Cisco Cisco IOS Software Release 12.4(23) 릴리즈 노트

다운로드
페이지 610
424
Caveats for Cisco IOS Release 12.4
OL-7656-15 Rev. J0
  Resolved Caveats—Cisco IOS Release 12.4(10c)
CSCsh94526
Symptoms: When an acct-stop message is received for a non-RADIUS proxy user (that is, a normal 
IP user), a router that is configured for SSG crashes.
Conditions: This symptom is observed when SSG is configured for RADIUS proxy mode and when 
the ssg wlan reconnect command is enabled.
Workaround: There is no workaround. 
CSCsh97579
Cisco devices running affected versions of Cisco IOS Software are vulnerable to a denial of service 
(DoS) attack if configured for IP tunnels and Cisco Express Forwarding.
Cisco has released free software updates that address this vulnerability.
This advisory is posted at 
.
CSCsi01470
A vulnerability in the Cisco implementation of Multicast Virtual Private Network (MVPN) is 
subject to exploitation that can allow a malicious user to create extra multicast states on the core 
routers or receive multicast traffic from other Multiprotocol Label Switching (MPLS) based Virtual 
Private Networks (VPN) by sending specially crafted messages.
Cisco has released free software updates that address this vulnerability. Workarounds that mitigate 
this vulnerability are available.
This advisory is posted at 
.
CSCsi27540
Symptoms: A VSI session may become stuck in the “RESYNC_UNDERWAY” state, preventing 
LVC connections from being set up. This situation is not cleared automatically, and error messages 
are not flushed, as is shown in the output of the show controller vsi session command.
Conditions: This symptom is observed on a Cisco router that functions as a Label Switch Controller 
(LSC).
Workaround: There is no workaround. 
CSCsi60004
Multiple voice-related vulnerabilities are identified in Cisco IOS software, one of which is also 
shared with Cisco Unified Communications Manager. These vulnerabilities pertain to the following 
protocols or features:
Session Initiation Protocol (SIP) 
Media Gateway Control Protocol (MGCP) 
Signaling protocols H.323, H.254 
Real-time Transport Protocol (RTP) 
Facsimile reception 
Cisco has made free software available to address these vulnerabilities for affected customers. Fixed 
Cisco IOS software listed in the Software Versions and Fixes section contains fixes for all 
vulnerabilities mentioned in this advisory.
There are no workarounds available to mitigate the effects of any of the vulnerabilities apart from 
disabling the protocol or feature itself. 
This advisory is posted at