• Our team is looking to connect with folks who use email services provided by Plesk, or a premium service. If you'd like to be part of the discovery process and share your experiences, we invite you to complete this short screening survey. If your responses match the persona we are looking for, you'll receive a link to schedule a call at your convenience. We look forward to hearing from you!
  • The BIND DNS server has already been deprecated and removed from Plesk for Windows.
    If a Plesk for Windows server is still using BIND, the upgrade to Plesk Obsidian 18.0.70 will be unavailable until the administrator switches the DNS server to Microsoft DNS. We strongly recommend transitioning to Microsoft DNS within the next 6 weeks, before the Plesk 18.0.70 release.
  • The Horde component is removed from Plesk Installer. We recommend switching to another webmail software supported in Plesk.

Questions on latest security bulletin

HostaHost

Regular Pleskian
Today's bulletin, which references http://kb.parallels.com/114377, states that there are updates available for:

10.4.x
10.3.x
10.2.x
10.1.x
10.0.x
9.5.x
9.3.x
9.2.x
9.0.x
8.6.x
8.4.x
8.2.x

yet the autoinstaller only seems to know about updates for 10.4.x, 9.5.4 and 8.6. It reports nothing available for all the other versions. Does that mean the other versions are all vulnerable or that they were never vulnerable to begin with? Why is there NO information published about what actual files, and what file versions, are vulnerable so that people responsible for the security of the servers can check their status?
 
Try updating from the parallels server as source directly with the command

/usr/local/psa/admin/sbin/autoinstaller --source=http://64.131.90.31
 
Try updating from the parallels server as source directly with the command

/usr/local/psa/admin/sbin/autoinstaller --source=http://64.131.90.31

Didn't change things. They claim their releases cover a variety of versions but apparently that is not the case, and I'm still waiting for them to actually provide documentation on what their microupdates replace so we can systematically verify every server is patched regardless of what the often broken autoinstaller and update servers say.
 
There are custom fixes for those version outside of the ones support by the microfixes.

check the page again, and possible clear your browser cache first.

There is a table including all the fixes, which wasn't there when the page first went up.
 
Back
Top