
448
Caveats for Cisco IOS Release 12.2(33)SRD through 12.2(33)SRD8
OL-10394-05 Rev. R0
• Resolved Caveats—Cisco IOS Release 12.2(33)SRD2a, page 565
• Resolved Caveats—Cisco IOS Release 12.2(33)SRD2, page 566
• Open Caveats—Cisco IOS Release 12.2(33)SRD1, page 632
• Resolved Caveats—Cisco IOS Release 12.2(33)SRD1, page 633
• Open Caveats—Cisco IOS Release 12.2(33)SRD, page 666
• Resolved Caveats—Cisco IOS Release 12.2(33)SRD, page 679
Resolved Caveats—Cisco IOS Release 12.2(33)SRD8
Cisco IOS Release 12.2(33)SRD8 is a rebuild release for Cisco IOS Release 12.2(33)SRD. The caveats
in this section are resolved in Cisco IOS Release 12.2(33)SRD8 but may be open in previous Cisco IOS
releases.
• CSCtf71673
Symptoms: A Cisco router shows a PRE crash.
Conditions: This issue is seen when the system is configured for PTA and L2TP access and is
running Cisco IOS Release 12.2(34)SB4 during a pilot phase.
Workaround: There is no workaround.
• CSCtg48785
Symptoms: The following error may appear in the log:
%DATACORRUPTION-1-DATAINCONSISTENCY: copy error,
Conditions: This issue occurs while issuing show x25 hunt-group command when a large amount
of x25 traffic needs to traverse the device.
Workaround: Do not use the show x25 hunt-group command.
• CSCtr28857
A vulnerability in the Multicast Source Discovery Protocol (MSDP) implementation of Cisco IOS
Software and Cisco IOS XE Software could allow a remote, unauthenticated attacker to cause a
reload of an affected device. Repeated attempts to exploit this vulnerability could result in a
sustained denial of service (DoS) condition.
Cisco has released free software updates that address this vulnerability. Workarounds that mitigate
this vulnerability are available. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-msdp
• CSCtr91106
A vulnerability exists in the Cisco IOS Software that may allow a remote application or device to
exceed its authorization level when authentication, authorization, and accounting (AAA)
authorization is used. This vulnerability requires that the HTTP or HTTPS server is enabled on the
Cisco IOS device.
Products that are not running Cisco IOS Software are not vulnerable.
Cisco has released free software updates that address these vulnerabilities.
The HTTP server may be disabled as a workaround for the vulnerability described in this advisory.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-pai
Comentarios a estos manuales