Cisco 3020 - Cisco Catalyst Blade Switch Note de mise à jour - Page 19

Parcourez en ligne ou téléchargez le pdf Note de mise à jour pour {nom_de_la_catégorie} Cisco 3020 - Cisco Catalyst Blade Switch. Cisco 3020 - Cisco Catalyst Blade Switch 41 pages. Release notes for the cisco catalyst blade switch 3020 for hp, ciscoã‚â iosã‚â releaseã‚â 12.2(44)se
Également pour Cisco 3020 - Cisco Catalyst Blade Switch : Manuel de démarrage (37 pages), Manuel de démarrage (31 pages), Quickspecs (12 pages), Note de mise à jour (27 pages), Note de mise à jour (23 pages), Note de mise à jour (21 pages), Manuel d'installation (21 pages)

Cisco 3020 - Cisco Catalyst Blade Switch Note de mise à jour
Note

Documentation Updates

This section provides these updates to the documentation:
Updates to Software Configuration Guide
This section was updated in the "Configuring EtherChannels" chapter:
OL-8918-03
CSCsd92405
Cisco IOS device may crash while processing malformed Secure Sockets Layer (SSL) packets. In
order to trigger these vulnerabilities, a malicious client must send malformed packets during the SSL
protocol exchange with the vulnerable device.
Successful repeated exploitation of any of these vulnerabilities may lead to a sustained
Denial-of-Service (DoS); however, vulnerabilities are not known to compromise either the
confidentiality or integrity of the data or the device. These vulnerabilities are not believed to allow
an attacker will not be able to decrypt any previously encrypted information.
Cisco IOS is affected by the following vulnerabilities:
Processing ClientHello messages, documented as Cisco bug ID CSCsb12598
Processing ChangeCipherSpec messages, documented as Cisco bug ID CSCsb40304
Processing Finished messages, documented as Cisco bug ID CSCsd92405
Cisco has made free software available to address these vulnerabilities for affected customers. There
are workarounds available to mitigate the effects of these vulnerabilities.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20070522-SSL.shtml.
Another related advisory has been posted with this advisory. This additional advisory also
describes a vulnerability related to cryptography that affects Cisco IOS. This related advisory is
available at the following link:
http://www.cisco.com/warp/public/707/cisco-sa-20070522-crypto.shtml.
A combined software table for Cisco IOS is available to aid customers in choosing a software
releases that fixes all security vulnerabilities published as of May 22, 2007. This software table is
available at the following link:
http://www.cisco.com/warp/public/707/cisco-sa-20070522-cry-bundle.shtml.
CSCse29007
When any of the dual-purpose ports Gi0/17 to Gi0/20 are configured as RJ-45 ports, the Device
Manager front panel no longer incorrectly shows the SFP module slots Gi0/17 to Gi0/20 as having
a 1000BASE-TX module.
"Updates to Software Configuration Guide" section on page 19
"Updates to the System Message Guide" section on page 30
"Updates to Getting Getting Started Guide" section on page 33
Release Notes for the Cisco Catalyst Blade Switch 3020 for HP, Cisco IOS Release 12.2(35)SE and Later
Documentation Updates
19