Cisco Cisco Aironet 1200 Access Point 릴리즈 노트
24
Release Notes for Cisco Aironet Access Points for Cisco IOS Release 12.3(8)JA
OL-8237-01
Troubleshooting
Cisco has made free software available to address this vulnerability for affected customers.This
advisory is posted at
advisory is posted at
.
•
CSCsc16644—ARP table is subject to overflow
A vulnerability exists in Cisco Aironet Wireless Access Points (AP) running IOS which may allow
a malicious user to send a crafted attack via IP address Resolution Protocol (ARP) to the Access
point which will cause the device to stop passing traffic and/or drop user connections. Repeated
exploitation of this vulnerability will create a sustained DoS (denial of service).
a malicious user to send a crafted attack via IP address Resolution Protocol (ARP) to the Access
point which will cause the device to stop passing traffic and/or drop user connections. Repeated
exploitation of this vulnerability will create a sustained DoS (denial of service).
Cisco has made free software available to address this vulnerability for affected customers. There
are workarounds available to mitigate the effects of the vulnerability. This advisory is posted at
are workarounds available to mitigate the effects of the vulnerability. This advisory is posted at
•
CSCsc17882—WGB clients associations on a root access point no longer keep disassociating every
5 seconds
5 seconds
This caveat is duplicated by CSCsc21903 and CSCsc26853.
•
CSCsc38132—FIPS: random_gen_32bit is replaced by crypto_rng
FIPS needs continuous test for all the random number generators. Since random_gen_32bit is not
tested, it is replaced by crypto_rng wherever called on the access point
tested, it is replaced by crypto_rng wherever called on the access point
•
CSCsc41779—FIPS CCM test result is now passed to test client
•
CSCsc57550—Channels in W52 band can now be configured manually
•
CSCsd44941—2.4GHz radios in some 1130 and 1240 access points produced after 1/23/2006 no
longer disassociates clients
longer disassociates clients
If You Need More Information
If you need information about a specific caveat that does not appear in these release notes, you can use
the Cisco Bug Toolkit to find select caveats of any severity. Click this URL to browse to the Bug Toolkit:
the Cisco Bug Toolkit to find select caveats of any severity. Click this URL to browse to the Bug Toolkit:
(If you request a defect that cannot be displayed, the defect number might not exist, the defect might not
yet have a customer-visible description, or the defect might be marked Cisco Confidential.)
yet have a customer-visible description, or the defect might be marked Cisco Confidential.)
Troubleshooting
For the most up-to-date, detailed troubleshooting information, refer to the Cisco TAC website at
. Click Technology Support, choose Wireless
from the menu on the left, and click Wireless LAN.