Table Of Contents
Release Notes for Cisco 3700 Series Integrated Services Routers with Cisco IOS Release 12.4(11)XW8
Determining the Software Version
Upgrading to a New Software Release
New Hardware Features in Cisco IOS Release 12.4(11)XW8
New Software Features in Cisco IOS Release 12.4(11)XW8
New Hardware Features in Cisco IOS Release 12.4(11)XW7
New Software Features in Cisco IOS Release 12.4(11)XW7
New Hardware Features in Release 12.4(11)XW6
New Software Features in Release 12.4(11)XW6
New Hardware Features in Release 12.4(11)XW5
New Software Features in Release 12.4(11)XW5
New Hardware Features in Release 12.4(11)XW3
New Software Features in Release 12.4(11)XW3
New Hardware Features in Release 12.4(11)XW2
New Software Features in Release 12.4(11)XW2
Cisco Unified Communications Manager Express 4.2
The Media and Signaling Encryption (SRTP/TLS) on DSPFarm Conferencing
Interoperability with Cisco Unified Contact Center Express (Cisco UCCX 5.0)
New Hardware Features in Release 12.4(11)XW1
New Software Features in Release 12.4(11)XW1
New Hardware Features in Release 12.4(11)XW
New Software Features in Release 12.4(11)XW
Universal Voice Transcoding Support for IP-to-IP Gateways
Limitations and Restriction - Release 12.4(11)XW2
Open Caveats - Release 12.4(11)XW10
Resolved Caveats - Release 12.4(11)XW10
Open Caveats - Release 12.4(11)XW8
Resolved Caveats - Release 12.4(11)XW8
Open Caveats - Release 12.4(11)XW7
Resolved Caveats - Release 12.4(11)XW7
Open Caveats - Release 12.4(11)XW6
Resolved Caveats - Release 12.4(11)XW6
Open Caveats - Release 12.4(11)XW5
Resolved Caveats - Release 12.4(11)XW5
Open Caveats - Release 12.4(11)XW3
Resolved Caveats - Release 12.4(11)XW3
Open Caveats - Release 12.4(11)XW2
Resolved Caveats - Release 12.4(11)XW2
Open Caveats - Cisco IOS Release 12.4(11)XW1
Resolved Caveats - Cisco IOS Release 12.4(11)XW1
Open Caveats - Cisco IOS Release 12.4(11)XW
Resolved Caveats - Cisco IOS Release 12.4(11)XW
Cisco IOS Software Documentation Set
Obtaining Documentation, Obtaining Support, and Security Guidelines
Release Notes for Cisco 3700 Series Integrated Services Routers with Cisco IOS Release 12.4(11)XW8
First Released: May 4, 2007Last Revised: June 6, 2008Cisco IOS Release 12.4(11)XW8These release notes describe new features and significant software components for the Cisco 3700 series routers that support the Cisco IOS Release 12.4(11)XW releases. These release notes are updated as needed to describe new memory requirements, new features, new hardware support, software platform deferrals, microcode or modem code changes, related document changes, and any other important changes. Use these release notes with the Cross-Platform Release Notes for Cisco IOS Release 12.4T located on Cisco.com.
For a list of the software caveats that apply to Cisco IOS Release 12.4(11)XW, see the "Caveats" section and Caveats for Cisco IOS Release 12.4(11)T. The online caveats document is updated for every maintenance release and is located on Cisco.com .
Contents
•Obtaining Documentation, Obtaining Support, and Security Guidelines
System Requirements
This section describes the system requirements for Cisco IOS Release 12.4(11)XW and includes the following sections:
•Determining the Software Version
•Upgrading to a New Software Release
Memory Requirements
Table 1 describes the memory requirements for the Cisco IOS feature sets supported by Cisco IOS Release 12.4(11)XW on the Cisco 3700 series routers.
Hardware Supported
Cisco IOS Cisco IOS Release 12.4(11)XW supports the following Cisco 3700 series routers:
•Cisco 3725
•Cisco 3745
For descriptions of existing hardware features and supported modules, see the hardware installation guides, configuration and command reference guides, and additional documents specific to the Cisco 3700 series routers, which are available on Cisco.com at the following location:
http://www.cisco.com/univercd/cc/td/doc/product/access/acs_mod/3700/index.htm
Determining the Software Version
To determine which version of Cisco IOS software is currently running on your Cisco 3700 series router, log in to the router and enter the show version EXEC command. The following sample output from the show version command indicates the version number.
Router> show version
Cisco Internetwork Operating System SoftwareIOS (tm) C3700 Software (c3745-entbasek9-mz), Version 12.4(11)XW, EARLY DEPLOYMENT RELEASE SOFTWARE (fc1)Synched to technology version 12.4(11)TUpgrading to a New Software Release
For general information about upgrading to a new software release, refer to the Software Installation and Upgrade Procedures located at http://www.cisco.com/warp/public/130/upgrade_index.shtml.
Feature Set Tables
The Cisco IOS software is packaged in feature sets consisting of software images, depending on the platform. Each feature set contains a specific set of Cisco IOS features. Release 12.4(11)XW supports the same feature sets as Releases 12.4 and 12.4(11)T, but Release 12.4(11)XW includes new features supported by the Cisco 3700 series routers.
Caution The Cisco IOS images with strong encryption (including, but not limited to, 168-bit [3DES] data encryption feature sets) are subject to United States government export controls and have limited distribution. Strong encryption images to be installed outside the United States will likely require an export license. Customer orders can be denied or subject to delay as a result of United States government regulations. When applicable, the purchaser/user must obtain local import and use authorizations for all encryption strengths. Please contact your sales representative or distributor for more information, or send an e-mail to export@cisco.com.
Table 2 lists the feature and feature sets supported in Cisco IOS Release 12.4(11)XW.
The tables use the following conventions:
•In: The number in the `In' column indicates the Cisco IOS release in which the feature was introduced. For example, "12.4(11)XW" indicates that the feature was introduced in 12.4(11)XW. If a cell in this column is empty, the feature was included in a previous release or in the initial base release.
•Yes: The feature is supported in the software image.
•No: The feature is not supported in the software image.
Note These feature set tables contain only a selected list of features, which are cumulative for Release 12.4(11)nn early deployment releases only (nn identifies each early deployment release). The tables do not list all features in each image: additional features are listed in Cross-Platform Release Notes for Cisco IOS Release 12.4(11)T and Release 12.4(11)T Cisco IOS documentation.
Table 2 Cisco IOS Release 12.4(11)XW Feature List for Cisco 3700 Routers
Feature In Image12.4(11)XW
See Table 1 for image names.
New and Changed Information
This section contains the following information:
•New Hardware Features in Cisco IOS Release 12.4(11)XW8
•New Software Features in Cisco IOS Release 12.4(11)XW8
•New Hardware Features in Cisco IOS Release 12.4(11)XW7
•New Software Features in Cisco IOS Release 12.4(11)XW7
•New Hardware Features in Release 12.4(11)XW6
•New Software Features in Release 12.4(11)XW6
•New Hardware Features in Release 12.4(11)XW5
•New Software Features in Release 12.4(11)XW5
•New Hardware Features in Release 12.4(11)XW3
•New Software Features in Release 12.4(11)XW3
•New Hardware Features in Release 12.4(11)XW2
•New Software Features in Release 12.4(11)XW2
•New Hardware Features in Release 12.4(11)XW1
•New Software Features in Release 12.4(11)XW1
•New Hardware Features in Release 12.4(11)XW
•New Software Features in Release 12.4(11)XW
•New Features in Release 12.4T
New Hardware Features in Cisco IOS Release 12.4(11)XW8
There are no new hardware feature in this release.
New Software Features in Cisco IOS Release 12.4(11)XW8
There are no new software features in this release.
New Hardware Features in Cisco IOS Release 12.4(11)XW7
There are no new hardware feature in this release.
New Software Features in Cisco IOS Release 12.4(11)XW7
There are no new software features in this release.
New Hardware Features in Release 12.4(11)XW6
There are no new hardware features in this release.
New Software Features in Release 12.4(11)XW6
There are no new software features in this release.
New Hardware Features in Release 12.4(11)XW5
There are no new hardware features in this release.
New Software Features in Release 12.4(11)XW5
There are no new software features in this release.
New Hardware Features in Release 12.4(11)XW3
There are no new hardware features in this release.
New Software Features in Release 12.4(11)XW3
There are no new software features in this release.
New Hardware Features in Release 12.4(11)XW2
There are no new hardware features in this release.
New Software Features in Release 12.4(11)XW2
Cisco Unified Communications Manager Express 4.2
Media Encryption (SRTP) on Cisco Unified Communications Manager Express feature provides the following secure voice call capabilities: Secure call control signaling and media streams in Cisco Unified Communications Manager Express (Unified CME) networks using Secure Real-Time Transport Protocol (SRTP) and H.323 protocols.
1. Secure call control signaling and media streams in Cisco Unified Communications Manager Express (Unified CME) networks using Secure Real-Time Transport Protocol (SRTP) and H.323 protocols.
2. Secure supplementary services for Unified CME networks using H.323 trunks.
3. Secure Cisco VG224 Analog Phone Gateway endpoints.
For more information on this feature, go to:
The Media and Signaling Encryption (SRTP/TLS) on DSPFarm Conferencing
The Media and Signaling Encryption (SRTP/TLS) on DSPFarm Conferencing feature provides secure conferencing capability for Cisco Unified Communications Manager networks. The feature provides authentication, integrity and encryption of voice media and related call control signaling to and from the digital signal processor (DSP) farm.
For more information on this feature, go to:
Extension Mobility
Extension Mobility in Cisco Unified CME 4.2 provides the benefit of phone mobility for end users.
Interoperability with Cisco Unified Contact Center Express (Cisco UCCX 5.0)
Enables interoperability between Cisco Unified CME 4.2 and later versions and Cisco Customer Response Solutions (CRS) with Cisco Unified Contact Center Express (Unified CCX 5.0), including Cisco Unified IP IVR, enhanced call processing, device and call monitoring, and unattended call transfers to multiple call center agents and basic extension mobility.
Configuration tasks are published in Cisco Unified CME Administrator Guide at:
New Hardware Features in Release 12.4(11)XW1
There are no new hardware features in this release.
New Software Features in Release 12.4(11)XW1
There are no new hardware features in this release.
New Hardware Features in Release 12.4(11)XW
There are no new hardware features in this release.
New Software Features in Release 12.4(11)XW
The following new software features are supported in this release:
•H.323 Name Display
•Session Border Controller Enhancements for H.323-SIP and SIP-SIP Supplementary Services, Transcoding Optimization and Firewall Integration
•Universal Voice Transcoding Support for IP-to-IP Gateways
•Voice Quality Enhancements
Note Because of performance issues when using telephone features, the new features of Cisco Unified CME and SRST will be released in the next rebuild for 12.4(11)XW. TAC support for Cisco Unified CME and SRST will only be available with Release12.4(11) XW1 or later rebuilds.
H.323 Name Display
Note H.323 name delivery is supported only on the first voip dial-peer used. If the call setup is unsuccessful on the first dial-peer, but successful on the second one, the calling name will not be delivered.
Calling name display information may be populated in ISDN messages in the Display Information Element (IE) of a Q.931 Setup or Notify message, or in the Facility IE of a Q.931 Setup or Facility message. The Cisco IOS gateway places this information into the same field of the corresponding H.323 message.
Cisco Unified Communications Manager (CUCM) interprets calling name information (for purposes of name display on IP phones registered with CUCM) only in the Display IE of the H.323 Setup and Notify messages. Name display information delivered in an H.323 Facility message is not interpreted by CUCM. Some ISDN switch types (for example, NI2) send a "name-to-follow" indication in the Q.931 Setup message and deliver the calling name subsequently in the Facility IE of a Q.931 Facility message. When a Cisco IOS gateway is connected to such an ISDN switch, and interoperating with CUCM using the H.323 protocol, CUCM is unable to display calling name on the IP phones.
Beginning with Cisco IOS Release 12.4(11)XW, two new modes of operation are introduced on the Cisco IOS gateways:
•When a Q.931 Setup message with a "name-to-follow" indication is received from an ISDN switch, an H.323 Setup message with no name information is sent to CUCM. When the subsequent Q.931 Facility message is received with calling name information, it is mapped by the gateway to an H.323 Notify Display IE so that CUCM can interpret it correctly and display it on the IP Phone.
•When a Q.931 Setup message with a "name-to-follow" indication is received from an ISDN switch, the gateway can buffer the setup message until the subsequent Q.931 Facility message with calling name information is received. The name information from the Q.931 Facility message is now placed into the H.323 Setup message Display IE and sent to CUCM. If the buffer timer expires before the Q.931 Facility message is received, an H.323 Setup is sent with no name information and, if it subsequently arrives, the information is sent on using an H.323 Notify message.
This software operation is transparent to CUCM and works with all releases, although CUCM 4.2 or later is recommended.
To enable the H.323 Display feature without buffering for ISDN trunks that use the Facility message to deliver Name Display information, configure the following:
At the voice service level:voice service voiph323h225 display-ie ccm-compatibleAt the voice class level:
voice class h323 1h225 display-ie ccm-compatible [system]To enable the H.323 Display feature with buffering for ISDN trunks that use the Facility message to deliver Name Display information, additionally configure the following:
interface Serial0/3/0:23no ip addressencapsulation hdlcisdn switch-type primary-niisdn incoming-voice voiceisdn map address *. plan isdn type unknownisdn supp-service name callingisdn bind-l3 ccm-managerno cdp enableSession Border Controller Enhancements for H.323-SIP and SIP-SIP Supplementary Services, Transcoding Optimization, and Firewall Integration
Session Border Controller Enhancements for H.323-to-SIP and SIP-to-SIP Supplementary Services enhances terminating and re-originating both signaling and media between VoIP and Video networks by supporting H.323 (ECS)-to-SIP (Refer/302 & Re-Invite based) Supplementary Service, Transcoder optimization, and RAS message enhancements. For more information on this feature, go to:
Universal Voice Transcoding Support for IP-to-IP Gateways
Universal Transcoding allows transcoding from any supported codec to any other supported codec. For more information, go to:
http://www.cisco.com/en/US/products/ps6706/products_feature_guide09186a008076161a.html
Voice Quality Enhancements
DSP voice quality metrics improve your ability to monitor, analyze, and ultimately meet your quality of service (QoS) objectives for your network. For more information, go to:
http://www.cisco.com/en/US/products/ps6706/products_feature_guide09186a0080756fd1.html
New Features in Release 12.4T
For information regarding the features supported in Cisco IOS Release 12.4T, see the Cross-Platform Release Notes and New Feature Documentation links at the following location on Cisco.com: http://www.cisco.com/univercd/cc/td/doc/product/software/ios124/124relnt/xprn124/index.htm
Limitations and Restrictions
Limitations and Restriction - Release 12.4(11)XW2
•Interoperability between Cisco Unified CME and Unified CCX is restricted to one Unified CCX per Cisco Unified CME.
•Support for Multi-Party Ad Hoc and Meet-Me Conferencing features is not provided. Multi-Party Ad Hoc and Meet-Me Confer
•Only incoming calls from PSTN trunk are supported for deployment of the Interoperability feature. Other trunks, such as SIP and H.323, are supported as usual in Cisco Unified CME, however, not for customer calls to Unified CCX.
•Only SCCP phones can be configured as agent phones in Cisco Unified CME. The Cisco VG224 Analog Phone Gateway and analog and SIP phones are supported as usual in Cisco Unified CME, however, not as Unified CCX agent phones.
•Cisco Unified IP Phone 7931 cannot be configured as an agent phone in Cisco Unified CME. Cisco Unified IP Phone 7931s are supported as usual in Cisco Unified CME, however, not as Unified CCX agent phones.
•Shared-line appearance is not supported on Unified CCX agent phones in Cisco Unified CME. A directory number cannot be associated with more than one physical agent phone at one time.
•Overlaid lines are not supported on Unified CCX agent phones in Cisco Unified CME. More than one directory number cannot be associated with a single line button on an agent phone.
•Monitored mode for a line button is not supported on Unified CCX agent phones in Cisco Unified CME. An agent phone cannot be monitored by another phone
•For call forward and call pickup, the directory number of a Unified CCX agent cannot forward to a Cisco CRS route point.
Caveats
Caveats describe unexpected behavior or defects in the Cisco IOS software releases. Severity 1 caveats are the most serious caveats, severity 2 caveats are less serious, and severity 3 caveats are the least serious of these three severity levels.
Caveats in Cisco IOS Release 12.4(11)T are also in Cisco IOS Release 12.4(11)XW. For information on caveats in Cisco IOS Release 12.4(11)T, refer to the Caveats for Cisco IOS Release 12.4(11)T document. This document lists severity 1 and 2 caveats; the documents are located on Cisco.com.
Note If you have an account with Cisco.com, you can also use the Bug Toolkit to find select caveats of any severity. To reach the Bug Toolkit, log in to Cisco.com and click Service & Support: Technical Assistance Center: Tool Index: Bug Toolkit. Another option is to go to http://www.cisco.com/cgi-bin/Support/Bugtool/launch_bugtool.pl.
This section contains the following caveat information:
•Open Caveats - Release 12.4(11)XW10
•Resolved Caveats - Release 12.4(11)XW10
•Open Caveats - Release 12.4(11)XW8
•Resolved Caveats - Release 12.4(11)XW8
•Open Caveats - Release 12.4(11)XW7
•Resolved Caveats - Release 12.4(11)XW7
•Open Caveats - Release 12.4(11)XW6
•Resolved Caveats - Release 12.4(11)XW6
•Open Caveats - Release 12.4(11)XW5
•Resolved Caveats - Release 12.4(11)XW5
•Open Caveats - Release 12.4(11)XW3
•Resolved Caveats - Release 12.4(11)XW3
•Open Caveats - Release 12.4(11)XW2
•Resolved Caveats - Release 12.4(11)XW2
•Open Caveats - Cisco IOS Release 12.4(11)XW1
•Resolved Caveats - Cisco IOS Release 12.4(11)XW1
•Open Caveats - Cisco IOS Release 12.4(11)XW
•Resolved Caveats - Cisco IOS Release 12.4(11)XW
Open Caveats - Release 12.4(11)XW10
There are no open caveats in this release.
Resolved Caveats - Release 12.4(11)XW10
•CSCsv04836
Multiple Cisco products are affected by denial of service (DoS) vulnerabilities that manipulate the state of Transmission Control Protocol (TCP) connections. By manipulating the state of a TCP connection, an attacker could force the TCP connection to remain in a long-lived state, possibly indefinitely. If enough TCP connections are forced into a long-lived or indefinite state, resources on a system under attack may be consumed, preventing new TCP connections from being accepted. In some cases, a system reboot may be necessary to recover normal system operation. To exploit these vulnerabilities, an attacker must be able to complete a TCP three-way handshake with a vulnerable system.
In addition to these vulnerabilities, Cisco Nexus 5000 devices contain a TCP DoS vulnerability that may result in a system crash. This additional vulnerability was found as a result of testing the TCP state manipulation vulnerabilities.
Cisco has released free software updates for download from the Cisco website that address these vulnerabilities. Workarounds that mitigate these vulnerabilities are available.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20090908-tcp24.shtml.
•CSCsv04836
Multiple Cisco products are affected by denial of service (DoS) vulnerabilities that manipulate the state of Transmission Control Protocol (TCP) connections. By manipulating the state of a TCP connection, an attacker could force the TCP connection to remain in a long-lived state, possibly indefinitely. If enough TCP connections are forced into a long-lived or indefinite state, resources on a system under attack may be consumed, preventing new TCP connections from being accepted. In some cases, a system reboot may be necessary to recover normal system operation. To exploit these vulnerabilities, an attacker must be able to complete a TCP three-way handshake with a vulnerable system.
In addition to these vulnerabilities, Cisco Nexus 5000 devices contain a TCP DoS vulnerability that may result in a system crash. This additional vulnerability was found as a result of testing the TCP state manipulation vulnerabilities.
Cisco has released free software updates for download from the Cisco website that address these vulnerabilities. Workarounds that mitigate these vulnerabilities are available.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20090908-tcp24.shtml.
•CSCsm27071
A vulnerability in the handling of IP sockets can cause devices to be vulnerable to a denial of service attack when any of several features of Cisco IOS software are enabled. A sequence of specially crafted TCP/IP packets could cause any of the following results:
–The configured feature may stop accepting new connections or sessions.
–The memory of the device may be consumed.
–The device may experience prolonged high CPU utilization.
–The device may reload. Cisco has released free software updates that address this vulnerability.
Workarounds that mitigate this vulnerability are available in the "workarounds" section of the advisory. The advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20090325-ip.shtml
•CSCsm97220
Devices that are running Cisco IOS Software and configured for Mobile IP Network Address Translation (NAT) Traversal feature or Mobile IPv6 are vulnerable to a denial of service (DoS) attack that may result in a blocked interface.
Cisco has released free software updates that address these vulnerabilities.
This advisory is posted at the following link http://www.cisco.com/warp/public/707/cisco-sa-20090325-mobileip.shtml
•CSCso05337
Devices that are running Cisco IOS Software and configured for Mobile IP Network Address Translation (NAT) Traversal feature or Mobile IPv6 are vulnerable to a denial of service (DoS) attack that may result in a blocked interface.
Cisco has released free software updates that address these vulnerabilities.
This advisory is posted at the following link http://www.cisco.com/warp/public/707/cisco-sa-20090325-mobileip.shtml
•CSCsv38166
The server side of the Secure Copy (SCP) implementation in Cisco IOS software contains a vulnerability that could allow authenticated users with an attached command-line interface (CLI) view to transfer files to and from a Cisco IOS device that is configured to be an SCP server, regardless of what users are authorized to do, per the CLI view configuration. This vulnerability could allow valid users to retrieve or write to any file on the device's file system, including the device's saved configuration and Cisco IOS image files, even if the CLI view attached to the user does not allow it. This configuration file may include passwords or other sensitive information.
The Cisco IOS SCP server is an optional service that is disabled by default. CLI views are a fundamental component of the Cisco IOS Role-Based CLI Access feature, which is also disabled by default. Devices that are not specifically configured to enable the Cisco IOS SCP server, or that are configured to use it but do not use role-based CLI access, are not affected by this vulnerability.
This vulnerability does not apply to the Cisco IOS SCP client feature.
Cisco has released free software updates that address this vulnerability.
There are no workarounds available for this vulnerability apart from disabling either the SCP server or the CLI view feature if these services are not required by administrators.
This advisory is posted at the following link:
http://www.cisco.com/warp/public/707/cisco-sa-20090325-scp.shtml.
•CSCsu11522
A vulnerability exists in the Session Initiation Protocol (SIP) implementation in Cisco IOS software that can be exploited remotely to cause a reload of the Cisco IOS device.
Cisco has released free software updates that address this vulnerability. There are no workarounds available to mitigate the vulnerability apart from disabling SIP, if the Cisco IOS device does not need to run SIP for VoIP services. However, mitigation techniques are available to help limit exposure to the vulnerability.
This advisory is posted at the following link:
http://www.cisco.com/warp/public/707/cisco-sa-20090325-sip.shtml.
•CSCsk64158
Symptoms: Several features within Cisco IOS software are affected by a crafted UDP packet vulnerability. If any of the affected features are enabled, a successful attack will result in a blocked input queue on the inbound interface. Only crafted UDP packets destined for the device could result in the interface being blocked, transit traffic will not block the interface.
Cisco has released free software updates that address this vulnerability.
Workarounds that mitigate this vulnerability are available in the workarounds section of the advisory. This advisory is posted at the following link: http://www.cisco.com/warp/public/707/cisco-sa-20090325-udp.shtml.
•CSCsw24700
Cisco IOS software contains two vulnerabilities within the Cisco IOS WebVPN or Cisco IOS SSLVPN feature (SSLVPN) that can be remotely exploited without authentication to cause a denial of service condition. Both vulnerabilities affect both Cisco IOS WebVPN and Cisco IOS SSLVPN features:
1. Crafted HTTPS packet will crash device - Cisco Bug ID CSCsk62253.
2. SSLVPN sessions cause a memory leak in the device - Cisco Bug ID CSCsw24700.
Cisco has released free software updates that address these vulnerabilities. There are no workarounds that mitigate these vulnerabilities. This advisory is posted at the following link: http://www.cisco.com/warp/public/707/cisco-sa-20090325-webvpn.shtml
•CSCso04657
Symptoms: SSLVPN service stops accepting any new SSLVPN connections.
Conditions: A device configured for SSLVPN may stop accepting any new SSLVPN connections, due to a vulnerability in the processing of new TCP connections for SSLVPN services. If "debug ip tcp transactions" is enabled and this vulnerability is triggered, debug messages with connection queue limit reached will be observed. This vulnerability is documented in two separate Cisco bug IDs, both of which are required for a full fix: CSCso04657 and CSCsg00102.
Open Caveats - Release 12.4(11)XW8
There are no open caveats in this release.
Resolved Caveats - Release 12.4(11)XW8
CSCse70333 CFwdAll erroneously reconfigured after disabling night serviceSymptom CFwdAll incorrectly appears after night service is disabled.
Conditions CFwdAll was initially configured via softkey and un-configured via CLI. On the same dn as CFwdAll was on, night service is enabled and disabled.
Workaround Remove CFwdAll via softkey or reload the router.
CSCsj38755 Ping Fails over ATM interface.Symptom Ping fails over the atm interface while applying Quality of Service.
Conditions When we configure the qos on ATM interfaces on the back to back connected routers the ping fails.
Workaround There is no workaround.
CSCsl26765 DTMF not detected by CUE if I/C call is txfer to ph with CFDWALL to VMSymptom On CUBE DTMF is not detected to stop prompt playback or record message.
Conditions When the REMOTE incoming call is transferred to SCCP phone with CFWDALL to CUE-VM, DTMF is not detected to stop prompt playback or message recording. If original caller was LOCAL and followed the same call sequence, then there was no issue
Workaround There is no workaround.
CSCsm23378 DTMF transcoding from rtp-nte to in-band fails for same codecSymptom DTMF transcoding should be done between call legs if DTMF relay is different, even if voice codecs are the same.
Conditions If voice codecs are the same, but DTMF relay settings are different then no transcoding is done. But when voice codecs are different then transcoding is invoked, and DTMF is transcoded from rtp-nte to in-band.
Workaround There is no workaround.
CSCsm34706 CUBE sends fixed DTMF duration and ignores received H.245 User InputSymptom CUBE sends a fixed 800 time units for every digit pressed (sent via RFC 2833) regardless of what it receives in the duration of a H.245 User Input field.
Conditions In H323-SIP interworking scenario on CUBE, for DTMF conversion from 245-alphanumeric to RFC2833, regardless of the duration received in H.245 User Input field, CUBE always sends a fixed 800 ms for every digit pressed (sent via RFC 2833).
Workaround There is no workaround.
CSCsm37093 CME 4.1after security is enabled 7970 will register with US locale.Symptom After security is enabled locale in the phone 7970 cannot be changed.
Conditions Customer cannot leave security enabled and configure their locale on . Cisco 7960 and Cisco 7940 donot present the issue as they have the firmware locally stored (flash)
CSCsm64258 ephone-hunt group does NOT present calls to overlaid DNsSymptom When an ephone hunt-group is configured with 'present-call idle-phon', the ephone hunt-group skips the DNs which are configured as overlay.
Conditions The problem is observed under the folowing conditions:
- ephone hunt-group is configured with 'present-call idle-phone'
- DN is configured as overlay
Workaround Remove the 'present-call idle-phone' configuration from the ephone-hunt configuration and do not use overlaying.
CSCsm74560 phone does not look for network locale file for user defined languagesSymptom Wireless IP phone 7920 doesnot download the 7960-tones.xml files when user defined network locale is configure.
Conditions CME writes incomplete XML tags in the phone config file, for user defined language network locale. So phone cannot generate the query for the relevant network locale file.
Workaround Complete the following steps to resolve the problem:
a. Along with User defined, we also need to define inbuilt network locale. For example:
–DE - Germany
– telephony- service
– network- locale DE
– create cnf- files
b. Rename the user defined file to 'germany_7960-tones.xml'.
c. Replace the file under ITS directory with the new 'germany_7960-tones.xml' (Make sure the name is the system defined name).
d. Do not run 'create cnf-file' as it will again override with the system defined parameters.
e. Reboot the 7921 wireless phone.
In case if you have issue in 'create cnf-file', then ensure to repeat all the steps mentioned above again.
CSCsm88771 CME trunk optimized calls being put on hold automaticallySymptom Answering a trunk call transferred from another phone is automatically put on hold and cannot be resumed.
Conditions The call originally came in on a trunk dn and is transferred to another extension on a phone sharing that trunk. Trunk optimization takes place.
Workaround There is no workaround.
CSCsm89158 7921 does not display call park number while the call is parkedSymptom 7921 does not show the parked number when the call is parked .
Conditions UC520W-16U-4FXO-K9 and 7921(CP7921G-1.0.3.LOADS)
Workaround There is no workaround.
CSCso25982 SIP transfer at connect with No AudioSymptom No audio when one SIP extension transfers a call from PSTN side to second SIP extension.
Conditions The call flows from PSTN to SIP Extension-A, transfer at connect to SIP Extension-B.Make a call from PSTN to DID number of SIP extension-A, extension-A answers. SIP extension-A transfer-at-connect to SIP extension-B, Extension-B answers. Extension-A completes the transfer by pressing transfer button. PSTN and Extension-B gets connected but NO AUDIO.
Workaround There is no workaround.
CSCso26056 SIP Extension unable to transfer at alert to a PSTN numberSymptom SIP(XOR) extension is also UNABLE to retrieve the call to PSTN-A(XEE) (hold state).
PSTN-A(XEE) remains in hold state.
Conditions "No supplementary-service sip refer" XEE coming to CME through SIP trunk, to SIP phone XOR, consultation transfer to XTO going out through SIP trunk. The SIP trunk dial-peer has same destinationpattern as pots dial-peer, and pots dial-peer needs to have preference lower than SIP trunk dial-peer.
Workaround Use "supplementary-service sip refer" or remove pots dial-peer with same destination pattern or make SIP trunk dial-peer preference lower than pots dial-peer.
CSCso27097 One way audio after xferring incoming SIP trunk call with transcoderSymptom One way audio after transfer.
Conditions XEE SIP trunk or phone, XOR SIP Phone, XTO sccp. XEE codec is different from XOR codec, using transcoder.
Workaround Try to use same codec.
CSCso36239 wrong primary-phone observed after re-configure primary-dn of the ephoneSymptom Wrong primary-phone observed after re-configure primary-dn of the ephone
Conditions Wrong primary-phone observed after re-configure primary-dn of the ephone
Workaround There is no workaround.
CSCso39201 ephone gets into DND mode while in Connected stateSymptom 7961 and 7941 phones going into DND mode in Connectd state.
Conditions User getting incoming call on 7941 and 7961 phones . Since the softkeys donot update fast, if the user presses DND immediately after going into connected state then after going onhook the user phone would stuck in DnD mode.
Workaround There is no workaround.
CSCso42145 CCME ephone name config result in called number display issueSymptom IP phone is displaying the calling name in placed of called name for an incoming call from PSTN.
Conditions The problem exists in 12.4(15)XW code.
Workaround There is no workaround.
CSCso45361 High jitter in ringback from CUESymptom External caller gets transferred from CUE to an internal DN number, and the ringback sent to the caller is distorted because of jitter.
Conditions Internal DN to Internal DN ringbacks on CUE are fine, only external calls.
Workaround There is no workaround.
CSCso56824 SCCP OOB-RFC2833 DTMF interworking issue for CME customerSymptom RFC2833 DTMF packets are sent too fast to be processed by IVR systems.
Conditions Send DTMF tone via RTP-NTE.
Workaround There is no workaround.
CSCso64585 redundant CallRemoteMultiLine sccp msg to monitor park DNSymptom Jitter or voice qality issue may occur.
Conditions If there are a lot of ephones, say there are 50, monitoring same park DN, there will be 2500 same sccp messages sent to these 50 phones respectively in few mili seconds.
Workaround There is no workaround.
CSCso67655 S2 CFD: Secure DSPFarm doesn't register after a reload of the routerSymptom After Reolad, Secure Conference profile does not register with Cisco Call Manager.
