Adobe Reader XI (11.0.01) Available for Download

Adobe has released Adobe Reader XI (11.0.01) for Windows and Mac OS, Adobe Reader X (10.1.5) for Windows and Mac OS, and Adobe Reader 9.5.3 for Windows, Mac OS and Linux. These updates address multiple critical-risk vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.

Adobe recommends users update their product installations to the latest versions:
  • Users of Adobe Reader XI (11.0.0) for Windows and Mac OS should update to Adobe Reader XI (11.0.01).
  • Users of Adobe Reader X (10.1.4) and earlier versions for Windows and Mac OS should update to Adobe Reader X (10.1.5).
  • Users of Adobe Reader 9.5.2 and earlier versions for Windows and Mac OS should update to Adobe Reader 9.5.3.
  • Users of Adobe Reader 9.5.1 and earlier versions for Linux should update to Adobe Reader 9.5.3.

Overview
Adobe Reader is the free global standard for reliably viewing, printing, and commenting on Portable Document Format (PDF) documents with its original appearance preserved. Adobe Reader allows you open and interact with all types of PDF content, including forms and multimedia.

Full description of the improvements and the update in Adobe Reader XI (11.0) available here.

Download Adobe Reader XI 11.0.01:
New users can download Adobe Reader XI 11.0.01 from links listed below. Download the files appropriate for you:

For Adobe Reader users on Windows can find the appropriate update from Adobe Reader for Windows

For Adobe Reader users on Mac OS can find the appropriate update from Adobe Reader for Mac

For Adobe Reader users on Android devices can find the appropriate update from Google Play

For Adobe Reader users on iPad and iPhone can find the appropriate update from App Store

What's new in Adobe Reader XI (11.0.01)?
This update contains the following updates and fixes:

Security fixed:
  • Fixed memory corruption vulnerabilities that could lead to code execution (CVE-2012-1530, CVE-2013-0601, CVE-2013-0605, CVE-2013-0616, CVE-2013-0619, CVE-2013-0620, CVE-2013-0623).
  • Fixed a use-after-free vulnerability that could lead to code execution (CVE-2013-0602).
  • Fixed heap overflow vulnerabilities that could lead to code execution (CVE-2013-0603, CVE-2013-0604).
  • Fixed stack overflow vulnerabilities that could lead to code execution (CVE-2013-0610, CVE-2013-0626).
  • Fixed buffer overflow vulnerabilities that could lead to code execution (CVE-2013-0606, CVE-2013-0612, CVE-2013-0615, CVE-2013-0617, CVE-2013-0621).
  • Fixed integer overflow vulnerabilities that could lead to code execution (CVE-2013-0609, CVE-2013-0613).
  • Fixed a local privilege escalation vulnerability (CVE-2013-0627).
  • Fixed logic error vulnerabilities that could lead to code execution (CVE-2013-0607, CVE-2013-0608, CVE-2013-0611, CVE-2013-0614, CVE-2013-0618).
  • Fixed security bypass vulnerabilities (CVE-2013-0622, CVE-2013-0624).

References:

No comments: