Cisco Gigabit Ethernet Switch Module for HP BladeSystem p-Class Release Notes, Cisco IOS Release 12.2(37)SE and later

18
Cisco Gigabit Ethernet Switch Module for HP BladeSystem p-Class Release Notes, Cisco IOS Release 12.2(37)SE and Later
383623-009
Resolved Caveats
This advisory is posted at
http://www.cisco.com/warp/public/707/cisco-sa-20070808-scp.shtml.
Please Note: The August 08, 2007 publication includes four Security Advisories and one Security
Response. The Advisories all affect Cisco IOS, one additionally affects CuCM as well. Each
Advisory lists the releases that correct the vulnerability described in the Advisory, and the
Advisories also detail the releases that correct the vulnerabilities for all four Cisco IOS issues.
Individual publication links are listed below:
Cisco IOS Information Leakage Using IPv6 Routing Header
http://www.cisco.com/warp/public/707/cisco-sa-20070808-IOS-IPv6-swap.shtml
Cisco IOS Next Hop Resolution Protocol Vulnerability
http://www.cisco.com/warp/public/707/cisco-sa-20070808-nhrp.shtml
Cisco IOS Secure Copy Authorization Bypass Vulnerability
http://www.cisco.com/warp/public/707/cisco-sa-20070808-scp.shtml
Voice Vulnerabilities in Cisco IOS and Cisco Unified Call Manager
http://www.cisco.com/warp/public/707/cisco-sa-20070808-IOS-voice.shtml
Cisco Unified MeetingPlace XSS Vulnerability
http://www.cisco.com/warp/public/707/cisco-sr-20070808-mp.shtml
CSCsj13619
The SCP (Secure Copy Protocol) support is now correctly included in the image. The show file
systems and copy privileged EXEC commands now correctly show scp as an option.
CSCsj19641
The switch no longer drops ARP packets destined to MAC addresses that are close to the MAC
address block of the switch.
Caveats Resolved in Cisco IOS Release 12.2(37)SE
These caveats are resolved in Cisco IOS Release 12.2.(37)SE:
CSCsb12598
Cisco IOS device may crash while processing malformed Secure Sockets Layer (SSL) packets. In
order to trigger these vulnerabilities, a malicious client must send malformed packets during the SSL
protocol exchange with the vulnerable device.
Successful repeated exploitation of any of these vulnerabilities may lead to a sustained
Denial-of-Service (DoS); however, vulnerabilities are not known to compromise either the
confidentiality or integrity of the data or the device. These vulnerabilities are not believed to allow
an attacker will not be able to decrypt any previously encrypted information.
Cisco IOS is affected by the following vulnerabilities:
Processing ClientHello messages, documented as Cisco bug ID CSCsb12598
Processing ChangeCipherSpec messages, documented as Cisco bug ID CSCsb40304
Processing Finished messages, documented as Cisco bug ID CSCsd92405
Cisco has made free software available to address these vulnerabilities for affected customers. There
are workarounds available to mitigate the effects of these vulnerabilities.