Cisco Bug: CSCtc84758 - memory leak in RADIUS LOCAL SERVER with multiple Account-Logon request
Feb 06, 2017
- Cisco IOS
Known Affected Releases
Symptoms: On a router configured for ISG that is running postpaid Web-Logon users with SESM as the external portal, a memory leak may occur in RADIUS LOCAL SERVER. Conditions: The symptom is observed on a Cisco 10000 series router with a PRE-3 and running Cisco IOS Release 12.2(33)SB7 using SESM as a captive portal. The issue can be triggered with this sequence of events: 1. Postpaid user is redirected to SESM. 2. SESM sends Access-Request to router after captivating user/pass from postpaid user. 3. RADIUS LOCAL SERVER creates AAA request and sends it to ISG. 4. ISG creates another AAA request to send an Access-Request to authenticate the postpaid user. 5. AAA receives a response from external AAA. 6. AAA passes the response to RADIUS LOCAL SERVER which transmits an Access-Accept or Access-Reject to SESM. If the processing delay of sum (C,D,E,F) is greater than the SESM timeout, SESM will send another Access-Request with the same credentials for the Account logon postpaid user in B. If this occurs, policy/AAA will now use this second Account-Logon request from SESM for this user's Account Login and the policy will not free the AAA request from the former Account Logon request, hence the memory leak will present as RADIUS LOCAL SERVER.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.
Bug Details Include
- Full Description (including symptoms, conditions and workarounds)
- Known Fixed Releases
- Related Community Discussions
- Number of Related Support Cases