Cisco Cisco Aironet 1400 Wireless Bridge 릴리즈 노트

다운로드
페이지 5
 
4
Release Notes for Cisco Aironet 1410 Wireless Bridges for Cisco IOS Release 12.3(11)JA4
OL-14264-01
  Caveats
Resolved Caveats
These caveats are resolved in Cisco IOS Release 12.3(11)JA4:
CSCsh58082—When receiving a series of packets destined for port 5060, Cisco devices running an 
affected version of IOS that supports Session Initiation Protocol (SIP) may be required to reload the 
device. This issue is compounded by a related bug that allows traffic to TCP 5060 and UDP port 
5060 on devices not configured for SIP. 
CSCsi78162—A router that has the SNA Switch feature enabled can generate several messages 
along with tracebacks.
CSCsj16292—After an upgrade to 12.2(18)SXF9, the following message is displayed:
%DATACORRUPTION-1-DATAINCONSISTENCY: copy error-Traceback= 
CSCsj18014—The caller ID is received with extra characters.
CSCsj44081—Cisco IOS Software has been enhanced with the introduction of additional software 
checks to signal improper use of data structures. This feature has been introduced in select Cisco 
IOS Software releases published after April 5, 2007.
Details: The %DATACORRUPTION-1-DATAINCONSISTENCY error message is preceded by a 
timestamp: May 17 10:01:27.815 UTC: %DATACORRUPTION-1-DATAINCONSISTENCY: copy 
error. The error message is then followed by a traceback.
CSCse56501—A device running Cisco IOS software that has Internet Protocol version 6 (IPv6) 
enabled may be subject to a denial of service (DoS) attack. For the device to be affected by this 
vulnerability the device also has to have certain Internet Protocol version 4 (IPv4) User Datagram 
Protocol (UDP) services enabled. To exploit this vulnerability an offending IPv6 packet must be 
targeted to the device. Packets that are routed throughout the router can not trigger this vulnerability. 
Successful exploitation will prevent the interface from receiving any additional traffic. The only 
exception is Resource Reservation Protocol (RSVP) service, which if exploited, will cause the 
device to crash. Only the interface on which the vulnerability was exploited will be affected.
Cisco is providing fixed software to address this issue. There are workarounds available to mitigate 
the effects of the vulnerability.
This advisory is posted at 
If You Need More Information
If you need information about a specific caveat that does not appear in these release notes, you can use 
the Cisco Bug Toolkit to find select caveats of any severity. Click this URL to browse to the Bug Toolkit:
(If you request a defect that cannot be displayed, the defect number might not exist, the defect might not 
yet have a customer-visible description, or the defect might be marked Cisco Confidential.)