Adobe recommends users update their product installations to the latest versions:
- Users of Adobe Reader XI (11.0.0) for Windows and Mac OS should update to Adobe Reader XI (11.0.01).
- Users of Adobe Reader X (10.1.4) and earlier versions for Windows and Mac OS should update to Adobe Reader X (10.1.5).
- Users of Adobe Reader 9.5.2 and earlier versions for Windows and Mac OS should update to Adobe Reader 9.5.3.
- Users of Adobe Reader 9.5.1 and earlier versions for Linux should update to Adobe Reader 9.5.3.
Overview
Adobe Reader is the free global standard for reliably viewing, printing, and commenting on Portable Document Format (PDF) documents with its original appearance preserved. Adobe Reader allows you open and interact with all types of PDF content, including forms and multimedia.
Full description of the improvements and the update in Adobe Reader XI (11.0) available here.
Download Adobe Reader XI 11.0.01:
New users can download Adobe Reader XI 11.0.01 from links listed below. Download the files appropriate for you:
For Adobe Reader users on Windows can find the appropriate update from Adobe Reader for Windows
For Adobe Reader users on Mac OS can find the appropriate update from Adobe Reader for Mac
For Adobe Reader users on Android devices can find the appropriate update from Google Play
For Adobe Reader users on iPad and iPhone can find the appropriate update from App Store
What's new in Adobe Reader XI (11.0.01)?
This update contains the following updates and fixes:
Security fixed:
- Fixed memory corruption vulnerabilities that could lead to code execution (CVE-2012-1530, CVE-2013-0601, CVE-2013-0605, CVE-2013-0616, CVE-2013-0619, CVE-2013-0620, CVE-2013-0623).
- Fixed a use-after-free vulnerability that could lead to code execution (CVE-2013-0602).
- Fixed heap overflow vulnerabilities that could lead to code execution (CVE-2013-0603, CVE-2013-0604).
- Fixed stack overflow vulnerabilities that could lead to code execution (CVE-2013-0610, CVE-2013-0626).
- Fixed buffer overflow vulnerabilities that could lead to code execution (CVE-2013-0606, CVE-2013-0612, CVE-2013-0615, CVE-2013-0617, CVE-2013-0621).
- Fixed integer overflow vulnerabilities that could lead to code execution (CVE-2013-0609, CVE-2013-0613).
- Fixed a local privilege escalation vulnerability (CVE-2013-0627).
- Fixed logic error vulnerabilities that could lead to code execution (CVE-2013-0607, CVE-2013-0608, CVE-2013-0611, CVE-2013-0614, CVE-2013-0618).
- Fixed security bypass vulnerabilities (CVE-2013-0622, CVE-2013-0624).
References:
No comments:
Post a Comment