03.03.2013 Views

6.3.0r10 Release Notes - Juniper Networks

6.3.0r10 Release Notes - Juniper Networks

6.3.0r10 Release Notes - Juniper Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

ScreenOS 6.3.0 <strong>Release</strong> <strong>Notes</strong><br />

• 502098—Sometimes, the device rebooted unexpectedly when the vpn name was<br />

changed.<br />

• 504696—Potential unauthorized disclosure vulnerability was found, when the private<br />

address of the firewall was sometimes disclosed.<br />

• 506282—Whitelist URL was blocked by URL filtering because the code did not identify<br />

the port number (non 80) in the hostname header.<br />

• 507172—Sometimes, the firewall rebooted unexpectedly when WebUI was accessed.<br />

• 513085—In the WebUI, under certain conditions, MIP configuration for IPv6 address<br />

was not available.<br />

• 515172—Alarm events for DI detection were missing in an exported report from the<br />

WebUI.<br />

Addressed Issues from ScreenOS 6.3.0r3<br />

40<br />

The following operational issues were resolved in this release:<br />

Administration<br />

• 417686—Socket leak might occur when Internet Explorer (IE) with HTTPS was used<br />

for WebAuth management.<br />

• 472816—Sometimes the clear socket command could not clear the tcp<br />

socket when it was in a certain state.<br />

• 480480—Under certain conditions, memory leak in the event log module caused high<br />

memory utilization.<br />

• 481730—The get system command displayed the hardware version as 0000(0)-(00)<br />

on SSG300 and SSG500 devices.<br />

• 493627—Under certain conditions, device might reboot unexpectedly when RPC<br />

(MS-RPC or SUN-RPC) traffic passes through the device and show rpc map command<br />

was executed.<br />

Antivirus<br />

• 478469—In transparent mode, VLAN tag was removed from the HTTP traffic after AV<br />

scanning.<br />

DHCP<br />

• 484087—The destination IP was incorrectly set to 0.0.0.0 when DHCP relay agent<br />

received a DHCP ACK in response to a DHCP INFORM.<br />

GPRS<br />

• 448582—GTP inspection dropped the SGSN Context Response message if the Next<br />

Extension Header type was 0xC2 (Suspend Response).<br />

• 449284—In certain conditions, the firewall failed to allocate GSN, and hence caused<br />

the GTP traffic to drop.<br />

Copyright © 2012, <strong>Juniper</strong> <strong>Networks</strong>, Inc.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!