Datasheet
232
Release Notes for Cisco IOS Release 12.1E on the Catalyst 6500 and Cisco 7600 Supervisor Engine and MSFC
OL-2310-11
Caveats
• After Cisco IOS ACLs have been updated dynamically or after responding dynamically to an IDS 
signature, a reload might occur following attempts to access a low memory address. This problem 
is resolved in Release 12.1(13)E14. (CSCed35253)
• A reload might follow receipt of a corrupt CPD packet. This problem is resolved in 
Release 12.1(13)E14. (CSCec25430)
• Occasionally, multicast traffic that should be completely Layer 3-switched is partially 
Layer 3-switched, which causes multicast packets to be dropped when the ACL TCAM is full. This 
problem is resolved in Release 12.1(13)E14. (CSCin63402)
• High-volume SNMP traffic might cause a reload. This problem is resolved in Release 12.1(13)E14. 
(CSCed79519)
• A VLAN with no active ports might not be shut down correctly. This problem is resolved in 
Release 12.1(13)E14. (CSCed47381)
• Occasionally after a reload, the IDPROM is not read correctly on a WS-X6548-RJ-45 switching 
module that is equipped with a DFC, which holds the module in the “other” state. This problem is 
resolved in Release 12.1(13)E14. (CSCed04988) 
• The following message might be followed by a reload:
%ALIGN-1-FATAL: Corrupted program counter pc=0xX, ra=0xXXXXXXXX, sp=0xXXXXXXXX 
This problem is resolved in Release 12.1(13)E14. (CSCeb48670)
• Routing Information Protocol version 2 (RIPv2) routes get stuck in the routing table, even if the next 
hop interface is down. This problem is resolved in Release 12.(13)E14. (CSCea47597)
• When TTL propagation has been turned off by entering the tag-switching ip propagate-ttl 
command, MPLS TTLs are still copied to IP packets. This problem is resolved in 
Release 12.1(13)E14. (CSCdy47341)
• With both static and dynamic Port Address Translation (PAT) configured and if the ip nat pool 
inside_pool_name command has been entered for only one IP address, the IP addresses that are used 
for overloading might be used as one-to-one translations. This problem is resolved in 
Release 12.1(13)E14. (CSCdx19396)
Resolved General Caveats in Release 12.1(13)E13
• A vulnerability in the Transmission Control Protocol (TCP) specification (RFC793) has been 
discovered by an external researcher. The successful exploitation enables an adversary to reset any 
established TCP connection in a much shorter time than was previously discussed publicly. 
Depending on the application, the connection may get automatically re-established. In other cases, 
a user will have to repeat the action (for example, open a new Telnet or SSH session). Depending 
upon the attacked protocol, a successful attack may have additional consequences beyond 
terminated connection which must be considered. This attack vector is only applicable to the 
sessions which are terminating on a device (such as a router, switch, or computer) and not to the 
sessions that are only passing through the device (for example, transit traffic that is being routed by 
a router). In addition, this attack vector does not directly compromise data integrity or 
confidentiality. 
All Cisco products which contain TCP stack are susceptible to this vulnerability. 
This advisory is available at 
http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml, and it describes this 
vulnerability as it applies to Cisco products that run Cisco IOS® software. 










