Cisco Cisco IOS Software Release 15.0(1)M

Página de 248
159
OL-20799-01 Rev. L0
Caveats
CSCtl87067
Symptoms: Priority class will drop traffic before explicit police rate is reached.
Conditions: This symptom is observed on Cisco ISR platforms when strict priority with explicit 
police is configured.
Workaround: There is no workaround. 
CSCtl87879
Symptoms: MGCP calls fail as the DTMF detection and reporting via NTFY message does not 
occur.
Conditions: This symptom is observed in Cisco IOS Release 12.4(24)T5 but not in Cisco IOS 
Release 12.4(24)T4
Workaround: There is no workaround. 
CSCtl92014
Symptoms: After a reprompt element, “enumerate”, using internal variables like _prompt or _dmtf, 
no longer produces a valid list of options and repeats the last option.
Conditions: This symptom occurs when running Cisco IOS Release 12.4(15)T and later releases.
Workaround: There is no workaround. 
CSCtn22523
Symptoms: IPSLA udp-jitter probes may crash at saaAddSeqnoDupQ in Cisco IOS 
Release 12.4T/15.0M. There is no impact to other releases.
Conditions: This symptom is observed when the network experiences delay, and reordered and 
duplicate packets can trigger this problem when IPSLA udp-jitter is scheduled.
Workaround: Disable udp-jitter probes. 
Resolved Caveats—Cisco IOS Release 15.0(1)M4
Cisco IOS Release 15.0(1)M4 is a rebuild release for Cisco IOS Release 15.0(1)M. The caveats in this 
section are resolved in Cisco IOS Release 15.0(1)M4 but may be open in previous Cisco IOS releases.
CSCso02147
The Cisco IOS Software network address translation (NAT) feature contains multiple denial of 
service (DoS) vulnerabilities in the translation of the following protocols:
NetMeeting Directory (Lightweight Directory Access Protocol, LDAP)
Session Initiation Protocol (Multiple vulnerabilities)
H.323 protocol
All the vulnerabilities described in this document are caused by packets in transit on the affected 
devices when those packets require application layer translation.
Cisco has released free software updates that address these vulnerabilities.
This advisory is posted at
CSCso20810
Symptoms: A buffer leak may occur when a router is configured with the combination of NAT, 
multicast and encryption. Occurs when multicast subsequently flows out a crypto-enabled interface.