Adobe Reader X has been updated to version 10.1.4. This update address multiple critical vulnerabilities in Adobe Reader X (10.1.3) and earlier versions for Windows and MAC OS. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system.
Adobe recommends users update their product installations to the latest versions:
- Users of Adobe Reader X (10.1.3) and earlier versions for Windows and MAC OS should update to Adobe Reader X (10.1.4).
- For users of Adobe Reader 9.5.1 and earlier versions for Windows and MAC OS, who cannot update to Adobe Reader X (10.1.4), Adobe has made available the update Adobe Reader 9.5.2.
- Users of Adobe Acrobat X (10.1.3) for Windows and MAC OS should update to Adobe Acrobat X (10.1.4).
- Users of Adobe Acrobat 9.5.1 and earlier versions for Windows and MAC OS should update to Adobe Acrobat 9.5.2.
Affected software versions
- Adobe Reader X (10.1.3) and earlier 10.x versions for Windows and MAC OS.
- Adobe Reader 9.5.1 and earlier 9.x versions for Windows and MAC OS.
- Adobe Acrobat X (10.1.3) and earlier 10.x versions for Windows and MAC OS.
- Adobe Acrobat 9.5.1 and earlier 9.x versions for Windows and MAC OS.
How to update Adobe Reader 10.1.4:
Users on Windows and MAC OS can utilize the product's update mechanism. The default configuration is set to run automatic update checks on a regular schedule. Update checks can be manually activated by choosing Help > Check for Updates.
Download Adobe Reader 10.1.4:
New users on Windows can download Adobe Reader 10.1.4 from website listed below:
For Adobe Reader users on MAC OS can also find the appropriate update from Adobe Reader for MAC OS
What's new in Adobe Reader 10.1.4:
Adobe Reader 10.1.4 contains fixes the following security issues:
- Fixed a stack overflow vulnerability that could lead to code execution (CVE-2012-2049).
- Fixed a buffer overflow vulnerability that could lead to code execution (CVE-2012-2050).
- Fixed memory corruption vulnerabilities that could lead to code execution (CVE-2012-2051, CVE-2012-4147, CVE-2012-4148, CVE-2012-4149, CVE-2012-4150, CVE-2012-4151, CVE-2012-4152, CVE-2012-4153, CVE-2012-4154, CVE-2012-4155, CVE-2012-4156, CVE-2012-4157, CVE-2012-4158, CVE-2012-4159, CVE-2012-4160).
- Fixed a heap overflow vulnerability that could lead to code execution (CVE-2012-1525).
- Fixed a memory corruption vulnerability that could lead to code execution (CVE-2012-4161) (MAC OS only).
- Fixed a memory corruption vulnerability that could lead to code execution (CVE-2012-4162) (MAC OS only).
Source:
No comments:
Post a Comment