Cisco Cisco IOS Software Releases 12.2 MC 發佈版本通知

下载
页码 26
 
12
Release Notes for Cisco MWR 1941-DC Mobile Wireless Edge Router for Cisco IOS Release 12.2(15)MC2e
OL-13984-13
Caveats in Cisco IOS Release 12.2(15)MC2e
More details can be found in the security advisory which is posted at:
CSCef36231
Description: A Hot Standby Routing Protocol (HSRP) tracking configuration is not accepted when 
you re-enter the configuration after you first delete it.
This symptom is observed on a Cisco router that runs Cisco IOS Release 12.2S or Release 12.3T.
Workaround: Configure interface tracking by entering the track 100 interface e2/3 line-protocol 
command. Then, set the HSRP group to track the tracking object number by entering the standby 1 
track 100
 command.
CSCef46191
Description: A specifically crafted Transmission Control Protocol (TCP) connection to a telnet or 
reverse telnet port of a Cisco device running Internetwork Operating System (IOS) may block 
further telnet, reverse telnet, Remote Shell (RSH), Secure Shell (SSH), and in some cases Hypertext 
Transport Protocol (HTTP) access to the Cisco device. Telnet, reverse telnet, RSH and SSH sessions 
established prior to exploitation are not affected.
All other device services will operate normally.
User initiated specially crafted TCP connection to a telnet or reverse telnet port results in blocking 
further telnet sessions. Whereas, services such as packet forwarding, routing protocols and all other 
communication to and through the device remains unaffected.
More details can be found in the security advisory which is posted at:
http://www.cisco.com/warp/public/707/cisco-sa-20040827-telnet.shtml
CSCef68324
Description: Cisco Internetwork Operating System (IOS) Software is vulnerable to a Denial of 
Service (DoS) attack and potentially an arbitrary code execution attack from a specifically crafted 
IPv6 packet. The packet must be sent from a local network segment. Only devices that have been 
explicitly configured to process IPv6 traffic are affected. Upon successful exploitation, the device 
may reload or be open to further exploitation.
Cisco has made free software available to address this vulnerability for all affected customers.
More details can be found in the security advisory which is posted at:
http://www.cisco.com/warp/public/707/cisco-sa-20050729-ipv6.shtml
CSCeg60667
Description: In an active router, the relays are closed and the revertive interface should be in the 
ADMINDOWN state. However, when the interface is brought up, the command standby 
use-interface loopback 102 revertive
 is re-issued. This is causing an issue with Hot Standby 
Routing Protocol (HSRP) as the difference of HSRP priorities between the active and standby 
routers is no longer 5 but 10. As a result, a router swap will not occur when a single interface goes 
down.
This situation occurs when re-configuring the redundancy command which brings up revertive int 
lo102
.
Workaround: Manually shut the interface down if it is re-configured.