Adobe Reader 9.3.2

Adobe Reader 9.3.2 is een beveiligingsupdate die vijftien lekken in de PDF lezer repareert. De lekken worden als kritiek aangemerkt. Reden om snel te updaten via het menu Help - Controleren op updates in Adobe Reader. De nieuwe versie is beschikbaar voor Windows, Mac OS X en Linux.

Release notes:
This update resolves a cross-site scripting vulnerability that could lead to code execution (CVE-2010-0190).
This update resolves a prefix protocol handler vulnerability that could lead to code execution (CVE-2010-0191).
This update resolves a denial of service vulnerability; arbitrary code execution has not been demonstrated, but may be possible (CVE-2010-0192).
This update resolves a denial of service vulnerability; arbitrary code execution has not been demonstrated, but may be possible (CVE-2010-0193).
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2010-0194).
This update resolves a font handling vulnerability that could lead to code execution (CVE-2010-0195).
This update resolves a denial of service vulnerability; arbitrary code execution has not been demonstrated, but may be possible (CVE-2010-0196).
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2010-0197).
This update resolves a buffer overflow vulnerability that could lead to code execution (CVE-2010-0198).
This update resolves a buffer overflow vulnerability that could lead to code execution (CVE-2010-0199).
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2010-0201).
This update resolves a buffer overflow vulnerability that could lead to code execution (CVE-2010-0202).
This update resolves a buffer overflow vulnerability that could lead to code execution (CVE-2010-0203).
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2010-0204).
This update resolves a heap-based overflow vulnerability that could lead to code execution (CVE-2010-1241).

Reageren

Plain text

  • Toegelaten HTML-tags: <em> <strong> <br> <p>
  • Adressen van webpagina's en e-mailadressen worden automatisch naar links omgezet.
  • Regels en paragrafen worden automatisch gesplitst.
  • <img> elements are lazy-loaded.
Verplichte controlevraag
Om spam tegen te houden
grie_enland