This vulnerability has been assigned Cisco bug ID CSCdt79947.
The complete text of this advisory will be located at http://www.cisco.com/warp/public/707/ios-bgp-attr-corruption-pub.shtml
Cisco devices that may be running with affected Cisco IOS software releases include:
Cisco products that do not run Cisco IOS software and are not affected by this defect include, but are not limited to:
Each row of the table describes a release train and the platforms or products for which it is intended. If a given release train is vulnerable, then the earliest possible releases that contain the fix and the anticipated date of availability for each are listed in the "Rebuild", "Interim", and "Maintenance" columns. A device running any release in the given train that is earlier than the release in a specific column (less than the earliest fixed release) is known to be vulnerable, and it should be upgraded at least to the indicated release or a later version (greater than the earliest fixed release label).
When selecting a release, keep in mind the following definitions:
More information on Cisco IOS Software release names and abbreviations is available
at http://www.cisco.com/warp/public/cc/pd/iosw/iore/prodlit/537_pp.htm.
| Train | Description of Image or Platform | Availability of Fixed Releases* | ||
|---|---|---|---|---|
| 11.0-based Releases | Rebuild | Interim | Maintenance | |
| 11.0 | Major GD release for all platforms | Not vulnerable | ||
| 11.1-based Releases | Rebuild | Interim | Maintenance | |
| 11.1 | Major release for all platforms | Not vulnerable | ||
| 11.1AA | ED release for access servers: 1600, 3200, and 5200 series. | Not vulnerable | ||
| 11.1CA | Platform-specific support for 7500, 7200, 7000, and RSP | End of Engineering | ||
| Not scheduled | ||||
| 11.1CC | ISP train: added support for FIB, CEF, and NetFlow on 7500, 7200, 7000, and RSP | 11.1(36)CC2 | ||
| Not scheduled | ||||
| 11.1CT | Added support for Tag Switching on 7500, 7200, 7000, and RSP | End of Engineering | ||
| Upgrade recommended to 12.0(14)ST | ||||
| 11.1IA | Distributed Director only | Not Vulnerable | ||
| 11.2-based Releases | Rebuild | Interim | Maintenance | |
| 11.2 | Major release, general deployment | End of Engineering | ||
| Not scheduled | ||||
| 11.2BC | Platform-specific support for IBM networking, CIP, and TN3270 on 7500, 7000, and RSP | End of Engineering | ||
| Upgrade recommended to 12.1(8) | ||||
| 11.2F | Feature train for all platforms | End of Engineering | ||
| Upgrade recommended | ||||
| 11.2GS | Early deployment release to support 12000 GSR | End of Engineering | ||
| Upgrade recommended to 12.0(17)S | ||||
| 11.2P | New platform support | End of Engineering | ||
| Upgrade recommended to 12.0(17) | ||||
| 11.2SA | Catalyst 2900XL switch only | Not vulnerable | ||
| 11.2WA3 | LightStream 1010 ATM switch | Not vulnerable | ||
| 11.2(4)XAf | Initial release for the 1600 and 3600 | End of Engineering | ||
| Upgrade recommended | ||||
| 11.2(9)XA | Initial release for the 5300 and digital modem support for the 3600 | End of Engineering | ||
| Upgrade recommended | ||||
| 11.3-based Releases | Rebuild | Interim | Maintenance | |
| 11.3 | Major release for all platforms | End of Engineering | ||
| Upgrade recommended to 12.0(17) | ||||
| 11.3AA | ED for dial platforms and access servers: 5800, 5200, 5300, 7200 | End of Engineering | ||
| Upgrade recommended to 12.0(17) | ||||
| 11.3DA | Early deployment train for ISP DSLAM 6200 platform | End of Engineering | ||
| Upgrade recommended to 12.1(5)DA1 | ||||
| 11.3DB | Early deployment train for ISP/Telco/PTT xDSL broadband concentrator platform, (NRP) for 6400 | End of Engineering | ||
| Upgrade recommended to 12.1(4)DB1 | ||||
| 11.3HA | Short-lived ED release for ISR 3300 (SONET/SDH router) | End of Engineering | ||
| Upgrade recommended to 12.0 | ||||
| 11.3MA | MC3810 functionality only | Not available | ||
| Not scheduled | ||||
| 11.3NA | Voice over IP, media convergence, various platforms | End of Engineering | ||
| Upgrade recommended to 12.0(5)T | ||||
| 11.3T | Early deployment major release, feature-rich for early adopters | End of Engineering | ||
| Upgrade recommended to 12.0(17) | ||||
| 11.3WA4 | Multilayer Switching and Multiprotocol over ATM functionality for Catalyst 5000 RSM, 4500, 4700, 7200, 7500, LightStream 1010 | End of Engineering | ||
| Upgrade recommended | ||||
| 11.3(2)XA | Introduction of ubr7246 and 2600 | End of Engineering | ||
| Upgrade recommended | ||||
| 12.0-based Releases | Rebuild | Interim | Maintenance | |
| 12.0 | General deployment release for all platforms | 12.0(17) 2001-Apr-23 |
||
| 12.0DA | xDSL support: 6100, 6200 | Unavailable | ||
