Cisco Cisco Aironet 1400 Wireless Bridge 릴리즈 노트

다운로드
페이지 9
 
7
Release Notes for Cisco Aironet 1410 Bridges for Cisco IOS Release 12.3(2)JA5
OL-8220-01
Caveats
Telnet Session Sometimes Hangs or Will Not Start During Heavy Traffic
When the bridge is transmitting and receiving heavy traffic, you sometimes cannot start a Telnet session 
and some existing Telnet sessions freeze or hang. However, this behavior is expected because the bridge 
gives top priority to data traffic and a lower priority to Telnet traffic.
Caveats
This section lists open and resolved caveats in Cisco IOS Release 12.3(2)JA for the bridge and resolved 
caveats in Cisco IOS Release 12.3(2)JA and 12.3(2)JA5.
Open Caveats
These caveats are open in Cisco IOS Release 12.3(2)JA for the bridge:
CSCec78900—High CPU use sometimes slows throughput on bridges.
Resolved Caveats in Cisco IOS Release 12.3(2)JA5
The following caveat is resolved in Cisco IOS Release 12.3(2)JA5:
CSCei61732
Cisco IOS may permit arbitrary code execution after exploitation of a heap-based buffer overflow 
vulnerability. Cisco has included additional integrity checks in its software, as further described 
below, that are intended to reduce the likelihood of arbitrary code execution.
Cisco has made free software available that includes the additional integrity checks for affected 
customers.
This advisory is posted at 
.
CSCei76358—Through normal software maintenance processes, Cisco is removing depreciated 
functionality. These changes have no impact on system operation or feature availability.
Resolved Caveats in Cisco IOS Release 12.3(2)JA
These caveats are resolved in Cisco IOS Release 12.3(2)JA:
CSCef60659, CSCsa59600—A document that describes how the Internet Control Message Protocol 
(ICMP) could be used to perform a number of Denial of Service (DoS) attacks against the 
Transmission Control Protocol (TCP) has been made publicly available. This document has been 
published through the Internet Engineering Task Force (IETF) Internet Draft process, and is entitled 
“ICMP Attacks Against TCP” (draft-gont-tcpm-icmp-attacks-03.txt).
These attacks, which only affect sessions terminating or originating on a device itself, can be of 
three types: