Cisco Cisco Aironet 1200 Access Point 릴리즈 노트

다운로드
페이지 18
 
15
Release Notes for Cisco Aironet 350, 1100, and 1200 Series Access Points for Cisco IOS Release 12.2(13)JA4
OL-5847-01
Caveats
Resolved Caveats
These caveats are resolved in Cisco IOS Release 12.2(13)JA4:
CSCdz32659—Memory allocation failure (MALLOCFAIL) messages no longer occur for Cisco 
Discovery Protocol (CDP) processes.
CSCed27956—
A vulnerability in the Transmission Control Protocol (TCP) specification (RFC793) has been 
discovered by an external researcher. The successful exploitation enables an adversary to reset any 
established TCP connection in a much shorter time than was previously discussed publicly. 
Depending on the application, the connection may get automatically re-established. In other cases, 
a user will have to repeat the action (for example, open a new Telnet or SSH session). Depending 
upon the attacked protocol, a successful attack may have additional consequences beyond 
terminated connection which must be considered. This attack vector is only applicable to the 
sessions which are terminating on a device (such as a router, switch, or computer) and not to the 
sessions that are only passing through the device (for example, transit traffic that is being routed by 
a router). In addition, this attack vector does not directly compromise data integrity or 
confidentiality. 
All Cisco products which contain TCP stack are susceptible to this vulnerability. 
This advisory is available at 
 
and it describes this vulnerability as it applies to Cisco products that run Cisco IOS® software. 
A companion advisory that describes this vulnerability for products that do not run Cisco IOS 
software is available at 
CSCed38527—
A vulnerability in the Transmission Control Protocol (TCP) specification (RFC793) has been 
discovered by an external researcher. The successful exploitation enables an adversary to reset any 
established TCP connection in a much shorter time than was previously discussed publicly. 
Depending on the application, the connection may get automatically re-established. In other cases, 
a user will have to repeat the action (for example, open a new Telnet or SSH session). Depending 
upon the attacked protocol, a successful attack may have additional consequences beyond 
terminated connection which must be considered. This attack vector is only applicable to the 
sessions which are terminating on a device (such as a router, switch, or computer) and not to the 
sessions that are only passing through the device (for example, transit traffic that is being routed by 
a router). In addition, this attack vector does not directly compromise data integrity or 
confidentiality. 
All Cisco products which contain TCP stack are susceptible to this vulnerability. 
This advisory is available at 
 
and it describes this vulnerability as it applies to Cisco products that run Cisco IOS® software. 
A companion advisory that describes this vulnerability for products that do not run Cisco IOS 
software is available at 
CSCed40563—Problems with the CDP protocol have been resolved.