Specifications
5
Caveats for Cisco IOS Release 12.0
78-6455-12
Basic System Services
• CSCds13085
A Cisco 7500 series router running Route Switch Processor (RSP1) and Cisco IOS
Release 12.0(10) may experience the following reload and spurious alignments:
System was restarted by bus error at PC 0x601B72E8, address 0x40000060 RSP Software
(RSP-DSV-M), Version 12.0(10), RELEASE SOFTWARE (fc1) Image text-base: 0x60010930,
data-base: 0x60D52000
Stack trace from system failure: FP: 0x613576E0, RA: 0x601B72E8 FP: 0x61357850, RA:
0x6029F13C FP: 0x613578D0, RA: 0x6026E790 FP: 0x61357A08, RA: 0x6029F13C
RSP Software (RSP-DSV-M), Version 12.0(10), RELEASE SOFTWARE (fc1)
Address Count Traceback 37C 1 0x605E95BC 0x60604B10 0x60604BF0 0x60605268 0x606053F4
0x60250104 0x602500F0 14 1 0x601B72DC 0x6029F13C 0x6026E790
There is no workaround.
• CSCds17029
A Cisco 2509 router running Cisco IOS Release 12.0(12) that is configured as an access server may
experience a buffer leak in big buffers:
Big buffers, 1524 bytes (total 1030, permanent 50): 0 in free list (5 min, 150 max
allowed) 1056 hits, 376 misses, 0 trims, 980 created 42 failures (0 no memory)
The router runs short of I/O memory and has to be reloaded. There is no workaround.
• CSCds20054
A Cisco 7200 series router running Cisco IOS Release 12.0(12) may experience a software-forced
reload. There is no workaround.
• CSCds31059
A Cisco 7500 series running Cisco IOS Release 12.0(11) images produces the following error
message:
RSP-2-QAERROR: reused or zero link errors.
The problem occurs infrequently and is only related to using PA-2FEISL as two port FE adapter,
which is not recommended.
There is no workaround.
• CSCds45910
A Route Switch Processor version 2 (RSP2) running Cisco IOS Release 12.0(9) may experience a
buffer leak in the middle buffers. This buffer leak may cause the router to hang when the router runs
out of memory. There is no workaround.
• CSCdr91706
A defect in multiple releases of Cisco IOS software will cause a Cisco router or switch to halt and
reload if the IOS HTTP service is enabled and browsing to
“<code><b>http://<em>router-hostname-or-IP-address</em>/<em>more-text</em>?/
</b></code>” is attempted, and the enable password is supplied when requested. This defect can
be exploited to produce a denial of service (DoS) attack.
This is not the same defect as CSCdr36952.
The vulnerability, identified as Cisco Bug ID CSCdr91706, affects virtually all mainstream Cisco
routers and switches running Cisco IOS software Releases 12.0 through 12.1, inclusive. The
vulnerability has been corrected and Cisco is making fixed releases available for free to replace all
affected Cisco IOS releases. Customers are urged to upgrade to releases that are not vulnerable to
this defect.
This vulnerability can be exploited only if the enable password is known or is not set.