You can get the .msi from the .exe file:

http://kb.adobe.com/selfservice/viewContent.do?externalId=kb404146

 - Andy O.

>-----Original Message-----
>From: Joe Heaton [mailto:jhea...@etp.ca.gov]
>Sent: Wednesday, March 11, 2009 9:39 AM
>To: NT System Admin Issues
>Subject: RE: Foxit PDF Reader Flaws
>
>The patch is out.  It's an update from 9.0 to 9.1.  My question is
>whether or not they're going to provide another download to give us
>separate files for Adobe Air and Reader.  Right now, the full download
>of the update only provides one install, which includes both.  You can
>get just the reader install from the FTP site, but it is an .exe, not
>.msi...
>
>Joe Heaton
>Employment Training Panel
>
>
>-----Original Message-----
>From: Carl Houseman [mailto:c.house...@gmail.com]
>Sent: Wednesday, March 11, 2009 8:22 AM
>To: NT System Admin Issues
>Subject: RE: Foxit PDF Reader Flaws
>
>It's March 11 already in most of the world and no Adobe patch yet.  (I
>know,
>they're hardly awake in CA yet and why should I be surprised that Adobe
>can't automate something as simple putting a new version online.)
>
>Carl
>
>-----Original Message-----
>From: Mike French [mailto:mike.fre...@theequitybank.com]
>Sent: Wednesday, March 11, 2009 11:14 AM
>To: NT System Admin Issues
>Subject: Foxit PDF Reader Flaws
>
>Just an FYI:
>
>March 9, Computerworld - (International) Foxit PDF viewer open to
>attack, say researchers. Security researchers on March 9 warned of
>several vulnerabilities in Foxit, a free PDF document viewer that has
>been recommended as an alternative to Adobe Reader, which currently
>contains an unpatched critical bug of its own. Foxit Software Co.
>patched its namesake on March 9 to plug three holes. One of the three
>vulnerabilities is in the same JBIG2 image compression format fingered
>by researchers last month as the root of the bug in Adobe System Inc.'s
>popular Reader and Acrobat applications. The flaw in Adobe's software,
>which has been exploited by hackers since at least early January, will
>not be patched until March 11, according to Adobe's schedule. The Foxit
>and Adobe bugs are unrelated, however, except for the fact that they are
>both in the code that parses JBIG2 images, said the chief technology
>officer at Secunia, the Danish company that reported the flaw to Foxit.
>"It is a completely different vulnerability related to JBIG2," he said
>in an e-mail on March 9. It was Adobe's confirmation of its bug that
>prompted Secunia researchers to dig into other PDF viewers. "We did,
>however, start the research in Foxit out of curiosity based on the Adobe
>vulnerability, and discovered this new vulnerability," the chief
>technology officer said. Secunia reported the bug to Foxit on February
>27. The remaining two bugs in Foxit were reported February 18 by Core
>Security Technologies, a developer of penetration testing software. One
>of the vulnerabilities can trigger a buffer overflow, while the other
>could be used by attackers to circumvent security warnings.
>
>
>
>~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
>
>
>~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
>~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to