Cisco Cisco Aironet 1310 Access Point Bridge 릴리즈 노트

다운로드
페이지 14
 
12
Release Notes for Cisco Aironet 1300 Series Outdoor Access Point/Bridge for Cisco IOS Release 12.3(7)JA5
OL-14262-01
  Caveats
Caveats
This section lists open caveats for the access point/bridge.
Open Caveats
This caveat is open in Cisco IOS Release 12.3(7)JA, 12.3(7)JA1, 12.3(7)JA2, and 12.3(7)JA5 for the 
access point/bridge:
CSCsb29038—A 1310 with integrated antenna shows diversity options on GUI.
The GUI shows the diversity options even though diversity is not supported on integrated antenna 
configurations. If the user configures diversity, an HTTP error 404 displays when attempting to 
apply the change.
Resolved Caveats
These caveats are resolved in Cisco IOS Release 12.3(7)JA5:
CSCsf04754—Multiple Cisco products contain either of two authentication vulnerabilities in the 
Simple Network Management Protocol version 3 (SNMPv3) feature. These vulnerabilities can be 
exploited when processing a malformed SNMPv3 message. These vulnerabilities could allow the 
disclosure of network information or may enable an attacker to perform configuration changes to 
vulnerable devices. The SNMP server is an optional service that is disabled by default. Only 
SNMPv3 is impacted by these vulnerabilities. Workarounds are available for mitigating the impact 
of the vulnerabilities described in this document. 
The United States Computer Emergency Response Team (US-CERT) has assigned Vulnerability 
Note VU#878044 to these vulnerabilities. 
Common Vulnerabilities and Exposures (CVE) identifier CVE-2008-0960 has been assigned to 
these vulnerabilities. 
This advisory is available at 
.
CSCsh58082—When receiving a series of packets destined for port 5060, Cisco devices running an 
affected version of IOS that supports Session Initiation Protocol (SIP) may be required to reload the 
device. This issue is compounded by a related bug that allows traffic to TCP 5060 and UDP port 
5060 on devices not configured for SIP. 
CSCsj44081—Cisco IOS Software has been enhanced with the introduction of additional software 
checks to signal improper use of data structures. This feature has been introduced in select Cisco 
IOS Software releases published after April 5, 2007.
Details: The %DATACORRUPTION-1-DATAINCONSISTENCY error message is preceded by a 
timestamp: May 17 10:01:27.815 UTC: %DATACORRUPTION-1-DATAINCONSISTENCY: copy 
error. The error message is then followed by a traceback.