Document ID: 112122
Advisory ID: cisco-sa-20100922-bundle
http://www.cisco.com/warp/public/707/cisco-sa-20100922-bundle.shtml
Revision 1.0
For Public Release 2010 September 22 1600 UTC (GMT)
Contents
Summary
Software Versions and Fixes
Obtaining Fixed Software
Status of this Notice: FINAL
Distribution
Revision History
Cisco Security Procedures
Summary
The September 22, 2010, Cisco IOS® Software Security Advisory bundled publication includes six Cisco Security Advisories. Five of the advisories address vulnerabilities in Cisco IOS Software, and one advisory addresses vulnerabilities in Cisco Unified Communications Manager. Each advisory lists the releases that correct the vulnerability or vulnerabilities detailed in the advisory. The table below lists releases that correct all Cisco IOS Software vulnerabilities that have been published on September 22, 2010, or earlier.
Individual publication links are in "Cisco Event Response: Semiannual Cisco IOS Software Security Advisory Bundled Publication" at the following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_sep10.html
This list also includes all individual publication links:
-
Cisco IOS Software H.323 Denial of Service Vulnerabilities
http://www.cisco.com/warp/public/707/cisco-sa-20100922-h323.shtml
-
Cisco IOS Software Internet Group Management Protocol Denial of
Service Vulnerability
http://www.cisco.com/warp/public/707/cisco-sa-20100922-igmp.shtml
-
Cisco IOS Software Network Address Translation Vulnerabilities
http://www.cisco.com/warp/public/707/cisco-sa-20100922-nat.shtml
-
Cisco IOS Software Session Initiation Protocol Denial of Service
Vulnerabilities
http://www.cisco.com/warp/public/707/cisco-sa-20100922-sip.shtml
-
Cisco IOS SSL VPN Vulnerability
http://www.cisco.com/warp/public/707/cisco-sa-20100922-sslvpn.shtml
-
Cisco Unified Communications Manager Session Initiation Protocol
Denial of Service Vulnerabilities
http://www.cisco.com/warp/public/707/cisco-sa-20100922-cucmsip.shtml
This summary page is posted at http://www.cisco.com/warp/public/707/cisco-sa-20100922-bundle.shtml.
Software Versions and Fixes
When considering software upgrades, also consult http://www.cisco.com/go/psirt and any subsequent advisories to determine exposure and a complete upgrade solution.
In all cases, customers should exercise caution to be certain the devices to be upgraded contain sufficient memory and that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, contact the Cisco Technical Assistance Center (TAC) or your contracted maintenance provider for assistance.
Each row of the following Cisco IOS Software table corresponds to a Cisco IOS Software train. If a particular train is vulnerable, the First Fixed Release for All Advisories in the September 2010 Bundle Publication column lists the earliest possible releases that correct all the published vulnerabilities in the Cisco IOS Software Security Advisory bundled publication. Cisco recommends upgrading to the latest available release, where possible.
Major Release |
Availability of Repaired Releases |
|
---|---|---|
Affected 12.0-Based Releases |
First Fixed Release for All Advisories in the September 2010 Bundle Publication |
|
There are no affected 12.0 based releases |
||
Affected 12.1-Based Releases |
First Fixed Release for All Advisories in the September 2010 Bundle Publication |
|
Vulnerable; first fixed in 12.4T Releases up to and including 12.1(4b) are not vulnerable. |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Vulnerable; first fixed in 12.4T Releases up to and including 12.1(3a)T8 are not vulnerable. |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T Releases up to and including 12.1(3)XS are not vulnerable. |
||
Vulnerable; first fixed in 12.4T Releases up to and including 12.1(2)XT2 are not vulnerable. |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Not Vulnerable |
||
Not Vulnerable |
||
Vulnerable; first fixed in 12.4T Releases up to and including 12.1(4)XY are not vulnerable. |
||
Not Vulnerable |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Releases prior to 12.1(5)YE6 are vulnerable, release 12.1(5)YE6 and later are not vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Not Vulnerable |
||
Affected 12.2-Based Releases |
First Fixed Release |
|
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T Releases up to and including 12.2(2)B7 are not vulnerable. |
||
Not Vulnerable |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.2SB Releases up to and including 12.2(15)BX are not vulnerable. |
||
Vulnerable; first fixed in 12.4T Releases up to and including 12.2(2)BY3 are not vulnerable. |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Not Vulnerable |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Releases up to and including 12.2(15)MC1 are not vulnerable. Releases 12.2(15)MC2b and later are not vulnerable; first fixed in 12.4T |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
12.2(33)MRB2 |
||
