Cisco Cisco IOS Software Release 12.2(33)SRE 發佈版本通知

下载
页码 298
164
Caveats for Cisco IOS Release 12.2(33)SRE through 12.2(33)SRE13
OL-10394-05 Rev. S1
  
CSCts39290
Symptom: Under runs counter increments report for native Gigabit interfaces of NPE-G1.
Conditions: This symptom is not observed any specific conditions. 
Workaround: This issue can be resolved by clearing the interface. 
CSCue00996
Symptom: The Cisco IOS Software implementation of the Network Address Translation (NAT) 
feature contains two vulnerabilities when translating IP packets that could allow an unauthenticated, 
remote attacker to cause a denial of service (DoS) condition.
Cisco has released free software updates that address these vulnerabilities.
There are no workarounds to mitigate these vulnerabilities.
This advisory is available at the following link:
Note
The March 26, 2014, Cisco IOS Software Security Advisory bundled publication includes six 
Cisco Security Advisories. All advisories address vulnerabilities in Cisco IOS Software. Each 
Cisco IOS Software Security Advisory lists the Cisco IOS Software releases that correct the 
vulnerability or vulnerabilities detailed in the advisory as well as the Cisco IOS Software 
releases that correct all Cisco IOS Software vulnerabilities in the March 2014 bundled 
publication.
Individual publication links are in Cisco Event Response: Semiannual Cisco IOS Software Security 
Advisory Bundled Publication at the following link:
Conditions: See published Cisco Security Advisory
Workaround: See published Cisco Security Advisory
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The 
Base and Temporal CVSS scores as of the time of evaluation are 7.1/5.9:
CVE ID CVE-2014-2111 has been assigned to document this issue.
Additional information on Cisco’s security vulnerability policy can be found at the following URL:
 
CSCug84789
Symptom: A vulnerability in the Cisco 7600 Series Route Switch Processor 720 with 10 Gigabit 
Ethernet Uplinks models RSP720-3C-10GE and RSP720-3CXL-10GE could allow an 
unauthenticated, remote attacker to cause the route processor to reboot or stop forwarding traffic. 
The vulnerability is due to an issue in the Kailash field-programmable gate array (FPGA) versions 
prior to 2.6.
Cisco has released free software updates that address this vulnerability.
Workarounds that mitigate this vulnerability are not available.
This advisory is available at the following link: