Even on Windows, an attacker has to get you to open a malicious file, and while this attack is in the wild, it’s certainly not widespread. We have no evidence that Mac users are currently being exploited, but we also don’t know of any technical obstacle preventing attackers from targeting Macs. For Windows users, this vulnerability was being exploited in the wild before the patch was released (what we in the security field call a “zero day vulnerability”).
#FREE DOWNLOAD ADOBE READER UPDATE 9.1.3 PDF#
These vulnerabilities allow an attacker to take over your computer even if all you do is view a maliciously crafted PDF file. The latest vulnerabilities affect Adobe Reader 9.1.3 and Acrobat 9.1.3, Adobe Reader 8.1.6 and Acrobat 8.1.6 for Windows, Macintosh and Unix, and Adobe Reader 7.1.3 and Acrobat 7.1.3 for Windows and Macintosh. This likely won’t meet the needs of marketing professionals, designers, or ebook publishers, but is sufficient for the average home user or office worker.
#FREE DOWNLOAD ADOBE READER UPDATE 9.1.3 MAC OS X#
Many Mac programs can generate PDF files directly, and Mac OS X has long had a Save as PDF command in the Print dialog, which enables you to turn anything you can print into a PDF. Unless you need to access PDF files with Adobe’s digital rights management protection, or commonly encounter PDF files that it can’t display properly, Preview is more than sufficient to meet your day-to-day PDF viewing needs.Īdobe Acrobat, a commercial product used to create PDF files, is harder to replace, but it’s also far less commonly needed.
On 13-Oct-09 Adobe released a major security update for multiple versions of its Adobe Acrobat and Adobe Reader products on Windows, Macs, and Linux platforms for flaws that could allow an attacker to take over vulnerable systems.ĭue to Adobe’s atrocious security record, I recommend that all Mac users not only immediately patch Adobe Reader and Acrobat, but make sure they set Apple’s Preview as their default PDF reader. Protect Yourself from Adobe Acrobat and Reader Vulnerabilities