Careful! I recently learned that using that is a license violation.
-----Original Message----- From: Sam Cayze [mailto:sam.ca...@rollouts.com] Sent: Wednesday, March 11, 2009 4:19 PM To: NT System Admin Issues Subject: RE: Foxit PDF Reader Flaws To get the MSIs you can also run the Adobe Updater from one instance of 9.0, and find the downloaded 9.1 updates in ...\Local Settings\Application Data\Adobe\Updater6\Install\ -Sam -----Original Message----- From: Joe Heaton [mailto:jhea...@etp.ca.gov] Sent: Wednesday, March 11, 2009 10:39 AM To: NT System Admin Issues Subject: RE: Foxit PDF Reader Flaws The patch is out. It's an update from 9.0 to 9.1. My question is whether or not they're going to provide another download to give us separate files for Adobe Air and Reader. Right now, the full download of the update only provides one install, which includes both. You can get just the reader install from the FTP site, but it is an .exe, not .msi... Joe Heaton Employment Training Panel -----Original Message----- From: Carl Houseman [mailto:c.house...@gmail.com] Sent: Wednesday, March 11, 2009 8:22 AM To: NT System Admin Issues Subject: RE: Foxit PDF Reader Flaws It's March 11 already in most of the world and no Adobe patch yet. (I know, they're hardly awake in CA yet and why should I be surprised that Adobe can't automate something as simple putting a new version online.) Carl -----Original Message----- From: Mike French [mailto:mike.fre...@theequitybank.com] Sent: Wednesday, March 11, 2009 11:14 AM To: NT System Admin Issues Subject: Foxit PDF Reader Flaws Just an FYI: March 9, Computerworld - (International) Foxit PDF viewer open to attack, say researchers. Security researchers on March 9 warned of several vulnerabilities in Foxit, a free PDF document viewer that has been recommended as an alternative to Adobe Reader, which currently contains an unpatched critical bug of its own. Foxit Software Co. patched its namesake on March 9 to plug three holes. One of the three vulnerabilities is in the same JBIG2 image compression format fingered by researchers last month as the root of the bug in Adobe System Inc.'s popular Reader and Acrobat applications. The flaw in Adobe's software, which has been exploited by hackers since at least early January, will not be patched until March 11, according to Adobe's schedule. The Foxit and Adobe bugs are unrelated, however, except for the fact that they are both in the code that parses JBIG2 images, said the chief technology officer at Secunia, the Danish company that reported the flaw to Foxit. "It is a completely different vulnerability related to JBIG2," he said in an e-mail on March 9. It was Adobe's confirmation of its bug that prompted Secunia researchers to dig into other PDF viewers. "We did, however, start the research in Foxit out of curiosity based on the Adobe vulnerability, and discovered this new vulnerability," the chief technology officer said. Secunia reported the bug to Foxit on February 27. The remaining two bugs in Foxit were reported February 18 by Core Security Technologies, a developer of penetration testing software. One of the vulnerabilities can trigger a buffer overflow, while the other could be used by attackers to circumvent security warnings. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~