Примечания к выпуску для Cisco Cisco Content Security Management Appliance M380

Скачать
Страница из 12
 
9
Release Notes for AsyncOS 8.1.1 for Cisco Content Security Management
 
  Resolved Issues
Resolved Issues in Release 8.1.1-031
There are no bug fixes in this release. 
This release is required for compatibility with certain releases of AsyncOS for Web Security appliances. 
For compatible releases, see 
Resolved Issues in Release 8.1.1-013 
Table 2
Resolved Issues in Release 8.1.1
Description
CSCuf52204
Tracking results with unusual UTF Subjects causes memory exceptions
CSCuf56294
Appfault occurs when try to select Authorized Groups on SOCKS Policy
CSCuf82028
SMA is unusably slow when using ICCM with lots of WSAs
CSCug69245
All centralized services show errors on System Status page after upgrade
CSCug76474
Decryption policy with global identity disabled on import to Configuration Master 7.7
CSCug90456
LDAPS is unusable after upgrade
CSCuh24749
Reflected Cross Site Scripting Vulnerability
CSCuh24755
Stored Cross Site Scripting
CSCuh38818
SMA with SSHv1 key loses connectivity to WSA/ESA after upgrade to 8.x
CSCui83063
SNMP sends incorrect OID values for traps
CSCzv28496
deleterecipients based on Centralized Policy Quarantines release host not working 
Table 3
Resolved Issues in Release 8.1.0
Old Defect ID  New Defect ID Description 
CSCzv81712
Fixed: IronPort Spam Quarantine (ISQ) Denial of Service Vulnerability
A vulnerability in the appliance could have allowed an unauthenticated, remote attacker to 
cause multiple critical processes to become unresponsive, resulting in a denial of service 
condition. 
For more information, see the Cisco security advisory at 
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130626-sm
a
CSCzv78669
Fixed: Management Graphical User Interface Denial of Service Vulnerability
A vulnerability in the appliance could have allowed an unauthenticated, remote attacker to 
cause multiple critical processes to become unresponsive, resulting in a denial of service 
condition. 
For more information, see the Cisco security advisory at 
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130626-sm
a.