Datasheet
120
Release Notes for Cisco IOS Release 12.1E on the Catalyst 6500 and Cisco 7600 Supervisor Engine and MSFC
OL-2310-11
Caveats
General Caveats
• Open General Caveats in Release 12.1(27b)E4, page 120
• Resolved General Caveats in Release 12.1(27b)E4, page 120
• Resolved General Caveats in Release 12.1(27b)E3, page 121
• Resolved General Caveats in Release 12.1(27b)E2, page 121
• Resolved General Caveats in Release 12.1(27b)E1, page 123
• Resolved General Caveats in Release 12.1(27b)E, page 125
Open General Caveats in Release 12.1(27b)E4
None.
Resolved General Caveats in Release 12.1(27b)E4
Resolved Caveats for Product ‘all’ and Component ‘dlsw’
• CSCsk73104—Resolved in 12.1(27b)E4
Cisco IOS contains multiple vulnerabilities in the Data-link Switching (DLSw) feature that may
result in a reload or memory leaks when processing specially crafted UDP or IP Protocol 91 packets.
Cisco has released free software updates that address these vulnerabilities. Workarounds are
available to mitigate the effects of these vulnerabilities.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20080326-dlsw.shtml
Resolved Caveats for Product ‘all’ and Component ‘vpdn’
• CSCsj58566—Resolved in 12.1(27b)E4
Two vulnerabilities exist in the virtual private dial-up network (VPDN) solution when Point-to-Point
Tunneling Protocol (PPTP) is used in certain Cisco IOS releases prior to 12.3. PPTP is only one of
the supported tunneling protocols used to tunnel PPP frames within the VPDN solution.
The first vulnerability is a memory leak that occurs as a result of PPTP session termination. The
second vulnerability may consume all interface descriptor blocks on the affected device because
those devices will not reuse virtual access interfaces. If these vulnerabilities are repeatedly
exploited, the memory and/or interface resources of the attacked device may be depleted.
Cisco has made free software available to address these vulnerabilities for affected customers.
There are no workarounds available to mitigate the effects of these vulnerabilities.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20080326-pptp.shtml
Identifier Product Component Description
CSCsk26719 all ip-acl show ip access crash with per-user acl
CSCed52749 all ospf OSPF: route missing even though OSPF database still exists
CSCsg39295 all snmp Syslog Displays Password if SCP or FTP Selected in CISCO-COPY-CONFIG-MIB
CSCed95187 all tcp IP ID field is predictable for connectionless RST packets .
CSCsj64023 c7600 osm-ucode MPLS: Sup2 OSM sending TTL=0 packets on MPLS VPN