Datasheet

123
Release Notes for Cisco IOS Release 12.1E on the Catalyst 6500 and Cisco 7600 Supervisor Engine and MSFC
OL-2310-11
Caveats
There are workarounds available for this vulnerability.
This advisory is posted at
http://www.cisco.com/warp/public/707/cisco-sa-20070110-dlsw.shtml
This problem is resolved in Release 12.1(27b)E2. (CSCsf28840)
A very slow memory leak might occur in the medium buffers. This problem occurs on a system
configured with a distributed EtherChannel (DEC). When this problem occurs, MALLOCFAIL
messages are displayed in the switch processor log. This problem is resolved in
Release 12.1(27b)E2. (CSCsf31542)
The WS-X6516A-GBIC and the WS-X6548-GE-TX switching modules might fail the
TestL3VlanMet, TestIngressSpan and TestEgressSpan diagnostic tests when they come online while
the system is in flow-through mode. This problem is resolved in Release 12.1(27b)E2.
(CSCsg13124)
This bug documents the deprecation and removal of the Cisco IOS FTP Server feature. This problem
is resolved in Release 12.1(27b)E2. (CSCsg16908)
On an MPLS VPN, when you use the BGP aggregate-address command with the summary-only
keyword, all packets matching that aggregate will be sent out with TTL=0. This problem might also
occur by redistributing an aggregate route into BGP. This problem is resolved in
Release 12.1(27b)E2. (CSCsh21998)
Resolved General Caveats in Release 12.1(27b)E1
CSCse68138—Resolved in Release 12.1(27b)E1.
Multiple voice-related vulnerabilities are identified in Cisco IOS software, one of which is also
shared with Cisco Unified Communications Manager. These vulnerabilities pertain to the following
protocols or features:
Session Initiation Protocol (SIP)
Media Gateway Control Protocol (MGCP)
Signaling protocols H.323, H.254
Real-time Transport Protocol (RTP)
Facsimile reception
Cisco has made free software available to address these vulnerabilities for affected customers. Fixed
Cisco IOS software listed in the Software Versions and Fixes section contains fixes for all
vulnerabilities mentioned in this advisory.
There are no workarounds available to mitigate the effects of any of the vulnerabilities apart from
disabling the protocol or feature itself.
This advisory is posted at
http://www.cisco.com/warp/public/707/cisco-sa-20070808-IOS-voice.shtml
The Cisco IOS Transmission Control Protocol (TCP) listener in certain versions of Cisco IOS
software is vulnerable to a remotely-exploitable memory leak that may lead to a denial of service
condition.
This vulnerability only applies to traffic destined to the Cisco IOS device. Traffic transiting the
Cisco IOS device will not trigger this vulnerability.
Cisco has made free software available to address this vulnerability for affected customers.
This issue is documented as Cisco bug ID CSCek37177.