cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1072
Views
0
Helpful
8
Replies

CSCug34485 - IOS OSPF LSA Injection Vulnerability

Hi folks,

we're preparing upgrading all our routers to fix this bug or close this vulnerability.

We have some devices which run the 12.2(33)SXJ train. However, the "Known fixed version" states that the version 12.2(33)SXJ6 should fix this bug, but I can not find anthing about it in the release notes.

How can I make / be sure that this is really fixed? Is it a error in the release notes?

Cheers

Alex

1 Accepted Solution

Accepted Solutions

Phillip Remaker
Cisco Employee
Cisco Employee

The release notes are now updated.  Thank you for bringing this problem to our attention.

View solution in original post

8 Replies 8

Phillip Remaker
Cisco Employee
Cisco Employee

In general, the bug toolkit is the authoritive source, which pulls the data from the internal bug tracking system.

Also, the alert here

(http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130801-lsaospf)

explicitly calls out 12.(33)SXJ6.

Which document are you looking at that seems to have the wrong or confusing information?

http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/release/notes/caveats_SXJ.html and search for the string "34485".

I even checked the PDF version from the master document

http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/release/notes/ol_14271.html but there I only find this bug being resolved under 12.2(33)SXI12.

Cheers Alex

... not sure if the fact that SXI < SXJ implies the bug being resolved in SXJ because it has been explicitely resolved in SXI12?

This must be an oversight.  The release note documents are "human created" and there is a special process for PSIRT bugs.  I'm guessing a quirk in the publishing cycle caused an oversight here.

I will submit a request for errata.  Not sure if it will ever get corrected, but I will pass information about the problem to the PSIRT group and the documentation group.

As a mater of believability in the presence of conflicting information,  you can generally place greater trust in PSIRT bulletins since they tend to have more verification and rechecking than other documents on  the website.

Thank you very much for this clarification.

Thanks for reporting it.  Sometimes things fall through the cracks and we can only fix it when people take the time to tell us.  We appreciate the diligence and dedication of our customers.

Phillip Remaker
Cisco Employee
Cisco Employee

The release notes are now updated.  Thank you for bringing this problem to our attention.

ACK.

Great.

Thanks.

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: