Key Features
Here are some key features of Adobe Reader X:
- View, print, and search PDF files, including PDF Portfolios and PDF maps.
- Author, store, and share documents, and share your screen, using Acrobat.com services.
- Experience richer content and greater interactivity with native support for Adobe Flash technology.
- Review documents using familiar commenting tools such as sticky notes, highlighting, lines, shapes, and stamps (When enabled by Acrobat Pro or Acrobat Pro Extended).
- Digitally sign PDF documents (When enabled by Acrobat Pro or Acrobat Pro Extended)
How to update Adobe Reader X:
Users on Windows and Macintosh can utilize the product's update mechanism. The default configuration is set to run automatic update checks on a regular schedule. Update checks can be manually activated by choosing Help > Check for Updates.
Download Adobe Reader X (10.0.1):
New users on Windows can download Adobe Reader X (10.0.1) from website listed below:
For Adobe Reader users on Macintosh can also find the appropriate update from Adobe Reader for Macintosh
What's new in Adobe Reader X (10.0.1):
Adobe Reader X (10.0.1) contains fixes the following security issues:
• Resolve an input validation vulnerability that could lead to code execution - (CVE-2010-4091).
• Resolve a library-loading vulnerability that could lead to code execution - (CVE-2011-0562).
• Resolve a memory corruption vulnerability that could lead to code execution - (CVE-2011-0563).
• Resolve a Windows-only file permissions issue that could lead to privilege escalation - (CVE-2011-0564).
• Resolve a denial of service vulnerability; arbitrary code execution has not been demonstrated, but may be possible - (CVE-2011-0565).
• Resolve an image-parsing memory corruption vulnerability that could lead to code execution - (CVE-2011-0566).
• Resolve an image-parsing memory corruption vulnerability that could lead to code execution - (CVE-2011-0567).
• Resolve a denial of service vulnerability; arbitrary code execution has not been demonstrated, but may be possible (Macintosh only) - (CVE-2011-0568).
• Resolve a library-loading vulnerability that could lead to code execution - (CVE-2011-0570).
• Resolve a denial of service vulnerability; arbitrary code execution has not been demonstrated, but may be possible - (CVE-2011-0585).
• Resolve an input validation vulnerability that could lead to code execution - (CVE-2011-0586).
• Resolve an input validation vulnerability that could lead to a cross-site scripting vulnerability - (CVE-2011-0587).
• Resolve a library-loading vulnerability that could lead to code execution - (CVE-2011-0588).
• Resolve a memory corruption vulnerability that could lead to code execution - (CVE-2011-0589).
• Resolve a 3D file parsing input validation vulnerability that could lead to code execution - (CVE-2011-0590).
• Resolve a 3D file parsing input validation vulnerability that could lead to code execution - (CVE-2011-0591).
• Resolve a 3D file parsing input validation vulnerability that could lead to code execution - (CVE-2011-0592).
• Resolve a 3D file parsing input validation vulnerability that could lead to code execution - (CVE-2011-0593).
• Resolve a font parsing input validation vulnerability that could lead to code execution - (CVE-2011-0594).
• Resolve a 3D file parsing input validation vulnerability that could lead to code execution - (CVE-2011-0595).
• Resolve a image parsing input validation vulnerability that could lead to code execution - (CVE-2011-0596).
• Resolve an image parsing input validation vulnerability that could lead to code execution - (CVE-2011-0598).
• Resolve an image parsing input validation vulnerability that could lead to code execution - (CVE-2011-0599).
• Resolve a 3D file parsing input validation vulnerability that could lead to code execution - (CVE-2011-0600).
• Resolve an image parsing input validation vulnerability that could lead to code execution - (CVE-2011-0602).
• Resolve an image-parsing memory corruption vulnerability that could lead to code execution - (CVE-2011-0603).
• Resolve an input validation vulnerability that could lead to cross-site scripting - (CVE-2011-0604).
• Resolve a memory corruption vulnerability that could lead to code execution (Macintosh only) - (CVE-2011-0605).
• Resolve a memory corruption vulnerability that could lead to code execution - (CVE-2011-0606).
System requirements
Operating systems: Windows 2003, Windows 2000, Windows Vista, Windows 2000 SP 4, Windows XP
Source:
No comments:
Post a Comment