Cisco Cisco IOS Software Releases 12.2 MC 發佈版本通知
12
Release Notes for Cisco MWR 1941-DC Mobile Wireless Edge Router for Cisco IOS Release 12.2(15)MC2e
OL-13984-13
Caveats in Cisco IOS Release 12.2(15)MC2e
More details can be found in the security advisory which is posted at:
•
CSCef36231
Description: A Hot Standby Routing Protocol (HSRP) tracking configuration is not accepted when
you re-enter the configuration after you first delete it.
you re-enter the configuration after you first delete it.
This symptom is observed on a Cisco router that runs Cisco IOS Release 12.2S or Release 12.3T.
Workaround: Configure interface tracking by entering the track 100 interface e2/3 line-protocol
command. Then, set the HSRP group to track the tracking object number by entering the standby 1
track 100 command.
command. Then, set the HSRP group to track the tracking object number by entering the standby 1
track 100 command.
•
CSCef46191
Description: A specifically crafted Transmission Control Protocol (TCP) connection to a telnet or
reverse telnet port of a Cisco device running Internetwork Operating System (IOS) may block
further telnet, reverse telnet, Remote Shell (RSH), Secure Shell (SSH), and in some cases Hypertext
Transport Protocol (HTTP) access to the Cisco device. Telnet, reverse telnet, RSH and SSH sessions
established prior to exploitation are not affected.
reverse telnet port of a Cisco device running Internetwork Operating System (IOS) may block
further telnet, reverse telnet, Remote Shell (RSH), Secure Shell (SSH), and in some cases Hypertext
Transport Protocol (HTTP) access to the Cisco device. Telnet, reverse telnet, RSH and SSH sessions
established prior to exploitation are not affected.
All other device services will operate normally.
User initiated specially crafted TCP connection to a telnet or reverse telnet port results in blocking
further telnet sessions. Whereas, services such as packet forwarding, routing protocols and all other
communication to and through the device remains unaffected.
further telnet sessions. Whereas, services such as packet forwarding, routing protocols and all other
communication to and through the device remains unaffected.
More details can be found in the security advisory which is posted at:
http://www.cisco.com/warp/public/707/cisco-sa-20040827-telnet.shtml
•
CSCef68324
Description: Cisco Internetwork Operating System (IOS) Software is vulnerable to a Denial of
Service (DoS) attack and potentially an arbitrary code execution attack from a specifically crafted
IPv6 packet. The packet must be sent from a local network segment. Only devices that have been
explicitly configured to process IPv6 traffic are affected. Upon successful exploitation, the device
may reload or be open to further exploitation.
Service (DoS) attack and potentially an arbitrary code execution attack from a specifically crafted
IPv6 packet. The packet must be sent from a local network segment. Only devices that have been
explicitly configured to process IPv6 traffic are affected. Upon successful exploitation, the device
may reload or be open to further exploitation.
Cisco has made free software available to address this vulnerability for all affected customers.
More details can be found in the security advisory which is posted at:
http://www.cisco.com/warp/public/707/cisco-sa-20050729-ipv6.shtml
•
CSCeg60667
Description: In an active router, the relays are closed and the revertive interface should be in the
ADMINDOWN state. However, when the interface is brought up, the command standby
use-interface loopback 102 revertive is re-issued. This is causing an issue with Hot Standby
Routing Protocol (HSRP) as the difference of HSRP priorities between the active and standby
routers is no longer 5 but 10. As a result, a router swap will not occur when a single interface goes
down.
ADMINDOWN state. However, when the interface is brought up, the command standby
use-interface loopback 102 revertive is re-issued. This is causing an issue with Hot Standby
Routing Protocol (HSRP) as the difference of HSRP priorities between the active and standby
routers is no longer 5 but 10. As a result, a router swap will not occur when a single interface goes
down.
This situation occurs when re-configuring the redundancy command which brings up revertive int
lo102.
lo102.
Workaround: Manually shut the interface down if it is re-configured.