Примечания к выпуску для Cisco Cisco Aironet 1310 Access Point Bridge
13
Release Notes for Cisco Aironet 1300 Series Outdoor Access Point/Bridge for Cisco IOS Release 12.3(7)JA
OL-8060-01
Caveats
There are no workarounds available to mitigate the effects of any of the vulnerabilities apart from
disabling the protocol or feature itself.
disabling the protocol or feature itself.
This advisory is posted at
.
•
CSCeb52431—When logging into a TACACS+ server, access points sometimes send hundreds of
additional authentication requests to the server after a successful authentication.
additional authentication requests to the server after a successful authentication.
•
CSCeh42053—Access point/bridge no longer shows dot11radio 0 enabled.
•
CSCeh42504—When VLANs are configured and the radio interface goes down, the traceback
INTERFACE_ACE_API-3-NOADDSUBBLOCK no longer displays.
INTERFACE_ACE_API-3-NOADDSUBBLOCK no longer displays.
•
CSCeh65538 (duplicate of CSCei09772)—Access point/bridge now accepts associations after a
traffic burst.
traffic burst.
•
CSCei09744—The access point/bridge roams within specifications.
•
CSCei09772—The access point/bridge no longer shuts down the radio interface after roaming.
•
CSCsb06824—Open authentication is no longer added to an EAP SSID when a non-root bridge
configuration is loaded.
configuration is loaded.
•
CSCsb12321—The access point bridge table is now correct when a workgroup bridge roams.
•
CSCsb14224—Reverse ARP now works on all VLANs.
•
CSCsb26690—The access point/bridge no longer crashes when more than 20 devices are associated.
•
CSCsb31323, CSCsa98906—In non-root bridge or workgroup bridge mode, the access point/bridge
no longer requires an infrastructure SSID.
no longer requires an infrastructure SSID.
•
CSCsa53019—Access point/bridge experiences UDP traffic performance problem when using WEP
Cisco has been unable to reproduce this caveat.
•
CSCsa54608—The Cisco IOS Firewall Authentication Proxy for FTP and/or Telnet Sessions feature
in specific versions of Cisco IOS software is vulnerable to a remotely-exploitable buffer overflow
condition.
in specific versions of Cisco IOS software is vulnerable to a remotely-exploitable buffer overflow
condition.
Devices that do not support, or are not configured for Firewall Authentication Proxy for FTP and/or
Telnet Services are not affected.
Telnet Services are not affected.
Devices configured with only Authentication Proxy for HTTP and/or HTTPS are not affected.
Only devices running certain versions of Cisco IOS are affected.
Cisco has made free software available to address this vulnerability. There are workarounds
available to mitigate the effects of the vulnerability.
available to mitigate the effects of the vulnerability.
This advisory will be posted at
•
CSCeh88199—Critical temperature threshold established for access point/bridge.
•
CSCeh84137—Dot11 arp cache causes the access point/bridge to reload.
Cisco has been unable to reproduce this caveat.
•
CSCsa98961—dot11RetryCount SNMP counters now agree with the CLI.