Datasheet
233
Release Notes for Cisco IOS Release 12.1E on the Catalyst 6500 and Cisco 7600 Supervisor Engine and MSFC
OL-2310-11
Caveats
A companion advisory that describes this vulnerability for products that do not run Cisco IOS
software is available at
http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-nonios.shtml.
This problem is resolved in Release 12.1(13)E13. (CSCed27956, CSCed38527)
• Malfunctioning PIM, MLSM, or mwheel processes might cause “CPUHOG” and “WATCHDOG”
messages and reloads. This problem is resolved in Release 12.1(13)E13. (CSCed12393)
• When fragmenting MPLS traffic, a reload might occur after display of a “SYS-2-GETBUF”
message. This problem is resolved in Release 12.1(13)E13. (CSCeb16876)
• The show disk0: command does not work. This problem is resolved in Release 12.1(13)E13.
(CSCin64119)
• Traffic might flow in only one direction after assigning a LAN port to a different VLAN. This
problem is resolved in Release 12.1(13)E13. (CSCed20566)
• To avoid dropping into ROMMON, do not insert a WS-X6816-GBIC that does not have a DFC
installed. This problem is resolved in Release 12.1(13)E13. (CSCed14506)
• Occasionally, the nvram:/startup-config file cannot be read. This problem is resolved in
Release 12.1(13)E13. (CSCed06462)
• Directly connected multicast enabled subnets might not be programmed correctly into the PFC. This
problem is resolved in Release 12.1(13)E13. (CSCed00394)
• With a complex Spanning Tree topology (for example, a high number of blocked ports in the same
VLAN), if an inferior BPDU is received at approximately the same time that the message age timer
expires, STP might send out BPDUs with obsolete information (for example, the previous root ID)
for the duration of the maximum age timer, which can delay STP convergence. This problem is
resolved in Release 12.1(13)E13. (CSCea68988)
• A reload might occur if you use SNMP to disable the EOBC0/0 interface through ifAdminStatus.
This problem is resolved in Release 12.1(13)E13. (CSCea53440)
• In releases where caveat CSCdz27200 is resolved, a reload might occur when you append a file
whose size is not a multiple of 512 bytes to an Advanced Technology Attachment (ATA) flash card
(for example, disk0). For example, this situation may occur when you enter the show
command_name | tee /append url privileged EXEC command. This problem is resolved in
Release 12.1(13)E13. (CSCin57765)
• Cisco products running IOS contain vulnerabilities in the processing of H.323 messages, which are
typically used in packetized voice or multimedia applications. Features such as NAT and IOS
Firewall must inspect H.323 messages and may be vulnerable as well. A test suite has been
developed by the University of Oulu to target this protocol and identify vulnerabilities. Support for
the H.323 protocol was introduced in Cisco IOS Software Release 11.3T, and all later Cisco IOS
releases are affected if configured for various types of Voice/Multimedia Application support. The
vulnerabilities can be exploited repeatedly to produce a denial of service (DoS). There are
workarounds available that may mitigate the impact, but these techniques may not be appropriate
for use in all customer networks. This advisory is available at:
http://www.cisco.com/warp/public/707/cisco-sa-20040113-h323.shtml
This problem is resolved in Release 12.1(13)E13. (CSCed28873)
Resolved General Caveats in Release 12.1(13)E12
• Cisco products running IOS contain vulnerabilities in the processing of H.323 messages, which are
typically used in packetized voice or multimedia applications. Features such as NAT and IOS
Firewall must inspect H.323 messages and may be vulnerable as well. A test suite has been