Conditions This happens when a specific trustpoint is specified for Cisco Call Manager cert authentication during TLS handshake.
Workaround Do not specify the truspoint when configuring callmanger CCM using CLI "sccp ccm <ip address> tag version <x>.
CSCso74656 MG2:device-based BLF shown incorrect status for EMCSCso78702 7961 IP Phone acct softkey get "no park number available"Symptom 2851 Version 12.4(15)T4 press the ACCT SoftKey and get "NO PARK NUMBER AVAILABLE".
CSCso95643 sRTP Package missing in c1861Symptom MGCP srtp-package option is not available in c1861 platform.
Conditions This occurs on Cisco 861 only.
Workaround There is no workaround.
Open Caveats - Release 12.4(11)XW7
There are no open caveats in this release.
Resolved Caveats - Release 12.4(11)XW7
•CSCsk62253
Cisco IOS software contains two vulnerabilities within the Cisco IOS WebVPN or Cisco IOS SSLVPN feature (SSLVPN) that can be remotely exploited without authentication to cause a denial of service condition. Both vulnerabilities affect both Cisco IOS WebVPN and Cisco IOS SSLVPN features:
1. Crafted HTTPS packet will crash device - Cisco Bug ID CSCsk62253.
2. SSLVPN sessions cause a memory leak in the device - Cisco Bug ID CSCsw24700.
Cisco has released free software updates that address these vulnerabilities. There are no workarounds that mitigate these vulnerabilities. This advisory is posted at the following link: http://www.cisco.com/warp/public/707/cisco-sa-20090325-webvpn.shtml
•CSCsl62609
Multiple vulnerabilities exist in the Session Initiation Protocol (SIP) implementation in Cisco IOS that can be exploited remotely to trigger a memory leak or to cause a reload of the Cisco IOS device.
Cisco has released free software updates that address these vulnerabilities. Fixed Cisco IOS software listed in the Software Versions and Fixes section contains fixes for all vulnerabilities addressed in this advisory.
There are no workarounds available to mitigate the effects of any of the vulnerabilities apart from disabling the protocol or feature itself, if administrators do not require the Cisco IOS device to provide voice over IP services.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20080924-sip.shtml.
•CSCsk60020
The Secure Shell server (SSH) implementation in Cisco IOS contains multiple vulnerabilities that allow unauthenticated users the ability to generate a spurious memory access error or, in certain cases, reload the device.
The IOS SSH server is an optional service that is disabled by default, but its use is highly recommended as a security best practice for management of Cisco IOS devices. SSH can be configured as part of the AutoSecure feature in the initial configuration of IOS devices, AutoSecure run after initial configuration, or manually. Devices that are not configured to accept SSH connections are not affected by these vulnerabilities.
Common Vulnerabilities and Exposures (CVE) identifier CVE-2008-1159 has been assigned to this bug.
The Security Advisory for this issue is posted at
http://www.cisco.com/warp/public/707/cisco-sa-20080521-ssh.shtml.
CSCsi55685- kron removes recurring tclsh cli after first runSymptom The following recurring kron schedule fails and gets removed after the first run. kron occurrence tcl in 1 recurring policy-list tcl ! kron policy-list tcl cli tclsh disk0:hello.tcl!
Conditions enter the following configuration commands: kron occurrence tcl in 1 recurring policy-list tcl ! kron policy-list tcl cli tclsh unix:hello.tcl ! create a file on disk0: called hello.tcl with the following contents: puts "hello"
Workaround None
CSCsk25697- unprotected buginf may cause cpuhog under repeated udp traffic to 53Symptom A router with DNS server configured may show CPUHOG tracebacks when it receives repeated crafted udp packets to its port 53. Sample for 3800 router: %SYS-3-CPUHOG: Task is running for (40004)msecs, more than (2000)msecs (5/0),process = DNS Server Input. -Traceback=0x60D68CDC 0x6033D984 0x6180E58C FFFFFFA0 3F 4E 60 0x708DFD18 06 FFFFFFFE FFFFFF88 FFFFFFA5 FFFFFFA3 FFFFFF92 FFFFFFA7 FFFFFF8B 7A 3A FFFFFFF5 17 FFFFFF9B FFFFFFC9 FFFFFF9B FFFFFFA2
Conditions Router needs to have dns server configured and listen to udp port 53 conf t ip dns server end
Workaround Apply rate limit to port 53 to interfaces facing untrusted networks: access-list 100 permit udp any any eq domain access-list 100 deny ip any any interface GigabitEthernet0/0 ip address 10.2.2.2 255.255.255.0 rate-limit input access-group 100 8000 1500 2000 conform-action transmit exceed-action drop.
CSCsl48237- incorrect bounding length in sstrncpy() calls in l2tp filesSymptom If a large name string is used when configuring the command "security crypto-profile" under the l2tp-class submode, we could have a buffer overflow which may crash the router.
Conditions This problem only occurs if a large name string is used in the "security crypto-profile" command.
Workaround There is no workaround.
CSCsl59294- %DATACORRUPTION-1-DATAINCONSISTENCY at caplog_logger_procSymptom A Cisco router may see the following error once shortly after bootup: *Nov 21 15:16:28 CDT: %DATACORRUPTION-1-DATAINCONSISTENCY: copy error, -PC= 0x416DE178 -Traceback= 0x412593C0 0x41276250 0x412947F4 0x416DE178 0x416DE650 0x423E303C 0x423E3020 *Nov 21 15:16:28 CDT: %DATACORRUPTION-1-DATAINCONSISTENCY: copy error, -PC= 0x416DE188 -Traceback= 0x412593C0 0x41276250 0x412947F4 0x416DE188 0x416DE650 0x423E303C 0x423E3020 No functional impact is seen.
Conditions Occurs on a Cisco 2811 router running Cisco IOS Release 12.4(13d).
Workaround Disable the following configuration on the router: voice hpi capture buffersize voice hpi capture destination filename
CSCek41543- Cisco2811 Processor Pool Memory Leak in ISDN and CrashSymptom A Cisco 2811 router running Cisco IOS Release 12.4(7a) may have a memory leak in the ISDN process as has been seen in the show process memory. The leak rate appears to be about 1.20MB/Hour.
Conditions This symptom has been observed with BRI-U interface that is UP/UP (spoofing).
Workaround Administratively shut down the BRI interface.
CSCsi21389- One-way multicast traffic over wireless.Symptom Routers that have the ability to use the optional 802.11b/g card, such as the Cisco ISR series do not pass multicast traffic across the wireless interface.
Conditions Cisco routers that have the 802.11 b/g HWIC card do not pass multicast traffic across the wireless interface, though multicast routing is enabled and otherwise is configured normally. Wireless hosts cannot pass multicast traffic between each other, and multicast traffic from the wired network will not be transmitted out the wireless interface.
Workaround None
CSCsi44510- CME multicast audio to the 7921 cuts out on HWIC-APSymptom Multicast audio to the 7921 cuts out after a few seconds and will not resume.
Conditions A 7921 registered to CME doing multicast paging or multicast MOH
Workaround none
CSCsj14277- Wrong Calling ID by transfer, only with 7931 - 12.4(4)XC6Symptom The caller id on the transfer-to is not updated with the transferee after the transferor commits the transfer.
Conditions When the transfer-to answers the call from the transferor, the caller id on the transfer-to shows that the call is from transferor. After the transferor commits the the transfer, the caller id should be updated with the transferee. This caller id display issue can be observed if the transferor DN is shared by the transfer-to.
Workaround There is no workaround without removing the XOR DN from the XTO.
CSCsj34770- Having problem in establishing QSIG Prime callSymptom QSIG PRIME call is not going between slave and master routers
Conditions This issue is seen in 12.4(16.5)T
Workaround No workaround
CSCsj50982- Wrong isdn cause code while making call to wrong destinationSymptom Wrong isdn cause code comming while making call to wrong destination
Conditions While call made to wrong destination number
Workaround none
CSCsk25697- unprotected buginf may cause cpuhog under repeated udp traffic to 53Symptom A router with DNS server configured may show CPUHOG tracebacks when it receives repeated crafted udp packets to its port 53. Sample for 3800 router: %SYS-3-CPUHOG: Task is running for (40004)msecs, more than (2000)msecs (5/0),process = DNS Server Input. -Traceback= 0x60D68CDC 0x6033D984 0x6180E58C FFFFFFA0 3F 4E 60 0x708DFD18 06 FFFFFFFE FFFFFF88 FFFFFFA5 FFFFFFA3 FFFFFF92 FFFFFFA7 FFFFFF8B 7A 3A FFFFFFF5 17 FFFFFF9B FFFFFFC9 FFFFFF9B FFFFFFA2.
Conditions Router needs to have dns server configured and listen to udp port 53 conf t ip dns server end.
Workaround Apply rate limit to port 53 to interfaces facing untrusted networks: access-list 100 permit udp any any eq domain access-list 100 deny ip any any interface GigabitEthernet0/0 ip address 10.2.2.2 255.255.255.0 rate-limit input access-group 100 8000 1500 2000 conform-action transmit exceed-action drop.
CSCsk71610- CCSIP_UDP_SOCKET causes high CPU UsageSymptom Incoming and outgoing calls fail due to high CPU Usage.
Conditions CPU Usage is at 99-100% and CCSIP_UDP_SOCKET is using 88+%.
Workaround There is no workaround.
CSCsl18024- HWIC Country Code IssueSymptom Error message %DOT11-3-POWERS_INVALID: Interface Dot11Radio0/3/0, no valid power levels available is displayed during boot up.
Conditions Occurs for cerain HWIC-AP cards with wrong country code values
Workaround Work around is to use HWIC AP cards of correct country code values.
CSCsl59294- %DATACORRUPTION-1-DATAINCONSISTENCY at caplog_logger_procSymptom A Cisco router may see the following error once shortly after bootup: *Nov 21 15:16:28 CDT: %DATACORRUPTION-1-DATAINCONSISTENCY: copy error, -PC= 0x416DE178 -Traceback= 0x412593C0 0x41276250 0x412947F4 0x416DE178 0x416DE650 0x423E303C 0x423E3020 *Nov 21 15:16:28 CDT: %DATACORRUPTION-1-DATAINCONSISTENCY: copy error, -PC= 0x416DE188 -Traceback= 0x412593C0 0x41276250 0x412947F4 0x416DE188 0x416DE650 0x423E303C 0x423E3020 No functional impact is seen.
Conditions Occurs on a Cisco 2811 router running Cisco IOS Release 12.4(13d).
Workaround Disable the following configuration on the router: voice hpi capture buffersize voice hpi capture destination filename.
CSCsm04209- PVDM2-DM fails to initiate calls over EuroISDN BRI while TEI is inactive.Symptom Modem calls fail to establish when 'isdn tei-negotiation firstcall' configured on ISDN interfaces.
