Preview Tool

Cisco Bug: CSCtc84758 - memory leak in RADIUS LOCAL SERVER with multiple Account-Logon request

Last Modified

Feb 06, 2017

Products (1)

  • Cisco IOS

Known Affected Releases


Description (partial)

Symptoms: On a router configured for ISG that is running postpaid Web-Logon
users with SESM as the external portal, a memory leak may occur in RADIUS LOCAL
 Conditions: The symptom is observed on a Cisco 10000 series router with a PRE-3
 and running Cisco IOS Release 12.2(33)SB7 using SESM as a captive portal. The
 issue can be triggered with this sequence of events:
 1. Postpaid user is redirected to SESM.
 2. SESM sends Access-Request to router after captivating user/pass from
 postpaid user.
 3. RADIUS LOCAL SERVER creates AAA request and sends it to ISG.
 4. ISG creates another AAA request to send an Access-Request to authenticate
 the postpaid user.
 5. AAA receives a response from external AAA.
 6. AAA passes the response to RADIUS LOCAL SERVER which transmits an
 Access-Accept or Access-Reject to SESM.
 If the processing delay of sum (C,D,E,F) is greater than the SESM timeout, SESM
 will send another Access-Request with the same credentials for the Account
 logon postpaid user in B. 
 If this occurs, policy/AAA will now use this second Account-Logon request from
 SESM for this user's Account Login and the policy will not free the AAA request
 from the former Account Logon request, hence the memory leak will present as
Bug details contain sensitive information and therefore require a account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.