Cisco Cisco IOS Software Release 12.4(2)XB6 發佈版本通知
7
Release Notes for the Cisco Broadband Wireless Gateway 2.3 for Cisco IOS Release 12.4(24)YG3
OL-21495-03
Caveats
•
CSCsd34855
The VTP feature in certain versions of Cisco IOS software is vulnerable to a locally-exploitable
buffer-overflow condition. This might result in the execution of arbitrary code. On September 13,
2006 Phenoelit Group posted an advisory containing the following vulnerabilities:
buffer-overflow condition. This might result in the execution of arbitrary code. On September 13,
2006 Phenoelit Group posted an advisory containing the following vulnerabilities:
–
VTP Version field DoS
–
Integer Wrap in VTP revision
–
Buffer Overflow in VTP VLAN name
These vulnerabilities are addressed by the following Cisco IDs:
–
CSCsd52629/CSCsd34759 — VTP version field DoS
–
CSCse40078/CSCse47765 — Integer Wrap in VTP revision
–
CSCsd34855/CSCei54611 — Buffer Overflow in VTP VLAN name
An advisory on these vulnerabilities is posted at:
To work around this issue, reload the card explicitly either from SUP or from LCP.
Resolved Caveats
The following caveats were resolved in BWG 2.3 for Cisco IOS Release 12.4(24)YG3:
•
CSCtg69847
In BWG 2.2, BWG disconnected new session while the AAA request was to disconnect a previous
session. This occurred when the AAA server had more than one session ID for the same user, but
only one session was active on BWG.
session. This occurred when the AAA server had more than one session ID for the same user, but
only one session was active on BWG.
This scenario typically occurs when the following conditions are met:
1. An authentication, authorization, and accounting (AAA) server allows more than one session ID
for the same user.
for the same user.
2. The customer premises equipment (CPE) disconnects the session before getting the IP address,
and the session remains in the AAA server.
and the session remains in the AAA server.
3. The CPE establishes the connection again and gets a new session ID.
4. The new session is active in the BWG and this is the only session from the CPE.
•
CSCth67670
When an AAA server is enabled on a BWG, memory leak was observed in processor pool caused by
the RADIUS, UGW Path Mgmt, and EAP Framework processes.
the RADIUS, UGW Path Mgmt, and EAP Framework processes.
•
CSCtg09217
One or more processors in a SAMI card reported a data path health-monitoring failure to an IXP2800
on a SAMI card and the card got reloaded. A message similar to “PLATFORM-1-DP_HM_FAIL:
Failed to receive response from IXP1” was displayed.
on a SAMI card and the card got reloaded. A message similar to “PLATFORM-1-DP_HM_FAIL:
Failed to receive response from IXP1” was displayed.
If a standby Cisco Gateway GPRS Support Node (GGSN) was configured, the standby GGSN took
over as ACTIVE.
over as ACTIVE.