6.3.0r10 Release Notes - Juniper Networks
6.3.0r10 Release Notes - Juniper Networks
6.3.0r10 Release Notes - Juniper Networks
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
ScreenOS 6.3.0 <strong>Release</strong> <strong>Notes</strong><br />
• 502098—Sometimes, the device rebooted unexpectedly when the vpn name was<br />
changed.<br />
• 504696—Potential unauthorized disclosure vulnerability was found, when the private<br />
address of the firewall was sometimes disclosed.<br />
• 506282—Whitelist URL was blocked by URL filtering because the code did not identify<br />
the port number (non 80) in the hostname header.<br />
• 507172—Sometimes, the firewall rebooted unexpectedly when WebUI was accessed.<br />
• 513085—In the WebUI, under certain conditions, MIP configuration for IPv6 address<br />
was not available.<br />
• 515172—Alarm events for DI detection were missing in an exported report from the<br />
WebUI.<br />
Addressed Issues from ScreenOS 6.3.0r3<br />
40<br />
The following operational issues were resolved in this release:<br />
Administration<br />
• 417686—Socket leak might occur when Internet Explorer (IE) with HTTPS was used<br />
for WebAuth management.<br />
• 472816—Sometimes the clear socket command could not clear the tcp<br />
socket when it was in a certain state.<br />
• 480480—Under certain conditions, memory leak in the event log module caused high<br />
memory utilization.<br />
• 481730—The get system command displayed the hardware version as 0000(0)-(00)<br />
on SSG300 and SSG500 devices.<br />
• 493627—Under certain conditions, device might reboot unexpectedly when RPC<br />
(MS-RPC or SUN-RPC) traffic passes through the device and show rpc map command<br />
was executed.<br />
Antivirus<br />
• 478469—In transparent mode, VLAN tag was removed from the HTTP traffic after AV<br />
scanning.<br />
DHCP<br />
• 484087—The destination IP was incorrectly set to 0.0.0.0 when DHCP relay agent<br />
received a DHCP ACK in response to a DHCP INFORM.<br />
GPRS<br />
• 448582—GTP inspection dropped the SGSN Context Response message if the Next<br />
Extension Header type was 0xC2 (Suspend Response).<br />
• 449284—In certain conditions, the firewall failed to allocate GSN, and hence caused<br />
the GTP traffic to drop.<br />
Copyright © 2012, <strong>Juniper</strong> <strong>Networks</strong>, Inc.