Cisco Cisco Aironet 1310 Access Point Bridge 릴리즈 노트

다운로드
페이지 26
 
17
Release Notes for Cisco Aironet Access Points for Cisco IOS Release 12.3(8)JEA1
OL-12427-01
  Caveats
CSCsd62542—WPA(LEAP/EAP-FAST) reauthentication takes a long time and fails initially
Reauthentication fails initially and takes more than 45 seconds with LEAP and EAP-FAST 
authentication with WPA key management configured.
Resolved Caveats 
These caveats are resolved in Cisco IOS Release 12.3(8)JEA1:
CSCsb12598
Cisco IOS device may crash while processing malformed Secure Sockets Layer (SSL) packets. In 
order to trigger these vulnerabilities, a malicious client must send malformed packets during the SSL 
protocol exchange with the vulnerable device.
Successful repeated exploitation of any of these vulnerabilities may lead to a sustained 
Denial-of-Service (DoS); however, vulnerabilities are not known to compromise either the 
confidentiality or integrity of the data or the device. These vulnerabilities are not believed to allow 
an attacker will not be able to decrypt any previously encrypted information.
Cisco IOS is affected by the following vulnerabilities:
Processing ClientHello messages, documented as Cisco bug ID CSCsb12598 
Processing ChangeCipherSpec messages, documented as Cisco bug ID CSCsb40304 
Processing Finished messages, documented as Cisco bug ID CSCsd92405
Cisco has made free software available to address these vulnerabilities for affected customers. There 
are workarounds available to mitigate the effects of these vulnerabilities.
This advisory is posted at 
Note
Another related advisory has been posted with this advisory. This additional advisory also 
describes a vulnerability related to cryptography that affects Cisco IOS. This related advisory is 
available at the following link: 
.
CSCsb40304
Cisco IOS device may crash while processing malformed Secure Sockets Layer (SSL) packets. In 
order to trigger these vulnerabilities, a malicious client must send malformed packets during the SSL 
protocol exchange with the vulnerable device.
Successful repeated exploitation of any of these vulnerabilities may lead to a sustained 
Denial-of-Service (DoS); however, vulnerabilities are not known to compromise either the 
confidentiality or integrity of the data or the device. These vulnerabilities are not believed to allow 
an attacker will not be able to decrypt any previously encrypted information.
Cisco IOS is affected by the following vulnerabilities:
Processing ClientHello messages, documented as Cisco bug ID CSCsb12598 
Processing ChangeCipherSpec messages, documented as Cisco bug ID CSCsb40304 
Processing Finished messages, documented as Cisco bug ID CSCsd92405
Cisco has made free software available to address these vulnerabilities for affected customers. There 
are workarounds available to mitigate the effects of these vulnerabilities.