Release Notes

22
Release Notes for Cisco PDSN Release 5.2 in IOS Release 12.4(22)XR7
OL-23372-01
Caveats
advisory lists the releases that correct the vulnerability or vulnerabilities detailed in the advisory.
The table at the following URL lists releases that correct all Cisco IOS Software vulnerabilities that
have been published on September 22, 2010, or earlier:
http://www.cisco.com/warp/public/707/cisco-sa-20100922-bundle.shtml
Individual publication links are in “Cisco Event Response: Semiannual Cisco IOS Software Security
Advisory Bundled Publication” at the following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_sep10.html
Cisco Unified Communications Manager (CUCM) is affected by the vulnerabilities described in this
advisory. Two separate Cisco Security Advisories have been published to disclose the vulnerabilities
that affect the Cisco Unified Communications Manager at the following locations:
http://www.cisco.com/warp/public/707/cisco-sa-20090826-cucm.shtml
http://www.cisco.com/warp/public/707/cisco-sa-20100922-cucm.shtml
CSCtf72678
Multiple vulnerabilities exist in the Session Initiation Protocol (SIP) implementation in Cisco IOS
Software that could allow an unauthenticated, remote attacker to cause a reload of an affected device
when SIP operation is enabled.
Cisco has released free software updates that address these vulnerabilities. There are no
workarounds for devices that must run SIP; however, mitigations are available to limit exposure to
the vulnerabilities.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20100922-sip.shtml.
Note: The September 22, 2010, Cisco IOS Software Security Advisory bundled publication includes
six Cisco Security Advisories. Five of the advisories address vulnerabilities in Cisco IOS Software,
and one advisory addresses vulnerabilities in Cisco Unified Communications Manager. Each
advisory lists the releases that correct the vulnerability or vulnerabilities detailed in the advisory.
The table at the following URL lists releases that correct all Cisco IOS Software vulnerabilities that
have been published on September 22, 2010, or earlier:
http://www.cisco.com/warp/public/707/cisco-sa-20100922-bundle.shtml
Individual publication links are in “Cisco Event Response: Semiannual Cisco IOS Software Security
Advisory Bundled Publication” at the following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_sep10.html
Cisco Unified Communications Manager (CUCM) is affected by the vulnerabilities described in this
advisory. Two separate Cisco Security Advisories have been published to disclose the vulnerabilities
that affect the Cisco Unified Communications Manager at the following locations:
http://www.cisco.com/warp/public/707/cisco-sa-20090826-cucm.shtml
http://www.cisco.com/warp/public/707/cisco-sa-20100922-cucm.shtml
CSCtc92933
When an IP packet of size 1,500 bytes with the DF-bit set is sent to a mobile, Cisco PDSN Release
5.2 routes the packet incorrectly. This behavior occurs for mobiles that negotiate ACCM as zero and
IXP does the AHDLC encoding. When the IP packet is encapsulated with PPP and IP/GRE, the
packet exceeds 1,500 egress MTU size and fragments at the A10 level in PPC.
Workaround Configuring the MTU to 1,600 bytes ensures that the packet (after A10 encapsulation) does
not fragment and is forwarded to the IXP.