{"id":217499,"date":"2019-05-01T00:52:33","date_gmt":"2019-04-30T22:52:33","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=217499"},"modified":"2023-06-01T00:55:03","modified_gmt":"2023-05-31T22:55:03","slug":"update-auf-sophos-utm-version-9-602-erschienen","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2019\/05\/01\/update-auf-sophos-utm-version-9-602-erschienen\/","title":{"rendered":"Update auf Sophos UTM Version 9.602 erschienen"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" align=\"left\" height=\"47\"\/>[English]Sophos hat ein Update f\u00fcr sein Unified-Threat-Management-Programm Sophos UTM ver\u00f6ffentlicht, welches dieses auf die Version 9.602 hebt. Das Update schlie\u00dft einige Sicherheitsl\u00fccken.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg04.met.vgwort.de\/na\/fe013c0787fb436297f44f49eb6c4ec4\" width=\"1\" height=\"1\"\/>Blog-Leser Thorsten Sult hat mich vor einigen Stunden per Mail kontaktiert und auf dieses Update hingewiesen. Thorsten hat es in <a href=\"https:\/\/web.archive.org\/web\/20210410191545\/https:\/\/www.sult.eu\/2019\/04\/30\/sophos-utm-9-602-3-verfuegbar\/\" target=\"_blank\" rel=\"noopener noreferrer\">diesem Blog-Beitrag<\/a> bereits thematisiert. <\/p>\n<h2>Sophos UTM Version 9.602 fixt Sicherheitsl\u00fccken<\/h2>\n<p>Das Wartungs-Update auf Version 9.602 wurde in <a href=\"https:\/\/community.sophos.com\/products\/unified-threat-management\/b\/utm-blog\/posts\/utm-up2date-9-602-released\" target=\"_blank\" rel=\"noopener noreferrer\">diesem Sophos Support-Beitrag<\/a> angek\u00fcndigt. Der Changelog nennt eine ganze Reihe an Fixes:<\/p>\n<ul>\n<li>NUTM-10728 [Access &amp; Identity] Race condition on configuration change of RED device  <\/li>\n<li>NUTM-9877 [Access &amp; Identity] Configurable RADIUS timeout for L2TP over IPsec  <\/li>\n<li>NUTM-10190 [Basesystem] CVE-2018-15473: OpenSSH username enumeration  <\/li>\n<li>NUTM-10362 [Email] MIME type detection doesn't work as expected &#8211; header Content-Type always considered  <\/li>\n<li>NUTM-10480 [Email] Mail Based XSS in Sophos UTM 9  <\/li>\n<li>NUTM-10484 [Email] POP3 Proxy stops working sometimes  <\/li>\n<li>NUTM-10545 [Email] Update SPX placeholder description  <\/li>\n<li>NUTM-10521 [Logging] \/tmp partition getting full when using livelog  <\/li>\n<li>NUTM-10291 [Network] DNS Host object not updated\/unresolved  <\/li>\n<li>NUTM-10460 [Network] GeoIP dropping traffic from allowed region  <\/li>\n<li>NUTM-10537 [Network] Additional IP address on a bridge interface exist in back-end even after deleting it  <\/li>\n<li>NUTM-10536 [RED] Wifi traffic on the internal RED15w AP is always routed through the RED tunnel  <\/li>\n<li>NUTM-10594 [RED] RED50 disconnects randomly  <\/li>\n<li>NUTM-10595 [Sandstorm] Sandbox Activity Tab not accessible due to license error  <\/li>\n<li>NUTM-10852 [Sandstorm] Sandboxd complaining on missing column in database\/sqlite  <\/li>\n<li>NUTM-10626 [WAF] Let's Encrypt certificate renewal fails because of failing terms of service check  <\/li>\n<li>NUTM-10644 [WAF] mod_session_cookie does not respect expiry time (CVE-2018-17199)  <\/li>\n<li>NUTM-10661 [WAF] SSL redirect broken for wildcard certificates  <\/li>\n<li>NUTM-10322 [Web] Proxy crash with coredump on UTM 9.508  <\/li>\n<li>NUTM-10633 [Web] New web templates for content warn does not work in 9.6  <\/li>\n<li>NUTM-10657 [Web] httpproxy uses up all CPUs in peak hours, resulting in slow browsing  <\/li>\n<li>NUTM-10668 [Web] Quota relevant web page are accessible when using