Adobe Releases Critical Security Updates for Acrobat and Adobe Reader
After a week delay, Adobe has finally pushed out critical security updates for its frequently-attacked Reader and Acrobat PDF software packages to patch serious vulnerabilities that could lead to computers being compromised.

The new versions of Adobe Reader and Acrobat released Tuesday for both Windows and Macintosh computers address eight vulnerabilities, five of which could allow for remote code execution.

The remaining three vulnerabilities involve a sandbox bypass vulnerability that can be exploited to escalate an attacker’s privileges on Windows, a denial-of-service (DoS) vulnerability related to memory corruption, and a cross-site scripting (XSS) flaw that only affects the programs on the Mac platform. According to Adobe's advisory, applying the patches will involve a system restart.

The affected versions are:
  • Adobe Reader XI (11.0.08) and earlier 11.x versions for Windows
  • Adobe Reader XI (11.0.07) and earlier 11.x versions for Macintosh
  • Adobe Reader X (10.1.11) and earlier 10.x versions for Windows
  • Adobe Reader X (10.1.10) and earlier 10.x versions for Macintosh
  • Adobe Acrobat XI (11.0.08) and earlier 11.x versions for Windows
  • Adobe Acrobat XI (11.0.07) and earlier 11.x versions for Macintosh
  • Adobe Acrobat X (10.1.11) and earlier 10.x versions for Windows
  • Adobe Acrobat X (10.1.10) and earlier 10.x versions for Macintosh
The Reader and Acrobat updates were originally scheduled to be released a week ago, but were delayed due to issues identified during testing.

Additionally, the company rolled out a critical update for Adobe Flash (Windows and Macintosh), Flash browser plugins and Adobe AIR Desktop. A number of flaws in Adobe Flash Player are of highest severity which could led to remote code execution.

The new versions can be downloaded by using the following links:
All the updates are important to patch because several critical vulnerability could potentially allow an attacker to take over the affected system.

Have something to say about this article? Comment below or share it with us on Facebook, Twitter or our LinkedIn Group.