HP Cisco Catalyst Blade Switch 3020 Cisco Gigabit Ethernet Switch Module for H - Page 21

Cisco IOS Caveats Resolved in Cisco IOS Release 12.2(44)SE

Page 21 highlights

Resolved Caveats • CSCsl34355 Two crafted Protocol Independent Multicast (PIM) packet vulnerabilities exist in Cisco IOS software that may lead to a denial of service (DoS) condition. Cisco has released free software updates that address these vulnerabilities. Workarounds that mitigate these vulnerabilities are available. This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20080924-multicast.shtml. • CSCsl62609 Multiple vulnerabilities exist in the Session Initiation Protocol (SIP) implementation in Cisco IOS that can be exploited remotely to trigger a memory leak or to cause a reload of the Cisco IOS device. Cisco has released free software updates that address these vulnerabilities. Fixed Cisco IOS software listed in the Software Versions and Fixes section contains fixes for all vulnerabilities addressed in this advisory. There are no workarounds available to mitigate the effects of any of the vulnerabilities apart from disabling the protocol or feature itself, if administrators do not require the Cisco IOS device to provide voice over IP services. This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20080924-sip.shtml. • CSCsm41883 High CPU usage (greater than 90 percent) no longer occurs on the switch when you first connect a new device. • CSCsm57520 A switch no longer unexpectedly reloads when you configure the switch ports as dynamic ports by using the VLAN Membership Policy Server (VMPS). • CSCsq13348 The Cisco IOS Intrusion Prevention System (IPS) feature contains a vulnerability in the processing of certain IPS signatures that use the SERVICE.DNS engine. This vulnerability may cause a router to crash or hang, resulting in a denial of service condition. Cisco has released free software updates that address this vulnerability. There is a workaround for this vulnerability. NOTE: This vulnerability is not related in any way to CVE-2008-1447 - Cache poisoning attacks. Cisco Systems has published a Cisco Security Advisory for that vulnerability, which can be found at http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml. This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20080924-iosips.shtml. Cisco IOS Caveats Resolved in Cisco IOS Release 12.2(44)SE These caveats were resolved in Cisco IOS Release 12.2(44)SE: • CSCeg67844 The switch no longer returns an incorrect value for the ciscoFlashPartitionFileCount MIB. • CSCsb85001 When traffic passes through a VMPS port and you enter the shut interface configuration command, a dynamic VLAN is now assigned. Cisco Gigabit Ethernet Switch Module for HP BladeSystem p-Class Release Notes, Cisco IOS Release 12.2(44)SE and Later 464831-005 21

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28

21
Cisco Gigabit Ethernet Switch Module for HP BladeSystem p-Class Release Notes, Cisco IOS Release 12.2(44)SE and Later
464831-005
Resolved Caveats
CSCsl34355
Two crafted Protocol Independent Multicast (PIM) packet vulnerabilities exist in Cisco IOS
software that may lead to a denial of service (DoS) condition. Cisco has released free software
updates that address these vulnerabilities. Workarounds that mitigate these vulnerabilities are
available.
This advisory is posted at
.
CSCsl62609
Multiple vulnerabilities exist in the Session Initiation Protocol (SIP) implementation in Cisco IOS
that can be exploited remotely to trigger a memory leak or to cause a reload of the Cisco IOS device.
Cisco has released free software updates that address these vulnerabilities. Fixed Cisco IOS
software listed in the Software Versions and Fixes section contains fixes for all vulnerabilities
addressed in this advisory.
There are no workarounds available to mitigate the effects of any of the vulnerabilities apart from
disabling the protocol or feature itself, if administrators do not require the Cisco IOS device to
provide voice over IP services.
This advisory is posted at
.
CSCsm41883
High CPU usage (greater than 90 percent) no longer occurs on the switch when you first connect a
new device.
CSCsm57520
A switch no longer unexpectedly reloads when you configure the switch ports as dynamic ports by
using the VLAN Membership Policy Server (VMPS).
CSCsq13348
The Cisco IOS Intrusion Prevention System (IPS) feature contains a vulnerability in the processing
of certain IPS signatures that use the SERVICE.DNS engine. This vulnerability may cause a router
to crash or hang, resulting in a denial of service condition.
Cisco has released free software updates that address this vulnerability. There is a workaround for
this vulnerability.
NOTE: This vulnerability is not related in any way to CVE-2008-1447 - Cache poisoning attacks.
Cisco Systems has published a Cisco Security Advisory for that vulnerability, which can be found
at
.
This advisory is posted at
.
Cisco IOS Caveats Resolved in Cisco IOS Release 12.2(44)SE
These caveats were resolved in Cisco IOS Release 12.2(44)SE:
CSCeg67844
The switch no longer returns an incorrect value for the ciscoFlashPartitionFileCount MIB.
CSCsb85001
When traffic passes through a VMPS port and you enter the
shut
interface configuration command,
a dynamic VLAN is now assigned.