Releases prior to 12.2(30)S are vulnerable, release 12.2(30)S and later are not vulnerable |
||
12.2(31)SB19 Releases prior to 12.2(33)SB5 are vulnerable, release 12.2(33)SB5 and later are not vulnerable |
||
Vulnerable; first fixed in 12.2SB |
||
Vulnerable; first fixed in 12.2SCB |
||
12.2(33)SCB9 |
||
12.2(33)SCC5 |
||
12.2(33)SCD3 |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Releases prior to 12.2(40)SG are vulnerable, release 12.2(40)SG and later are not vulnerable; migrate to any release in 12.2SGA |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Releases prior to 12.2(33)SRA6 are vulnerable, release 12.2(33)SRA6 and later are not vulnerable |
||
Releases prior to 12.2(33)SRB1 are vulnerable, release 12.2(33)SRB1 and later are not vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
12.2(33)SRE1 |
||
Not Vulnerable |
||
Vulnerable; first fixed in 12.4T |
||
Releases prior to 12.2(29b)SV1 are vulnerable, release 12.2(29b)SV1 and later are not vulnerable; migrate to any release in 12.2SVD |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Releases up to and including 12.2(21)SW1 are not vulnerable. Releases 12.2(25)SW12 and later are not vulnerable; first fixed in 12.4T |
||
Releases up to and including 12.2(14)SX2 are not vulnerable. |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Releases prior to 12.2(18)SXF11 are vulnerable, release 12.2(18)SXF11 and later are not vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Not Vulnerable |
||
Not Vulnerable |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.2SB |
||
Please see Cisco IOS-XE Software Availability |
||
Please see Cisco IOS-XE Software Availability |
||
Please see Cisco IOS-XE Software Availability |
||
Please see Cisco IOS-XE Software Availability |
||
Please see Cisco IOS-XE Software Availability |
||
Please see Cisco IOS-XE Software Availability |
||
Not Vulnerable |
||
Vulnerable; first fixed in 12.4T |
||
Not Vulnerable |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Not Vulnerable |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Releases prior to 12.2(11)YV1 are vulnerable, release 12.2(11)YV1 and later are not vulnerable |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Not Vulnerable |
||
Releases up to and including 12.2(8)ZB are not vulnerable. |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Not Vulnerable |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Not Vulnerable |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Affected 12.3-Based Releases |
First Fixed Release |
|
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Releases up to and including 12.3(2)JK3 are not vulnerable. Releases 12.3(8)JK1 and later are not vulnerable; first fixed in 12.4T |
||
Not Vulnerable |
||
Not Vulnerable |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Vulnerable; first fixed in 12.4T |
||
Releases prior to 12.3(7)XI11 are vulnerable, release 12.3(7)XI11 and later are not vulnerable; first fixed in 12.2SB |
||
Vulnerable; first fixed in 12.4XR |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4XR |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4XR |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Vulnerable; first fixed in 12.4T |
||
Affected 12.4-Based Releases |
First Fixed Release |
|
12.4(25d) |
||
12.4(24)GC2 |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
Not Vulnerable |
||
12.4(24)MD2 |
||
12.4(22)MDA4 12.4(24)MDA1 |
||
Vulnerable; first fixed in 12.4MRA |
||
12.4(20)MRA1 |
||
Vulnerable; first fixed in 12.4T |
||
12.4(15)T14 12.4(20)T6 12.4(24)T4 |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Releases prior to 12.4(6)XE5 are vulnerable, release 12.4(6)XE5 and later are not vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
12.4(15)XQ6; Available on 22-SEP-10 |
||
12.4(15)XR9 12.4(22)XR7 |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; first fixed in 12.4T |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
Vulnerable; Contact your support organization per the instructions in Obtaining Fixed Software section of this advisory |
||
12.4(24)YE1 |
||
12.4(24)YG3 |
||
Affected 15.0-Based Releases |
First Fixed Release |
|
15.0(1)M3 |
||
Cisco 7600 and 10000 Series routers: 15.0(1)S1 (available early October 2010) Please see Cisco IOS-XE Software Availability |
||
Vulnerable; first fixed in 15.1T |
||
Not Vulnerable |
||
Affected 15.1-Based Releases |
First Fixed Release |
|
15.1(2)T1 |
||
Vulnerable; first fixed in 15.1T |
Cisco IOS XE Release |
First Fixed Release for All Advisories in the September 2010 Bundle Publication |
---|---|
2.1.x |
Not Vulnerable |
2.2.x |
Not Vulnerable |
2.3.x |
Not Vulnerable |
2.4.x |
Not Vulnerable |
2.5.x |
Vulnerable; migrate to 2.6.2 or later |
2.6.x |
2.6.2 |
3.1.xS |
Not Vulnerable |
Cisco IOS XR System Software
Cisco IOS XR Software is not affected by the vulnerabilities disclosed in the September 22, 2010, Cisco IOS Software Security Advisory bundled publication.
