This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Confirmation for Compliancy

Hello,

We have PCI compliancy organisation requesting information/documentation on whether Sophos UTM is vulnerable to a range of CVE's based on detecting version of the Exim component. Some of the CVE's information as asked already, however we haven't been able to find anything formal in the KBs or community forum related to the following 3:

  1. CVE-2016-1531 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1531
  2. CVE-2014-2957 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2957
  3. CVE-2017-1000369 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000369

Could we receive kindly confirmation/advise on how others dealt with such requests?



This thread was automatically locked due to age.
Parents Reply
  • Hi and welcome to the UTM Community!

    The easiest way is to do the following:

    First, check some things. As root at the command line:

    #cc get up2date system_download_interval

    This latter returns: 10 = Manual or Monthly, 0 = Every 15 mins, etc. Note this! 

    Let's set the interval to Manual:
    #cc set up2date system_download_interval 10

    cd /var/up2date/sys
    wget --no-check-certificate ftp.astaro.com/pub/UTM/v9/up2date/u2d-sys-9.705003-706008.tgz.gpg
    wget --no-check-certificate ftp.astaro.com/pub/UTM/v9/up2date/u2d-sys-9.706008-706009.tgz.gpg
    /sbin/auisys.plx --showdesc

    Wait 10 minutes after the auisys command starts and then install in WebAdmin. You are now at 9.706-9.  After the Up2Dates are completed, change 'Firmware download interval' back on the 'Configuration' tab or go back to the command line and set it there.

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
Children
No Data