Cisco 3020 - Cisco Catalyst Blade Switch 릴리스 노트 - 페이지 16

{카테고리_이름} Cisco 3020 - Cisco Catalyst Blade Switch에 대한 릴리스 노트을 온라인으로 검색하거나 PDF를 다운로드하세요. Cisco 3020 - Cisco Catalyst Blade Switch 41 페이지. Release notes for the cisco catalyst blade switch 3020 for hp, ciscoã‚â iosã‚â releaseã‚â 12.2(44)se
Cisco 3020 - Cisco Catalyst Blade Switch에 대해서도 마찬가지입니다: 시작하기 매뉴얼 (37 페이지), 시작하기 매뉴얼 (31 페이지), 빠른 사양 (12 페이지), 릴리스 노트 (27 페이지), 릴리스 노트 (23 페이지), 릴리스 노트 (21 페이지), 설치 매뉴얼 (21 페이지)

Cisco 3020 - Cisco Catalyst Blade Switch 릴리스 노트
Resolved Caveats
Resolved Caveats
This section describes the caveats that have been resolved in this release.
Note
Release Notes for the Cisco Catalyst Blade Switch 3020 for HP, Cisco IOS Release 12.2(35)SE and Later
16
CSCei63394
When an IEEE 802.1x restricted VLAN was configured on a port and a hub with multiple devices
was connected to that port, no syslog messages were generated.
This is not a supported configuration. Only one host should have been connected to an IEEE 802.1x
restricted VLAN port.
CSCsb11849
When the Control Plane Policing (CoPP) policy was configured to drop packets that have IP options,
packets with incorrectly created IP options were ignored.
CSCsb12598
Cisco IOS device may crash while processing malformed Secure Sockets Layer (SSL) packets. In
order to trigger these vulnerabilities, a malicious client must send malformed packets during the SSL
protocol exchange with the vulnerable device.
Successful repeated exploitation of any of these vulnerabilities may lead to a sustained
Denial-of-Service (DoS); however, vulnerabilities are not known to compromise either the
confidentiality or integrity of the data or the device. These vulnerabilities are not believed to allow
an attacker will not be able to decrypt any previously encrypted information.
Cisco IOS is affected by the following vulnerabilities:
Processing ClientHello messages, documented as Cisco bug ID CSCsb12598
Processing ChangeCipherSpec messages, documented as Cisco bug ID CSCsb40304
Processing Finished messages, documented as Cisco bug ID CSCsd92405
Cisco has made free software available to address these vulnerabilities for affected customers. There
are workarounds available to mitigate the effects of these vulnerabilities.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20070522-SSL.shtml.
Another related advisory has been posted with this advisory. This additional advisory also
describes a vulnerability related to cryptography that affects Cisco IOS. This related advisory is
available at the following link:
http://www.cisco.com/warp/public/707/cisco-sa-20070522-crypto.shtml.
A combined software table for Cisco IOS is available to aid customers in choosing a software
releases that fixes all security vulnerabilities published as of May 22, 2007. This software table is
available at the following link:
http://www.cisco.com/warp/public/707/cisco-sa-20070522-cry-bundle.shtml.
CSCsb40304
Cisco IOS device may crash while processing malformed Secure Sockets Layer (SSL) packets. In
order to trigger these vulnerabilities, a malicious client must send malformed packets during the SSL
protocol exchange with the vulnerable device.
Successful repeated exploitation of any of these vulnerabilities may lead to a sustained
Denial-of-Service (DoS); however, vulnerabilities are not known to compromise either the
confidentiality or integrity of the data or the device. These vulnerabilities are not believed to allow
an attacker will not be able to decrypt any previously encrypted information.
OL-8918-03