AD SSO  <\/li>\n<li>NUTM-10758 [Web] Application Control &#8211; Skiplist not working for destination IP  <\/li>\n<li>NUTM-10546 [Wireless] Updating to 9.6 GA with REDw devices causes corrupt payload and AP becomes inactive<\/li>\n<\/ul>\n<p>Wichtig ist, dass das Wartungsupdate die in \u00e4lteren Version von Sophos UTM enthaltenen Schwachstellen <a href=\"https:\/\/access.redhat.com\/security\/cve\/cve-2018-15473\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2018-15473<\/a> in OpenSSH, <a href=\"https:\/\/www.heise.de\/security\/meldung\/Sophos-UTM-Sicherheitsupdate-schuetzt-vor-Angriffen-aus-der-Ferne-4410754.html\">NUTM-10480 XSS<\/a> in der Email Protection und <a href=\"https:\/\/access.redhat.com\/security\/cve\/cve-2018-17199\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2018-17199<\/a> f\u00fcr WAF schlie\u00dft. Heise thematisiert die Fixes der geschlossenen Schwachstellen in <a href=\"https:\/\/www.heise.de\/security\/meldung\/Sophos-UTM-Sicherheitsupdate-schuetzt-vor-Angriffen-aus-der-Ferne-4410754.html\" target=\"_blank\" rel=\"noopener noreferrer\">diesem Beitrag<\/a>.<\/p>\n<h2>Das Update wird in Wellen ausgerollt <\/h2>\n<p>Das Wartungs-Update wird in Wellen ausgerollt. In Phase 1 k\u00f6nnen Nutzer das Update-Paket vom <a href=\"https:\/\/web.archive.org\/web\/20201112002959\/https:\/\/ftp.astaro.com\/UTM\/v9\/up2date\/\" target=\"_blank\" rel=\"noopener noreferrer\">Sophos FTP-Server<\/a> herunterladen und manuell installieren. In Phase 2 will Sophos das Update \u00fcber seine Up2Date-Server verteilen.<\/p>\n<p>Thorsten Sult gibt in <a href=\"https:\/\/web.archive.org\/web\/20210410191545\/https:\/\/www.sult.eu\/2019\/04\/30\/sophos-utm-9-602-3-verfuegbar\/\" target=\"_blank\" rel=\"noopener noreferrer\">seinem Blog<\/a> den Hinweis: <em>Da die Firmware noch nicht via Up2date ausgerollt wird, solltet Ihr zun\u00e4chst warten, bevor sie produktiv eingesetzt wird.<\/em> Dem kann ich mich nur anschlie\u00dfen. Danke an Thorsten f\u00fcr den Hinweis. <\/p>\n<p><strong>\u00c4hnliche Artikel:<\/strong><br \/><a href=\"https:\/\/borncity.com\/blog\/2019\/04\/27\/sophos-bessert-av-produkte-wegen-update-problemen-nach\/\">Sophos bessert AV-Produkte wegen Update-Problemen nach<\/a><br \/><a href=\"https:\/\/borncity.com\/blog\/2019\/04\/08\/sophos-und-die-fehlalarme-der-letzten-tage\/\">Sophos und die Fehlalarme der letzten Tage (April 2019)<\/a><br \/><a href=\"https:\/\/borncity.com\/blog\/2019\/02\/12\/sophos-utm-9-601-5-als-soft-release-verfgbar\/\">Sophos UTM 9.601-5 als Soft-Release verf\u00fcgbar<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[English]Sophos hat ein Update f\u00fcr sein Unified-Threat-Management-Programm Sophos UTM ver\u00f6ffentlicht, welches dieses auf die Version 9.602 hebt. Das Update schlie\u00dft einige Sicherheitsl\u00fccken.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[426,185,301],"tags":[4328,4675,4315,4325],"class_list":["post-217499","post","type-post","status-publish","format-standard","hentry","category-sicherheit","category-update","category-windows","tag-sicherheit","tag-sophos","tag-update","tag-windows"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/217499","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=217499"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/217499\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=217499"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=217499"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=217499"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}