Conditions The ISDN BRI interfaces are added to CSM signaling interface queue only when they are active (layer 2, MULTI-FRAME-ESTABLISHED). Since, the ISDN L2 is not activated until the first call is initiated which inturn means there is no signaling interface available, which results in call failure.
Workaround Add the ISDN BRI interfaces to CSM signaling interface if they are not administratively down (shutdown).
CSCsm45689- UC520 crashed when system test was executed with debug logs enabled.Symptom UC520 crashed when system test was executed with debug logs enabled.
Conditions UC520 crashed when system test was executed with the below debug logs enabled. debug callmon core debug callmon info debug callmon detail debug ccsip message.
Workaround None.
CSCsm46227- Router crash with CPUHOG for trunk port monitoring.
Symptom Cisco 3845 may crash when there is an incoming trunk call.
Conditions Occurs if the shared trunk DN is monitored by a FXO port and it is call-forwarded to another trunk DN with "call-forward all".
Workaround None.
CSCsm49011- VG224 SCCP port plays reorder before CM routes call-IOS interdigit timer.Symptom On an FXS port configured for SCCP usage (such as on a VG224), reorder is heard 10 seconds after the last digit dialed when a number is dialed that requires waiting for interdigit timeout on CallManager.
Conditions Using SCCP controlled FXS port on an IOS box. Dialing a number which requires waiting for interdigit timeout to route (such as a variable length international number).
Workaround Increase the interdigit timeout setting on each SCCP FXS port to 16 secs (to be greater than CallManager's 15 secs). This is done by configuring "timeouts interdigit 16" under each voice port. OR decrease the CallManager interdigit timeout to 9 seconds (to be less than the VG224 port's 10 secs). This is done by changing the CallManager service parameter T302 Timer value to 9000 msec (9 seconds). If this workaround is chosen the new interdigit timeout setting will apply to all devices attached to the CallManager, not just the IOS SCCP FXS ports.
CSCsm55045- Crash illegal deallocation of unassigned/in-use memory.Symptom A Cisco router configured with Call Manager Express (CME) may reload due to point to illegal deallocation of unassigned/in-use memory.
Conditions Occurs when CME is enabled.
Workaround There is no workaround.
CSCsm50874- CME: calling name in facility IE doesn't display on IP phone.Symptom CME 4.2 does not display calling name when sent in an ISDN facility IE message. The facility is received and interpreted correctly however it doesn't show up on the IP phone display.
Workaround IOS 12.4(11)XW3 and 12.4(15)XY correct display the calling name.
CSCsm65685- Need to enable vendorConfig parameters on 7912.Symptom After the configuraiton of telephony-service service phone settingsAccess 2 <settingsAccess>2</settingsAccess>" is missing in system:/its/XMLDefault7921.cnf.xml.
Workaround None.
CSCsm92260- CSKU wrong country code issue.Symptom Error message Feb 28 08:50:28.459: %DOT11-3-POWERS_INVALID: Interface Dot11Radio0/0/0, no valid power levels available seen on router console during router boot up.
Conditions Occurs for cerain CSKU cards with wrong country code values.
Workaround Work around is to use CSKU cards of correct country code values.
CSCso33776- spurious access error in AFW_M_Destination_Initiate.Symptom Spurious memory access messages may be generated by a router. Mar 28 02:45:02.016: %ALIGN-3-SPURIOUS: Spurious memory access made at 0x41DCE7E0 reading 0x60 Mar 28 02:45:02.016: %ALIGN-3-TRACE: -Traceback= 0x41DCE7E0 0x41DCF674 0x41DD351C 0x41DD6BBC 0x41DA96CC 0x41E0E428 0x41E0F2C4 0x41DF36D4. This issue may be cosmetic in nature.
Conditions These spurious memory accesses may be triggered by a T1/E1 PRI call or other event.
Workaround There is no known workaround. This issue may be cosmetic in nature.
Open Caveats - Release 12.4(11)XW6
There are no open caveats in this release.
Resolved Caveats - Release 12.4(11)XW6
CSCsg91306Multiple vulnerabilities exist in the Session Initiation Protocol (SIP) implementation in Cisco IOS that can be exploited remotely to trigger a memory leak or to cause a reload of the Cisco IOS device.
Cisco has released free software updates that address these vulnerabilities. Fixed Cisco IOS software listed in the Software Versions and Fixes section contains fixes for all vulnerabilities addressed in this advisory.
There are no workarounds available to mitigate the effects of any of the vulnerabilities apart from disabling the protocol or feature itself, if administrators do not require the Cisco IOS device to provide voice over IP services.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20080924-sip.shtml.
CSCsi17020A series of segmented Skinny Call Control Protocol (SCCP) messages may cause a Cisco IOS device that is configured with the Network Address Translation (NAT) SCCP Fragmentation Support feature to reload.
Cisco has released free software updates that address this vulnerability. A workaround that mitigates this vulnerability is available.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20080924-sccp.shtml.
CSCsj85065A Cisco IOS device may crash while processing an SSL packet. This can happen during the termination of an SSL-based session. The offending packet is not malformed and is normally received as part of the packet exchange.
Cisco has released free software updates that address this vulnerability.
Aside from disabling affected services, there are no available workarounds to mitigate an exploit of this vulnerability.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20080924-ssl.shtml.
CSCsk42759Multiple vulnerabilities exist in the Session Initiation Protocol (SIP) implementation in Cisco IOS that can be exploited remotely to trigger a memory leak or to cause a reload of the Cisco IOS device.
Cisco has released free software updates that address these vulnerabilities. Fixed Cisco IOS software listed in the Software Versions and Fixes section contains fixes for all vulnerabilities addressed in this advisory.
There are no workarounds available to mitigate the effects of any of the vulnerabilities apart from disabling the protocol or feature itself, if administrators do not require the Cisco IOS device to provide voice over IP services.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20080924-sip.shtml.
CSCso81854Multiple Cisco products are vulnerable to DNS cache poisoning attacks due to their use of insufficiently randomized DNS transaction IDs and UDP source ports in the DNS queries that they produce, which may allow an attacker to more easily forge DNS answers that can poison DNS caches.
To exploit this vulnerability an attacker must be able to cause a vulnerable DNS server to perform recursive DNS queries. Therefore, DNS servers that are only authoritative, or servers where recursion is not allowed, are not affected.
Cisco has released free software updates that address these vulnerabilities.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20080708-dns.shtml.
This security advisory is being published simultaneously with announcements from other affected organizations.
CSCsk61275 no ring on 7941 phone while hunting second overlay numberSymptom The Cisco Unified IP Phone 7941 does not ring while hunting the second overlay number in Call Forward No Answer (CFNA) configuration.
Conditions Overlay button is configured on Cisco 7941, and CFNA is configured from the first number to the second number.
Workaround Use Cisco IOS Release 12.4(11)XJ3 or Cisco IOS Release 12.4(11)T3.
CSCsk09132 Hotice router crashed with debug parser before-after and session-serverSymptom The router crashes when the maximum permissible number of session-servers are configured for a voice register dn with the command 'session-server 1 2 3 4 5 6 7 8'.
Conditions A voice register dn should be configured.
Workaround This symptom can be worked around if one less than the number of maximum session-servers are configured. 'session-server 1 2 3 4 5 6 7 ' should solve this problem if it occurs.
CSCsj81015 IPIP Gateway crash ccsip_bridgeSymptom Cisco Multiservice IP-to-IP Gateway (IPIPGW) crashes during a stress scenario.
Conditions This symptom occurs in a stress scenario with 100 SIP-H323 calls + 150 SIP-H323 DTMF interworking (rtp-nte to h245-alpha) calls.
Workaround There is no workaround.
CSCsk42299 IPIPGW h323 no H.245 TCS with FS-SS interwork call to CCMSymptom Cisco IPIPGW does not establish TCP connection for H.245 on the TCP port suggested by Cisco Unified CallManager (CCM).
Conditions The IPIPGW is configured for FS-to-SS interworking. In CCM, the "Wait for Far-End H.245 Terminal Capability Set" option is unchecked.
Workaround There is no workaround.
CSCsj27183 Transcoding: Call fails for H323--SIP Fast start callSymptom H323-->SIP interworking fails for a Fast start call when transcoding is enabled on an IPIPGW. Transcoding is done between G711ulaw and G729r8 codecs.
Conditions This failure is seen for H323--SIP--SIP--SIP and H323--SIP--SIP--H323 call flows when transcoding is enabled on IPIPGW1. It is also seen on H323--H323--H323--SIP call flow for transcoding on IPIPGW2. This is seen only with a Fast Start call (both with H245 Tunnel enabled and disabled), and the call passes with a slow start call.
Workaround There is no workaround.
CSCsl53327 max-ephones and max-dn show wrong range on UC520-48U-SKU.Symptom max-ephones and max-dn show wrong range on UC520-48U-SKU
Conditions This symptom occurs only if the FLU variable is changed.
Workaround Do not change the FLU variable.
CSCsl79588 Router crashes after changing the MOHSymptom Router running Cisco IOS may crash with a bus error.
Conditions The router must be configured to stream MOH (Music-on-Hold) from a .wav file with a header longer than 256 bytes.
Workaround Do not use ".wav" files for Music-on-Hold. Use only ".au" files.
CSCsm20994 kron job daily reoccurrences fail after new yearSymptom kron occurrences are not rescheduled properly when the clock is set near the end of a calendar year.
Conditions A kron occurrence is scheduled daily or hourly. The clock is reset near the end of the year such that the next occurrence of the kron policy would happen in the next year.
Workaround After clock reset, remove/restore kron occurrences to cause them to be scheduled properly.
Open Caveats - Release 12.4(11)XW5
There are no open caveats in this release.
Resolved Caveats - Release 12.4(11)XW5
CSCsk45804 CME speeddials fails after attempting to invalid numberSymptom Pressing a speeddial button on CME does nothing.
Conditions Previously, a speeddial was used to target an unavailable/non-existent number.
Workaround Connect a normal call on the problematic phone.
CSCsk65748 If POE 48V fails to come up, we need to retry 3 timesCSCsk60054 Configuration buffer full. Cannot display show runSymptom When certain configuration changes, the running configuration might not be able to be displayed and the following error message might appear:
% Configuration buffer full, can't add command: !%Aborting Save. Compress the config, Save it to flash or Free up space on deviceConditions The issue is seen either using or not using service compress-config on a Cisco IOS Router running CallManager Express (CME) when configuring more than 22 voice user-profiles.
Workaround There is no workaround.
CSCsk31644 Spurious Access at cmm_crs_proc_tr_call_consult_respSymptom Spurious memory access is seen while executing call forward scenarios.
Conditions This is seen on c3845 while executing CME and UCCX related test scenarios.
Workaround There is no workaround.
CSCsk55078 CME 4.2 Diversion Header issue in chained supplementary serviceCSCsk22265 CME: 7935 and 7936 Corporate Directory Lookup fails in CME 4.1 and 4.2Symptom When attempting to use the Corporate Directory Lookup feature on a Cisco 7935 or 7936 Conference IP Phone, an attempt to search for matching records using a First Name or Last Name query results in the message "Server not found" being returned.