| Upgrade recommended to 12.1(5)DA1 | ||||
| 12.0DB | Early Deployment (ED) release, which delivers support for the Cisco 6400 Universal Access Concentrator (UAC) for Node Switch Processor (NSP) | Unavailable | ||
| Upgrade recommended to 12.1(4)DB1 | ||||
| 12.0DC | Early Deployment (ED) release, which delivers support for the Cisco 6400 Universal Access Concentrator (UAC) for Node Route Processor (NRP) | Unavailable | ||
| Upgrade recommended to 12.1(5)DC | ||||
| 12.0S | Core/ISP support: GSR, RSP, c7200 | 12.0(15)S3, 12.0(16)S1 | 12.0(16.06)S | 12.0(17)S 2001-May-07 |
| 2001-April-23 2001-April-30 |
||||
| 12.0SC | Cable/broadband ISP: ubr7200 | Not vulnerable | ||
| 12.0SL | 10000 ESR: c10k | Not vulnerable | ||
| 12.0ST | Cisco IOS software Release12.0ST is an early deployment (ED) release for the Cisco 7200, 7500/7000RSP and 12000 (GSR) series routers for Service Providers (ISPs). | Not vulnerable | ||
| 12.0T | Early Deployment(ED): VPN, Distributed Director, various platforms | 12.0(5)T | ||
| 12.0W5 | Catalyst switches: cat2948g-l3, cat4232 | 12.0(10)W5(18g) 2001-Apr-20 | ||
| cat8510c, cat8540c, c6msm, ls1010, cat8510m, cat8540m, c5atm | 12.0(16)W5(21) 2001-May-21 |
|||
| 12.0WT | Catalyst switches: cat4840g | Not vulnerable | ||
| 12.0XA | Early Deployment (ED): limited platforms | Unavailable | ||
| Upgrade recommended to 12.1(8), available 2001-Apr-23 | ||||
| 12.0XB | Short-lived early deployment release | Unavailable | ||
| Upgrade recommended to 12.1(8), available 2001-Apr-23 | ||||
| 12.0XC | Early Deployment (ED): limited platforms | Unavailable | ||
| Upgrade recommended to 12.1(8), available 2001-Apr-23 | ||||
| 12.0XD | Early Deployment (ED): limited platforms | Unavailable | ||
| Upgrade recommended to 12.1(8), available 2001-Apr-23 | ||||
| 12.0XE | Early Deployment (ED): limited platforms | Not Vulnerable | ||
| 12.0XF | Early Deployment (ED): limited platforms | Unavailable | ||
| Upgrade recommended to 12.1(8), available 2001-Apr-23 | ||||
| 12.0XG | Early Deployment (ED): limited platforms | Unavailable | ||
| Upgrade recommended to 12.1(8), available 2001-Apr-23 | ||||
| 12.0XH | Early Deployment (ED): limited platforms | Unavailable | ||
| Upgrade recommended to 12.1(8), available 2001-Apr-23 | ||||
| 12.0XI | Early Deployment (ED): limited platforms | Unavailable | ||
| Upgrade recommended to 12.1(8), available 2001-Apr-23 | ||||
| 12.0XJ | Early Deployment (ED): limited platforms | Unavailable | ||
| Upgrade recommended to 12.1(8), available 2001-Apr-23 | ||||
| 12.0XK | Early Deployment (ED): limited platforms | Not vulnerable | ||
| 12.0XL | Early Deployment (ED): limited platforms | Not vulnerable | ||
| 12.0XM | Short-lived early deployment release | Not vulnerable | ||
| 12.0XN | Early Deployment (ED): limited platforms | Not vulnerable | ||
| 12.0XP | Early Deployment (ED): limited platforms | Not vulnerable | ||
| 12.0XQ | Short-lived early deployment release | Not vulnerable | ||
| 12.0XR | Short-lived early deployment release | Not vulnerable | ||
| 12.0XS | Short-lived early deployment release | Not vulnerable | ||
| 12.0XU | Early Deployment (ED): limited platforms | Not vulnerable | ||
| 12.0XV | Short-lived early deployment release | Not vulnerable | ||
| 12.1-based and Later Releases | Rebuild | Interim | Maintenance | |
| 12.1 | General deployment release for all platforms | Not vulnerable | ||
| Notes | ||||
| * All dates are estimated and subject to change.
** Interim releases are subjected to less rigorous testing than
regular maintenance releases, and may have serious bugs. |
||||
Customers with contracts should obtain upgraded software through their regular update channels. For most customers, this means that upgrades should be obtained via the Software Center on Cisco's Worldwide Web site at http://www.cisco.com.
Customers without contracts should get their upgrades by contacting the Cisco Technical Assistance Center (TAC). TAC contacts are as follows:
Give the URL of this notice as evidence of your entitlement to a free upgrade. Free upgrades for non-contract customers must be requested through the TAC. Please do not contact either "psirt@cisco.com" or "security-alert@cisco.com" for software upgrades.
Cisco knows of no public announcements of this vulnerability before the date of this notice.
| Revision Number | 1.0 | Initial Public Release |
This notice is Copyright 2001 by Cisco Systems, Inc. This notice may be redistributed freely after the release date given at the top of the text, provided that redistributed copies are complete and unmodified, and include all date and version information.
All contents are Copyright © 1992--2001 Cisco Systems Inc. All rights reserved. Important Notices and Privacy Statement.