Article ID: 125034, created on Mar 27, 2015, last review on Mar 27, 2015

  • Applies to:
  • Plesk 11.0 for Windows


On July 26th a 0-day DNS vulnerability has been reported:CVE-2013-4854.


Fixed packages have been released by major Linux OS vendors:

RedHat released updated packages, RHEL5, RHEL6:

Fixed in security branch of Debian:

Ubuntu released packages as well:

So major Linux OS vendors responded with fixed packages.To fix the issue, please update bind packages using OS vendor repositories.

Bind supplied with Plesk 11.5, 11.0, 10.4 for Windows will be patched in the nearest update.

For Plesk for Windows, you can update Bind as below:

  1. Download Bind distributive from:

  2. Extract content of proposed .zip archive to %plesk_dir%\dns\bin folder.

  3. Install vcredist_x86.exe which is included in Bind distributive. Just launch it and install on the server.

85a92ca67f2200d36506862eaa6ed6b8 56797cefb1efc9130f7c48a7d1db0f0c a914db3fdc7a53ddcfd1b2db8f5a1b9c 514af229ae32522202a910a2649c80fb bd7fc88cf1b01f097749ae6f87272128

Email subscription for changes to this article
Save as PDF