Conditions This behavior is observed when the Cisco 7935 and 7936 Conference IP Phones are registered to a Cisco Unified Call Manager Express (CUCME) Voice Router installed with CUCME version 4.1 or newer (IOS 12.4(15)T train and newer, or 12.4(11)XJ and newer). The 7935 and 7936 IP Phones can be installed either with the approved SCCP Firmware Version 7.x or 8.x phone loads.
Workaround (1) This problem is not observed in CUCME 3.3 (IOS 12.4 mainline) up to 4.0(2) (IOS 12.4(11)T3). If CUCME 4.1 features are not required use these older versions of CUCME. (2) Use a non-79x5 IP Phone registered to the same CUCME Voice Router to perform the Local Directory Search.
CSCsk50911 Need to update the max-ephones range for various platformsCSCsk25651 ephone-dn removal does not clean up mwi stateSymptom With Cisco Unity Express (CUE) integrated to Cisco Unified Communication Manager (CUCM) / CallManager utilizing SRST functionality, when the IP phones are registered to the SRST router, the MWI states may be incorrect.
Conditions When a phone registers to an SRST router, each directory number (DN) gets a particular ephone-dn number that will have a particular MWI state. If the phone unregisters from the SRST router and later re-registers to the router (possibly due to an intermittent connectivity to the CUCM), the ephone-dn number may be different since the ephone-dn numbers are assigned sequentially in a first-come-first-served fashion. The MWI state, however, is remembered from the previous registration that used the ephone-dn number so the MWI status could be incorrect.
Workaround There is no workaround.
CSCsj53899 Remove xlate profile from voice register dn removes from dial-peerSymptom Removing voice xlate profile from a voice register dn results in the same xlate profile being removed from a dial-peer.
Conditions Have the same xlate profile name under a voice register dn and dial-peer and using IOS 12.4(11)XW - XW2.
Workaround There is no workaround.
CSCsj93762 Resume fails after HOLD for SIP phones regist with voice-class codecCSCsj81363 FRU incorrect and Carrier Set empty on wireless B sku platformsSymptom Under the show controller output for the Dot11 interface, the carrier set field is empty. This should say Americas. This does not affect functionality, all of the correct channels are present. Under the show diag output, the FRU says CISCO1811W-AG-A/K9 instead of CISCO1811W-AG-B/K9. This is just the labeling and does not affect functionality.
Conditions This is seen with the B models of the 1800 wireless routers running 12.4(11)XW1.
Workaround There is no workaround. This issue does not affect functionality.
CSCsk42889 SIP call xfer to voicemail fails with DNS Query failed errorSymptom SIP trunk----CME/CUE AA---xfer extension---CFNA---CUE voicemail. Call transfers from AA to extension, CFNA back to CUE voicemail drop.
Conditions CME running 12.4(11)XW3.
Workaround There is no workaround.
CSCsk58359 Update max sip phone range for various platformCSCse14595 call may be connected while being cfna to an PSTN callSymptom CME allows call connect after CFNA timer expire. On the 3745 with IOS 12.4(5)a customer can pick up the phone and get connected to the calling party after the CFNA timer expire.
Conditions When this problem is seen then there is a delay between Call-proc and Alerting messages from ISDN side.
Workaround Use the longer CFNA timer or use the "application default.c.old".
CSCsk35315 CME: calledName= displayed garbled charactersSymptom Display on Cisco IP Phone contains corrupted characters when placing outbound PSTN call on an ISDN circuit.
Conditions A Cisco IP Phone placing an outbound ISDN call through a Cisco IOS gateway configured for Cisco Unified Communication Manager Express may experience at times the name displayed on the screen with unrecognizable characters once the call connects.
This can occur if there is an ISDN Facility message received after the call connects that does not contain display name information; for example an inbound facility message for Advice of Charge (AOC) may trigger this problem.
These messages can be seen on the gateway through the use of debug isdn q931. Caution should be taken when enabling any debugs on a production router/gateway as it can impact performance. Make sure as a minimum to disable console logging on the IOS device before enabling any debug. This issue does not have an impact to the operation or performance of the gateway nor phone.
Workaround Contact the ISDN service provider to determine if the facility messages causing this problem can be disabled.
CSCsk16153 Modem won't be disconnected on exitSymptom Modem connection is still active on exit.
Conditions After "exit" from modem session.
Workaround There is no workaround.
CSCsk73035 dtmf stop working if using connection plar opx immediate on fxo portSymptom dtmf stop working if using connection plar opx immediate on fxo port.
Conditions Cu is running 124-11.XW on uc520. the dtmf does not work in the following call flow:
pstn--fxo---gw--sip--cue AAIf removing "immediate" from the following config,the dtmf works.voice-port 0/1/0connection plar opx immediate 111caller-id enableWorkaround Don't use "immediate" option for the "connection plar opx".
CSCsk46424 Authentication fails on main dot11 interface when xconnect configuredCSCsk52683 System crashed when wireless client is trying to associate with APSymptom System crashes when there are clients trying to associate with AP.
Conditions When AAA authentication fails with mis-configuration in the system or the wireless client's password is given wrong to try to associate.
Workaround Make sure the AAA configuration is setup correctly and the client password is configured correctly.
CSCsk17498 Per Port Storm-Control is brokenCSCsj88854 Router crashes when a call is made from Remote Phone registered to CUCMESymptom A call made over a SIP trunk from a remote phone registered to Cisco Unified Call Manager Express 4.1 to a phone registered to a SIP proxy server results in router crash due to memory overrun.
Conditions Phone call has to be from remote phone. MLPPP should be configured as the WAN link. SIP trunk also traverses the same WAN link.
Workaround Remove the MLPPP.
CSCsj02456 HTTP PUT operation using copy command failedSymptom HTTP PUT operation using copy command failed.
Conditions Failure is seen with HTTP PUT operation using copy command.
Workaround There is no workaround.
CSCsk83795 call may be disconnected when resetting other ephoneSymptom Call is disconnected when another ephone is reset or unregisters.
Conditions The call on the ephone-dn shared by other phone as non monitor button is disconnected if it is reset or unregisters from the CCME.
Workaround There is no workaround.
CSCsj14565 ACL = deny; sa request ignored when crypto local-address is dynamicSymptom After a reboot of the router, or sometimes during normal operation, an IPsec tunnel fails to initiate. When debug crypto ipsec is enabled, the following error can be seen in the debug output: IPSEC(sa_initiate): ACL = deny; sa request ignored.
Conditions The router is running 12.4(12) or later, and a crypto map name local-address interface statement is present in the configuration, where interface is the name of an interface that has a dynamic IP address configured (e.g. ip address negotiated or ip address dhcp)
For example:crypto map mycryptomap local-address Dialer0interface Dialer0ip address negotiatedWorkaround A short term workaround consists of removing the access-list used in the crypto map, and then adding it again. This will bring up the tunnel as soon as there is an interesting traffic, but the problem may occur again later. Remove the crypto map name local-address interface statement, if possible. Downgrade to a release earlier then 12.4(12).
CSCsk74181 SIP DO-DO - Basic Fax call failsSymptom Fax call fails for a SIP DO-DO call.
Conditions When the CUBE receives a ReINVITE with fax params, it does not forward the same. Instead it sends a BYE and the call gets disconnected.
Workaround There is no workaround.
CSCsl04993 uc520 devices does not get reload via SNMPSymptom Cisco Unified Communications Series Integrated Services routers are not reloaded through SNMP.
Conditions Cisco Unified Communications Series Integrated Services routers (ISRs) are not reloaded using SNMP when you restore the device configuration. Cisco Monitor Manager sends a device-reload request to the device after configuration file is restored; however, Cisco Unified Communications 500 Series ISRs do not accept this request through SNMP.
Workaround To work around this problem, reload the device manually after restoring the configuration file.
CSCsj56438 Crafted EAP Response Identity packet may cause device to reloadSymptom This Cisco Bug ID identifies vulnerability in Cisco's implementation of Extensible Authentication Protocol (EAP) that exists when processing a crafted EAP Response Identity packet. This vulnerability affects several Cisco products that have support for wired or wireless EAP implementations.
This vulnerability is documented in the following Cisco bug IDs:
* Wireless EAP - CSCsj56438* Wired EAP - CSCsb45696 and CSCsc55249This Cisco Security Response is available at the following link: http://www.cisco.com/warp/public/707/cisco-sr-20071019-eap.shtml.
CSCsk66907 %SYS-3-CPUHOG: due to Skinny MOH Server processSymptom PU Hog due to Skinny MOH Server causing phones to unregister:
%SYS-3-CPUHOG: Task is running for (xxx)msecs, more than (xxx)msecs(xxxxxx),process = Skinny MOH Server.xConditions Occurs if Music on Hold (MOH) is being streamed from flash in IOS 12.4(11)XW3.
Workaround Use the live feed option by plugging in a CD player or iPOD or any such device to the MOH port on the UC500. Disable MOH from flash that implies tone on hold (or beep on hold).
CSCsi60392 CME does not send SIP NOTIFY DTMF to CUE-AA after txfer from CUE-VMSymptom No response to DTMF inputs during Auto Attendant session.
Conditions Remote caller (across SIP Trunk) leaves voice message on local subscriber's CUE and then gets transferred to local AA. AA requests DTMF input for prompts played but this is not detected by CUE.
Workaround There is no workaround.
CSCsl12443 CME: TNP phones may experience one way audioSymptom IP phone with FXO trunk config may experience intermittent one way audio. Debug ephone detail will show the following error:
OpenReceiveChannelAck status orcError on socketWorkaround Reboot the phone.
CSCsj38652 Freddo DTMF/cptone issues for Taiwan, Hong Kong, Singapore ComplianceSymptom DTMF levels are 0.3-0.5 dB below minimum limits for DTMF high/low tone signal power for Taiwan, Hong Kong and Singapore.
Conditions This causes under normal conditions.
Workaround Setting the cptone on the voice port to Singapore cures the problem.
CSCsk83813 sip call will pick up the wrong codec type from voice class codecSymptom When a SIP call is established, the Cisco IOS correctly uses the "codec preference 2" setting (G.711ulaw) that is configured in the voice class codec configuration. When this problem occurs, the tone remote control functionality does not work and voice becomes distorted due to the codec mismatch.
Conditions A SIP call consistently uses the incorrect codec type from the "voice class codec" configuration. It should use the value that is configured for "codec preference 1," instead it uses the value that is configured for the "codec preference 2" setting. This issue occurs when the following configuration is used:
voice class codec 1codec preference 1 g729r8codec preference 2 g711ulawdial-peer voice 9191916 potsdescription #1/1:16#0# INUSE 163destination-pattern 19900001429191916port 1/1:16dial-peer voice 555 voiprtp payload-type lmr-tone 107rtp payload-type nte-tone 108voice-class codec 1session protocol sipv2incoming called-number.dtmf-relay rtp-nteno vadUsing 2811Cisco IOS versions: 12.4(17.4)PI1b and 12.4(17.4)PI1aWorkaround There is no workaround.
