Cisco Cisco Aironet 1200 Access Point 릴리즈 노트
19
Release Notes for Cisco Aironet Access Points for Cisco IOS Release 12.3(8)JEB
OL-11737-01
Caveats
•
CSCsf04754—Multiple Cisco products contain either of two authentication vulnerabilities in the
Simple Network Management Protocol version 3 (SNMPv3) feature. These vulnerabilities can be
exploited when processing a malformed SNMPv3 message. These vulnerabilities could allow the
disclosure of network information or may enable an attacker to perform configuration changes to
vulnerable devices. The SNMP server is an optional service that is disabled by default. Only
SNMPv3 is impacted by these vulnerabilities. Workarounds are available for mitigating the impact
of the vulnerabilities described in this document.
Simple Network Management Protocol version 3 (SNMPv3) feature. These vulnerabilities can be
exploited when processing a malformed SNMPv3 message. These vulnerabilities could allow the
disclosure of network information or may enable an attacker to perform configuration changes to
vulnerable devices. The SNMP server is an optional service that is disabled by default. Only
SNMPv3 is impacted by these vulnerabilities. Workarounds are available for mitigating the impact
of the vulnerabilities described in this document.
The United States Computer Emergency Response Team (US-CERT) has assigned Vulnerability
Note VU#878044 to these vulnerabilities.
Note VU#878044 to these vulnerabilities.
Common Vulnerabilities and Exposures (CVE) identifier CVE-2008-0960 has been assigned to
these vulnerabilities.
these vulnerabilities.
This advisory will be posted at
•
CSCsf22409—Fastethernet interface no longer stops processing entries on rx ring.
•
CSCse29487—Repeater to Repeater roaming no longer fails.
•
CSCsg26708—Access point no longer stops passing broadcast traffic from wired to wireless side.
•
CSCsg79644—1230 in workgroup bridge mode no longer stop broadcast and multicast traffic with
1310 access point/bridge.
1310 access point/bridge.
•
CSCsf18528—Unexpected SNMP traffic no longer causes 1200 series access point restart.
•
CSCsf07847—CDP no longer fails to discover neighbor information in releases.
•
CSCsc95298—Deauthentication reassociation messages now appear on event log.
•
CSCsh22776—Wireless client no longer fails to associate in WDS environment if EAP is configured
as optional.
as optional.
•
CSCsh62835—EAP-FAST no longer fails with local authentication & open source cards.
•
CSCsh83796—Repeater access point no longer loses association after re-configuring the
association mac-list.
association mac-list.
•
CSCsc88186—Non-root to non-root association for BR1310 now documented.
•
CSCsh52582—Association table in GUI and CLI will displays proper amount of characters.
•
CSCsh53511—1131 access point no longer loses connection with an Intel 3945 Wireless NIC.
•
CSCsc60071—ImportAP Authorization List into the doc has been clarified.
•
CSCsf95975—Access point no longer crashes when AeroScout server address is misconfigured.
•
CSCsf08775—EAP-FAST supplicant now operates properly with Steel Belt RADIUS server.
•
CSCsg99358—Traceback/crashes no longer occur in unconfigured VLAN.
•
CSCse95836—Access point no longer forwards invalid Ethernet frame length=0 over wireless.
•
CSCse84920—Access point no longer reloads to ROM with unknown system cause.
•
CSCse70031—Accounting record no longer uses MAC address for username with WPAv2.
•
CSCse72925—SNMP mib community-map engineID command no longer causes traceback on
access points.
access points.
•
CSCsd62772—Radius accounting start/stop records are now sent for associated client.
•
CSCek46852—EAP-FAST works with open source client and local radius.
•
CSCsg48579—no led display alternate CLI is now removed from the running configuration.