Cisco Cisco IOS Software Release 12.4(2)XB6 發佈版本通知

下载
页码 18
 
8
Release Notes for the Cisco Broadband Wireless Gateway 2.3 for Cisco IOS Release 12.4(24)YG3
OL-21495-03
  Caveats
CSCtg99042 
The inter-BS handoff with WiMAX failed when BWG Release 2.x used inter-BS handoff where both 
the Serving Base Station (SBS) and Target Base Station (TBS) shared the same IP address. The SBS 
and TBS may share the same IP address when the SBS and TBS are different sectors of the same 
base station. The debug wimax agw command output showed that the Path Registration Request 
from the TBS is ignored.
Intersector controlled handoff was introduced in BWG 2.3.
CSCtg48937
BWG 2.2 sent duplicated WiMAX-BS-Id(46) in accounting stop messages.
CSCtg53328
BWG 2.2 sent account terminate cause=0 (zero) when the communication to the base station was 
lost.
CSCtg70521
In flow-accounting, framed-IP was not included in the accounting start (acct-start) record.
From BWG 2.3, the process of sending the accounting start message can be delayed by 3600 
seconds.
CSCtg96617
BWG 2.2 sent garbage values in the Acct-Multi-Session-id field of the accounting requests. The 
RADIUS server discarded these packets.
CSCtg27890
BWG 2.0 and above failed when a DHCP start request (DISCOVER/REQUEST) was received in 
downstream direction.
CSCtc73759
The H.323 implementation in Cisco IOS Software contains two vulnerabilities that may be exploited 
remotely to cause a denial of service (DoS) condition on a device that is running a vulnerable version 
of Cisco IOS Software.
Cisco has released free software updates that address these vulnerabilities. There are no 
workarounds to mitigate these vulnerabilities other than disabling H.323 on the vulnerable device.
This advisory is posted at
Note: The September 22, 2010, Cisco IOS Software Security Advisory bundled publication includes 
six Cisco Security Advisories. Five of the advisories address vulnerabilities in Cisco IOS Software, 
and one advisory addresses vulnerabilities in Cisco Unified Communications Manager. Each 
advisory lists the releases that correct the vulnerability or vulnerabilities detailed in the advisory. 
The table at the following URL lists releases that correct all Cisco IOS Software vulnerabilities that 
have been published on September 22, 2010, or earlier:
Individual publication links are in “Cisco Event Response: Semiannual Cisco IOS Software Security 
Advisory Bundled Publication” at the following link:
CSCtd33567
The H.323 implementation in Cisco IOS Software contains two vulnerabilities that may be exploited 
remotely to cause a denial of service (DoS) condition on a device that is running a vulnerable version 
of Cisco IOS Software.