CSCsk63037 CME 4.2 has broken caller ID featureSymptom Calling name is corrupted for ISDN calls on CME.
Conditions The problem can be seen for every call.
Workaround There is no workaround.
CSCsk95708 10 to 30 sec delay in starting media in secure meet-me conferenceSymptom SCCP messages are delayed by a few seconds for secure calls, this could effect secure dspfarm secure analog endpoints.
Conditions Using secure dspfarm or analog endpoints.
Workaround There is no workaround.
CSCsk42180 Few Objects of CISCO-LICENSE-MGMT-MIB giving wrong values during SNMP waCSCsj94818 C877: ADSL2+ AnnexM: PVC goes to INAC after QoS is appliedSymptom On C877 device for VC which is configured with vbr-nrt and PCR rate higher that VC bandwidth, when changes are introduced (e.g. QoS applied), VC goes in INAC status due to the fact that PCR is higher than physical bandwidth.
Conditions Problem is seen on C877 device with ADSL2+ and with SW releases 12.4(11)XJ3 and 12.4(15)T1.
Workaround Resetting VC resolve issue.
CSCsk06443 SIP TGW sends 183 response even though no response from ISDNSymptom IOS Gateway is sending 183 Response upon receiving retransmission of Invite Request.
Conditions IOS GW has sent 100 trying response to original Invite Request and the call is in progress on other leg. Other leg could be either PSTN OR IP.
Workaround There is no workaround.
CSCsk36600 Router crashes when ExtACL has mixed of tcp host and tcp net with QoSSymptom Router might crash when Extended ACL is applied with mixed of tcp permit statements with host and networks and this acl is applied in the class-map.
Conditions The crash is seen when QOS with this Extended ACL is configured first and ACL statements are defined later.
Workaround Configure permitted host statements successively and do the same for permitted networks. Configure ACL statements first and attach this ACL to class-map later.
CSCsj80906 Router crashes on changing ACL linked to service policySymptom A Cisco router may crash due to a bus error.
Conditions This has been experienced on multiple Cisco router platforms running IOS release 12.4(15)T1. The crash can occur if an access-list linked to a service-policy is removed, or if a service-policy is removed on an interface.
Workaround There is no workaround.
CSCsl17037 CME: Local Directory IssueSymptom Directory numbers that are configured in local directory of CME are not being shown in received calls directory. The number and name shows while call in ringing state but is not showing during connected state.
Conditions This is seen in Inbound call.
Workaround There is no workaround.
CSCsl04115 CM call to CME when Put on Hold, CME Hears FastBusy instead of TOHSymptom Cisco IP Phone placed on hold hears fast busy instead of tone-on-hold.
Conditions A Cisco IP Phone registered with a Cisco Unified CallManager Express (CME) may hear a fast busy tone when placed on hold. This can occur when interworking with Cisco Unified CallManager (CCM) as shown here:
IPPhoneA---CM---H323---CME---IpPhoneB- Phone A calls Phone B- Phone A puts Phone B on Hold.- Instead of playing Tone On Hold, Phone B user hears a fast busy tone.Workaround This behavior was introduced in 12.4(15)T. Either downgrade the IOS version on the CUCME or configure music-on-hold (MOH) to be played from CUCM, instead of TOH.
CSCsk72582 Call in B-ACD drops if answered after hunting second time roundSymptom Calls in B-ACD on CME router drops if the first round hunting is done through the hunt group lines. If the call is not answered, the caller is placed in the queue and hears an announcement with "all agents busy please hold " and so on. When the script hunts again after a timeout and this time, the call is answered, it drops the call completely. All phones in the hunt group will see a display of 1 call in queue for a few seconds before clearing.
Conditions Call drops only after the 1st round of hunting. If the call is answered in the initial hunting, the call connects. Once the caller is in the queue and hears MOH, if the agent (hunt member) answers the call after that the call will drop.
Workaround There is no workaround.
Open Caveats - Release 12.4(11)XW3
There are no open caveats in this release.
Resolved Caveats - Release 12.4(11)XW3
CSCsj97535 BACD functionality broken on freddoCSCsi50316 Fixed linux builds for RDO toolsCSCsh74385 EEM fails to register with the redundancy framework (RF)Symptom It is not possible to configure event manager (EEM) applets for redundancyframework (RF) events:
nms-7206vxr(config)#event manager applet testappnms-7206vxr(config-applet)#event ?application Application specific eventcli CLI eventcounter Counter eventinterface Interface eventioswdsysmon IOS WDSysMon eventnone Manually run policy eventoir OIR eventresource Resource eventsnmp SNMP eventsyslog Syslog eventtimer Timer eventtrack Tracking object eventnms-7206vxr(config-applet)#The keyword for RF is missing as EEM has not registered with RF.
Workaround There is no known workaround.
CSCsj25470 EEM hostnames over 20 characters causes CLI actions to hangSymptom The Cisco Embedded Event Manager may hang and tie up virtual terminal (vty) lines if the devices host name is longer than 20 characters.
Conditions The device has a hostname configured that is longer than 20 characters. The device has an Embedded Event Manager policy which uses the CLI actions or the CLI TCL library. The Embedded Event Manager policy enters configuration mode using the CLI actions or CLI TCL library.
Workaround Use a hostname less than 20 characters.
Open Caveats - Release 12.4(11)XW2
There are no open caveats in this release.
Resolved Caveats - Release 12.4(11)XW2
CSCsg70474Multiple voice-related vulnerabilities are identified in Cisco IOS software, one of which is also shared with Cisco Unified Communications Manager. These vulnerabilities pertain to the following protocols or features:
–Session Initiation Protocol (SIP)
–Media Gateway Control Protocol (MGCP)
–Signaling protocols H.323, H.254
–Real-time Transport Protocol (RTP)
–Facsimile reception
Cisco has made free software available to address these vulnerabilities for affected customers. Fixed Cisco IOS software listed in the Software Versions and Fixes section contains fixes for all vulnerabilities mentioned in this advisory.
There are no workarounds available to mitigate the effects of any of the vulnerabilities apart from disabling the protocol or feature itself.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20070808-IOS-voice.shtml
CSCsi60004Multiple voice-related vulnerabilities are identified in Cisco IOS software, one of which is also shared with Cisco Unified Communications Manager. These vulnerabilities pertain to the following protocols or features:
–Session Initiation Protocol (SIP)
–Media Gateway Control Protocol (MGCP)
–Signaling protocols H.323, H.254
–Real-time Transport Protocol (RTP)
–Facsimile reception
Cisco has made free software available to address these vulnerabilities for affected customers. Fixed Cisco IOS software listed in the Software Versions and Fixes section contains fixes for all vulnerabilities mentioned in this advisory.
There are no workarounds available to mitigate the effects of any of the vulnerabilities apart from disabling the protocol or feature itself.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20070808-IOS-voice.shtml
CSCek78645 Analog phones cannot register with CMESymptom Analog phones when configured as SCCP phones cannot register with CCME.
Conditions This happens under any normal conditions. If the phones are configured as SCCP endpoints, the phones will not register.
Workaround There is no workaround.
CSCsj29857 xfer to ICD failed after conference AASymptom Occurs when an incoming PSTN call to ICD is routed to an agent and the agent conferences AA. If the agent stays in the conference and tries to transfer the AA to ICD, the call sticks there.
Conditions This happens to the incoming PSTN call when trying to transfer the AA to ICD during conferencing.
Workaround This issue has been resolved. The solution is available in the release of CME (4.2)/12.4(11)XW2.
Open Caveats - Cisco IOS Release 12.4(11)XW1
There are no open caveats in this release.
Resolved Caveats - Cisco IOS Release 12.4(11)XW1
CSCsi13312 Authentication fails and unable to login to a factory fresh routerSymptom Authentication with Security Device Manager (SDM) 2.3.3 fails, preventing you from logging into the router through HTTPS, HTTP, SSH, Telnet, console, or any management application.
Conditions This symptom is observed on a Cisco router that is "fresh out of the box" and affects the following routers:
Cisco 800 series
Cisco 1700 series
Cisco 1800 series
Cisco 2700 series
Cisco 2800 series
Cisco 3700 series
Cisco 3800 series
Workaround For extensive information and a workaround, see the following Field Notice:
http://www.cisco.com/en/US/products/ps5855/products_field_notice09186a0080809c8e.shtml
CSCsg62638 CPU usage reaches 99% after nmap scan on port 53Symptom Scan of a router when DNS server is enabled can cause high CPU usage of DNS process itself. Overall performance of the device can deteriorate to some extent.
Solution The only way to rectify this situation is to reboot the device.
Workaround There is no workaround. Cisco recommends upgrading to a fixed software release.
CSCsi56172 CME 4.1 IP phone dropped when trying to complete hardware conferenceSymptom IP phone trying to create an ad-hoc conference is dropped when pressing "Conf" softkey the second time.
Conditions Must be using hardware conferencing in CME 4.1. The IP phone must receive a call first on on overlaid button. This initial call must come in on any DN besides the first DN configured in the "button" command in ephone configuration.
CSCsi58842 CME: 7960+7914 display select line when conference IP phoneSymptom
1. A caller call a person "A".
2. Person "A" answer the call.
3. Person "A" is monitored by the person "B".
4. The person "B" see on his phone that the person "A" has received a call. Also person "B" calls person "A" using the monitor button.
5. Person "A" answers the call, putting the first caller on hold.
6. Person "A" uses the conference softkey "Confirm".
7. The message "Select Line" appears without any effect.
Workaround There is no workaround.
Open Caveats - Cisco IOS Release 12.4(11)XW
There are no open caveats in this release.
Resolved Caveats - Cisco IOS Release 12.4(11)XW
CSCec12299Devices running Cisco IOS versions 12.0S, 12.2, 12.3 or 12.4 and configured for Multiprotocol Label Switching (MPLS) Virtual Private Networks (VPNs) or VPN Routing and Forwarding Lite (VRF Lite) and using Border Gateway Protocol (BGP) between Customer Edge (CE) and Provider Edge (PE) devices may permit information to propagate between VPNs.
Workarounds are available to help mitigate this vulnerability.
This issue is triggered by a logic error when processing extended communities on the PE device.
This issue cannot be deterministically exploited by an attacker.
Cisco has released free software updates that address these vulnerabilities. Workarounds that mitigate these vulnerabilities are available.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20080924-vpn.shtml.CSCsi01470A vulnerability in the Cisco implementation of Multicast Virtual Private Network (MVPN) is subject to exploitation that can allow a malicious user to create extra multicast states on the core routers or receive multicast traffic from other Multiprotocol Label Switching (MPLS) based Virtual Private Networks (VPN) by sending specially crafted messages.
Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are available.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20080326-mvpn.shtml.
CSCek61570 Trunk dn stuck in seize/seize state and does not recoverSymptom The ephone DN may get stuck in SEIZED state and one-way audio would occur afterwards.
Conditions If another call is dropped during trunk dialing, the DN for this terminated call would move to seized state.
Workaround Press ENDCALL softkey twice to move the seized DN to idle state after finishing the 2nd trunk call. To work around the one-way audio issue, the call needs to be transferred out and then transferred back. This workaround is not acceptable.
CSCek67866 xcodemsp.c Static Analysis Found IssueCSCek70830 $$TS: cme crashed during call to ICD routept running 124-11.3.4.PIA1CSCsg36112 In xcoding, SCCP sessions not cleared immediately after abrupt call endSymptom When the calls are terminated/disconnected ungracefully or abruptly on an IPIP GW while doing large number of transcoding sessions, some of the sccp and rtp connection of that calls are not cleared immediately on IPIP Gw.
Conditions This happens only when the transcoding calls on IPIP Gw are disconnected abruptly or ungracefully.
Workaround There is no workaround.
CSCsg40567 Memory leak found with malformed tls/ssl packets in http core processSymptom Malformed SSL packets may cause a router to leak multiple memory blocks.
Conditions This symptom is observed on a Cisco router that has the ip http secure server command enabled.
Workaround Disable the ip http secure server command.
CSCsg69022 c1700 router crash @ nv_write_internalSymptom When a user configures the no telephony-service command, router crashes at running configuration generation.
Conditions This symptom is highly unreproducible, but there is a potential race condition between the running configuration generation and the no telephony-service command.
Workaround There is no workaround.
CSCsh65321 Phones fail to do secure authentication in 12.4(12.12)PI6Symptom Non-7921 phones will not register securely to CME.
Conditions The cnf files for the non-7921 phones have their processNodeName field under CAPF server set to the CAPF IP address. A null value in this field will allow the phones to register securely.
Workaround Remove the processNodeName parameter in the capf server of the phone's cnf file.
CSCsh73754 SmartPorts: PC connected to an IP phone cannot connect to WANCSCsh80217 No Audio Path after REFER from xto to xee in a Meetingplace scenarioSymptom No audio heard on Caller IP phone
Conditions Meeting Place RSNA environment
Workaround Yes Fallback image available
CSCsh81876 Traceback & crash if guest mode and multiple vlansSymptom In case the platform supported number of BSSIDs is 8 then configuring any ssid which comes in the 9th to 16th order in "sh run" as "guest-mode" results in a software crash. In general, if the platform supported BSSIDs considered as X and the maximum supported SSIDs considered as Y then configuring any ssid which comes in the X+1 to Y order(in "sh run") as "guest-mode" results in crash. Problem is not seen on platforms on which supported number of BSSIDs is 16.
Workaround Configure only that ssid as "guest-mode" which comes in the order 1st to X(platform supported BSSIDs) in "sh run" i.e. if the number of platform supported BSSIDs is 8 then configure any ssid as "guest-mode" which comes in the order 1st to 8th in "sh run".
CSCsh89887 One way voice path with h/w conference on ephone-dn w/o preference 0CSCsi03314 test ecdsa display-stats command not displaying outputCSCsi04538 Router crash with memory corruption when configure cert-upgrade auth modSymptom A CUCME (Cisco Unified Call Manager Express) router may crash with memory corruption when voice calls are made involving a transcoder.
Conditions Voice calls should invoke a transcoder in order to see this crash.
Workaround None
CSCsi09530 CME SIP phone failed to register because of authenticate registerSymptom If "authenticate register" is configured under "voice register global", CME SIP failed to registered.
Conditions "authenticate register" is configured under "voice register global", when CME is acting as a RIGISTRAR
Workaround Disable "authenticate register" under "voice register global"
Further Problem Description: In registrar Functionality, CME challenges an inbound Register request with 401 response. If "authenticate register" is configured under "voice register global". The Registering Endpoint then Sends a Register Request with Crdentials. GW Stack is not processing this Request and is dropping it.
CSCsi15740 Memory leak in basic ICD callCSCsi22430 B-ACD Crashes CME 4.2Symptom CME could crash when running B-ACD script while call monitoring is enabled.
Conditions CME could crash if (1) call monitoring is turned AND (2) an incoming call gets routed to any application scripts other than the Default Session.
Workaround The work around is to manually disable callmon before running any non-default applications.
CSCsi27400 Memory leak in TGW for basic SRTP-TLS SIP callSymptom When a basic SIP call with SRTP using TLS is established between OGW and TGW, a memory leak is observed at the TGW.
Conditions For all inbound calls(RTP/SRTP) where which SRTP and SIPS command is enabled.
Workaround There is no workaround
CSCsi31667 SIP Registrations sent to Service Provider Proxy for Internal extentionsCSCsi34163 Restore: Radar Detection for non-European regions.CSCsi42596 router crash when using MeetMe conference with 13 participantsCSCsi44268 $$TS SIP trunk to AA to SIP phone disconnectedProblem Description: Call from sip-trunk to CRS/AA sip-phone, call disconnected after 19 seconds.
Symptom The issues observed after V124_11_3_8_PI1A onwards. there was a major ida_t_pi1_atg sync to PI6 occurred in this label.
1. Two reINVITEs sent by originating gateway, received "500 Internal Server Error" on the 2nd reINVITE.
2. Terminating CME does not ACK on the reINVITE(unhold) received.
Root Cause: In Xfering_SetupDone() when case of CS_ACTIVE, remove calling AFW_Leg_Resume() again when handling special delayDisconnect call-info in REFER. This code is no longer needed since AFW now unhold the sip XEE before shelbourne hairpin.
Workaround There is no workaround.
CSCsi44465 change CME version from 4.1 to 4.2Symptom Change CME product version from 4.1 to 4.2
Workaround There is no workaround.
CSCsi44549 Router crashes during pings when QoS+NAT+FW+IPSEC+GRE are configuredCSCsi47359 Crash seen in AFW_Process at the customer siteCSCsi48062 H323--H323--SIP call fails with media transcoder high-densitySymptom On the IPIPGW, an H.323-to-H.323 call fails to complete call setup.
Conditions This problem happens when this call requires transcoding on the IPIPGW and media transcoder high-density is configured for use. Also, after TCS and MSD negotiation, only one of the OGW and TGW sides initiates the OLC negotiation, but not both.
Workaround The workaround is not to use media transcoder high-density on the dial-peers which would handle such described interconnected calls.
CSCsi51441 uclient cannot ping to gateway via non-native vlanPlease refer Release-note enclosure attached to the DDTS CSCsg58791.CSCsi52410 Add version 6.0 to the available CCM version on dspfarmCSCsi53006 Router crash in cmm_crs_proc_tr_call_trans_reqSymptom CME with UCCX integration could crash at the following function:
cmm_crs_proc_tr_call_trans_req()Conditions The crash would only occur in very rare condition. Indeed the problem is difficult to reproduce. This could happen when an sccp endpoint attempts a consult transfer.
Workaround There is no workaround.
CSCsi69819 Line protocol down when no auto speed and duplex negotiate on onboard FE
Additional References
The following sections describe the documentation available for the Cisco 3700 series routers. Typically, these documents consist of hardware and software installation guides, Cisco IOS configuration and command references, system error messages, feature modules, and other documents. Documentation is available as printed manuals or electronic documents, except for feature modules, which are available online on Cisco.com and the Documentation CD.
Use these release notes with the documents listed in the following sections:
Release-Specific Documents
The following documents are specific to Release 12.4 and apply to Cisco IOS Release 12.4(11)XW. They are located on Cisco.com:
•To reach the Cross-Platform Release Notes for Cisco IOS Release 12.4(15)T, click this path:
Technical Documents: Cisco IOS Software: Release 12.4: Release Notes: Cisco IOS Release 12.4(15)T
•To reach product bulletins, field notices, and other release-specific documents, click this path:
Technical Documents: Product Bulletins
•To reach the Caveats for Cisco IOS Release 12.4 and Caveats for Cisco IOS Release 12.4(15)T documents, which contain caveats applicable to all platforms for all maintenance releases of Release 12.4, click this path:
Technical Documents: Cisco IOS Software: Release 12.4: Caveats
Note If you have an account with Cisco.com, you can also use the Bug Toolkit to find selected caveats of any severity. To reach the Bug Toolkit, log in to Cisco.com, and go to: http://www.cisco.com/cgi-bin/Support/Bugtool/launch_bugtool.pl.
Platform-Specific Documents
Hardware installation guides, configuration and command reference guides, and additional documents specific to the Cisco 3700 series routers are available on Cisco.com at the following location:
http://www.cisco.com/univercd/cc/td/doc/product/access/acs_mod/3700/index.htm
Feature Navigator
Feature Navigator is a web-based tool that enables you to quickly determine which Cisco IOS software images support a particular set of features and which features are supported in a particular Cisco IOS image. Feature Navigator is available 24 hours a day, 7 days a week.
To access Feature Navigator, you must have an account on Cisco.com. If you have forgotten or lost your account information, e-mail the Contact Database Administration group at cdbadmin@cisco.com. If you do not have an account on Cisco.com, go to http://www.cisco.com/register and follow the directions to set up an account.
To use Feature Navigator, you must have a JavaScript-enabled web browser such as Netscape 3.0 or later, or Internet Explorer 4.0 or later. Internet Explorer 4.0 always has JavaScript enabled. To enable JavaScript for Netscape 3.x or Netscape 4.x, follow the instructions provided with the web browser. For JavaScript support and enabling instructions for other browsers, check with the browser vendor.
Feature Navigator is updated when major Cisco IOS software releases and technology releases occur. You can access Feature Navigator at the following URL:
Cisco IOS Software Documentation Set
The Cisco IOS software documentation set consists of the Cisco IOS configuration guides, Cisco IOS command references, and several other supporting documents.
Documentation Modules
Each module in the Cisco IOS documentation set consists of one or more configuration guides and one or more corresponding command references. Chapters in a configuration guide describe protocols, configuration tasks, and Cisco IOS software functionality, and contain comprehensive configuration examples. Chapters in a command reference provide complete command syntax information. Use each configuration guide with its corresponding command reference. Cisco IOS Software Documentation is available in html or pdf form.
Select your release and click the command references, configuration guides, or any other Cisco IOS documentation you need
Obtaining Documentation, Obtaining Support, and Security Guidelines
For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:
http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html
Subscribe to the What's New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS version 2.0.
Use this document in conjunction with the documents listed in the "Additional References" section.
CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco StadiumVision, the Cisco logo, DCE, and Welcome to the Human Network are trademarks; Changing the Way We Work, Live, Play, and Learn is a service mark; and Access Registrar, Aironet, AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation, EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare, SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0804R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
© 2008, Cisco Systems, Inc. All rights reserved.