Obtaining Fixed Software
Cisco has released free software updates that address these vulnerabilities. Prior to deploying software, customers should consult their maintenance provider or check the software for feature set compatibility and known issues specific to their environment.
Customers may only install and expect support for the feature sets they have purchased. By installing, downloading, accessing or otherwise using such software upgrades, customers agree to be bound by the terms of Cisco's software license terms found at http://www.cisco.com/en/US/docs/general/warranty/English/EU1KEN_.html, or as otherwise set forth at Cisco.com Downloads at http://www.cisco.com/public/sw-center/sw-usingswc.shtml.
Do not contact psirt@cisco.com or security-alert@cisco.com for software upgrades.
Customers with Service Contracts
Customers with contracts should obtain upgraded software through their regular update channels. For most customers, this means that upgrades should be obtained through the Software Center on Cisco's worldwide website at http://www.cisco.com.
Customers using Third Party Support Organizations
Customers whose Cisco products are provided or maintained through prior or existing agreements with third-party support organizations, such as Cisco Partners, authorized resellers, or service providers should contact that support organization for guidance and assistance with the appropriate course of action in regards to this advisory.
The effectiveness of any workaround or fix is dependent on specific customer situations, such as product mix, network topology, traffic behavior, and organizational mission. Due to the variety of affected products and releases, customers should consult with their service provider or support organization to ensure any applied workaround or fix is the most appropriate for use in the intended network before it is deployed.
Customers without Service Contracts
Customers who purchase direct from Cisco but do not hold a Cisco service contract, and customers who purchase through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should acquire upgrades by contacting the Cisco Technical Assistance Center (TAC). TAC contacts are as follows.
-
+1 800 553 2447 (toll free from within North America)
-
+1 408 526 7209 (toll call from anywhere in the world)
-
e-mail: tac@cisco.com
Customers should have their product serial number available and be prepared to give the URL of this notice as evidence of entitlement to a free upgrade. Free upgrades for non-contract customers must be requested through the TAC.
Refer to http://www.cisco.com/en/US/support/tsd_cisco_worldwide_contacts.html for additional TAC contact information, including localized telephone numbers, and instructions and e-mail addresses for use in various languages.
Status of this Notice: FINAL
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
A stand-alone copy or Paraphrase of the text of this document that omits the distribution URL in the following section is an uncontrolled copy, and may lack important information or contain factual errors.
Distribution
This advisory is posted on Cisco's worldwide website at:
http://www.cisco.com/warp/public/707/cisco-sa-20100922-bundle.shtml
In addition to worldwide web posting, a text version of this notice is clear-signed with the Cisco PSIRT PGP key and is posted to the following e-mail and Usenet news recipients.
-
cust-security-announce@cisco.com
-
first-bulletins@lists.first.org
-
bugtraq@securityfocus.com
-
vulnwatch@vulnwatch.org
-
cisco@spot.colorado.edu
-
cisco-nsp@puck.nether.net
-
full-disclosure@lists.grok.org.uk
-
comp.dcom.sys.cisco@newsgate.cisco.com
Future updates of this advisory, if any, will be placed on Cisco's worldwide website, but may or may not be actively announced on mailing lists or newsgroups. Users concerned about this problem are encouraged to check the above URL for any updates.
Revision History
Revision 1.0 |
2010-September-22 |
Initial public release. |
Cisco Security Procedures
Complete information on reporting security vulnerabilities in Cisco products, obtaining assistance with security incidents, and registering to receive security information from Cisco, is available on Cisco's worldwide website at http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html. This includes instructions for press inquiries regarding Cisco security notices. All Cisco security advisories are available at http://www.cisco.com/go/psirt.
Updated: Sep 22, 2010 | Document ID: 112122 |