Adobe Reader X (10.0.1) is available for download

Adobe Reader lets you read and print from any system any document created as an Adobe Portable Document Format (PDF) file, with its original appearance preserved. PDF files are compact and can be shared, viewed, searched, navigated, digitally signed, and printed exactly as the author intended by anyone with Adobe Reader.

Key Features
Here are some key features of Adobe Reader X:
  • View, print, and search PDF files, including PDF Portfolios and PDF maps.
  • Author, store, and share documents, and share your screen, using Acrobat.com services.
  • Experience richer content and greater interactivity with native support for Adobe Flash technology.
  • Review documents using familiar commenting tools such as sticky notes, highlighting, lines, shapes, and stamps (When enabled by Acrobat Pro or Acrobat Pro Extended).
  • Digitally sign PDF documents (When enabled by Acrobat Pro or Acrobat Pro Extended)

How to update Adobe Reader X:
Users on Windows and Macintosh can utilize the product's update mechanism. The default configuration is set to run automatic update checks on a regular schedule. Update checks can be manually activated by choosing Help > Check for Updates.

Download Adobe Reader X (10.0.1):
New users on Windows can download Adobe Reader X (10.0.1) from website listed below:

For Adobe Reader users on Macintosh can also find the appropriate update from Adobe Reader for Macintosh

What's new in Adobe Reader X (10.0.1):
Adobe Reader X (10.0.1) contains fixes the following security issues:
• Resolve an input validation vulnerability that could lead to code execution - (CVE-2010-4091).
• Resolve a library-loading vulnerability that could lead to code execution - (CVE-2011-0562).
• Resolve a memory corruption vulnerability that could lead to code execution - (CVE-2011-0563).
• Resolve a Windows-only file permissions issue that could lead to privilege escalation - (CVE-2011-0564).
• Resolve a denial of service vulnerability; arbitrary code execution has not been demonstrated, but may be possible - (CVE-2011-0565).
• Resolve an image-parsing memory corruption vulnerability that could lead to code execution - (CVE-2011-0566).
• Resolve an image-parsing memory corruption vulnerability that could lead to code execution - (CVE-2011-0567).
• Resolve a denial of service vulnerability; arbitrary code execution has not been demonstrated, but may be possible (Macintosh only) - (CVE-2011-0568).
• Resolve a library-loading vulnerability that could lead to code execution - (CVE-2011-0570).
• Resolve a denial of service vulnerability; arbitrary code execution has not been demonstrated, but may be possible - (CVE-2011-0585).
• Resolve an input validation vulnerability that could lead to code execution - (CVE-2011-0586).
• Resolve an input validation vulnerability that could lead to a cross-site scripting vulnerability - (CVE-2011-0587).
• Resolve a library-loading vulnerability that could lead to code execution - (CVE-2011-0588).
• Resolve a memory corruption vulnerability that could lead to code execution - (CVE-2011-0589).
• Resolve a 3D file parsing input validation vulnerability that could lead to code execution - (CVE-2011-0590).
• Resolve a 3D file parsing input validation vulnerability that could lead to code execution - (CVE-2011-0591).
• Resolve a 3D file parsing input validation vulnerability that could lead to code execution - (CVE-2011-0592).
• Resolve a 3D file parsing input validation vulnerability that could lead to code execution - (CVE-2011-0593).
• Resolve a font parsing input validation vulnerability that could lead to code execution - (CVE-2011-0594).
• Resolve a 3D file parsing input validation vulnerability that could lead to code execution - (CVE-2011-0595).
• Resolve a image parsing input validation vulnerability that could lead to code execution - (CVE-2011-0596).
• Resolve an image parsing input validation vulnerability that could lead to code execution - (CVE-2011-0598).
• Resolve an image parsing input validation vulnerability that could lead to code execution - (CVE-2011-0599).
• Resolve a 3D file parsing input validation vulnerability that could lead to code execution - (CVE-2011-0600).
• Resolve an image parsing input validation vulnerability that could lead to code execution - (CVE-2011-0602).
• Resolve an image-parsing memory corruption vulnerability that could lead to code execution - (CVE-2011-0603).
• Resolve an input validation vulnerability that could lead to cross-site scripting - (CVE-2011-0604).
• Resolve a memory corruption vulnerability that could lead to code execution (Macintosh only) - (CVE-2011-0605).
• Resolve a memory corruption vulnerability that could lead to code execution - (CVE-2011-0606).

System requirements
Operating systems: Windows 2003, Windows 2000, Windows Vista, Windows 2000 SP 4, Windows XP

Source:

No comments: