mitigate
this vulnerability are available.
this vulnerability are available.
This advisory is posted at
.
•
CSCsi27540
Symptoms: A VSI session may become stuck in the “RESYNC_UNDERWAY” state, preventing
LVC connections from being set up. This situation is not cleared automatically, and error messages
are not flushed, as is shown in the output of the show controller vsi session command.
LVC connections from being set up. This situation is not cleared automatically, and error messages
are not flushed, as is shown in the output of the show controller vsi session command.
Conditions: This symptom is observed on a Cisco router that functions as a Label Switch Controller
(LSC).
(LSC).
Workaround: There is no workaround.
•
CSCsi60004
Multiple voice-related vulnerabilities are identified in Cisco IOS software, one of which is also
shared with Cisco Unified Communications Manager. These vulnerabilities pertain to the following
protocols or features:
shared with Cisco Unified Communications Manager. These vulnerabilities pertain to the following
protocols or features:
–
Session Initiation Protocol (SIP)
–
Media Gateway Control Protocol (MGCP)
–
Signaling protocols H.323, H.254
–
Real-time Transport Protocol (RTP)
–
Facsimile reception
Cisco has made free software available to address these vulnerabilities for affected customers. Fixed
Cisco IOS software listed in the Software Versions and Fixes section contains fixes for all
vulnerabilities mentioned in this advisory.
Cisco IOS software listed in the Software Versions and Fixes section contains fixes for all
vulnerabilities mentioned in this advisory.
There are no workarounds available to mitigate the effects of any of the vulnerabilities apart from
disabling the protocol or feature itself.
disabling the protocol or feature itself.
This advisory is posted at