Careful!

I recently learned that using that is a license violation.

-----Original Message-----
From: Sam Cayze [mailto:sam.ca...@rollouts.com] 
Sent: Wednesday, March 11, 2009 4:19 PM
To: NT System Admin Issues
Subject: RE: Foxit PDF Reader Flaws

To get the MSIs you can also run the Adobe Updater from one instance of
9.0, and find the downloaded 9.1 updates in 

...\Local Settings\Application Data\Adobe\Updater6\Install\ 

-Sam

-----Original Message-----
From: Joe Heaton [mailto:jhea...@etp.ca.gov] 
Sent: Wednesday, March 11, 2009 10:39 AM
To: NT System Admin Issues
Subject: RE: Foxit PDF Reader Flaws

The patch is out.  It's an update from 9.0 to 9.1.  My question is
whether or not they're going to provide another download to give us
separate files for Adobe Air and Reader.  Right now, the full download
of the update only provides one install, which includes both.  You can
get just the reader install from the FTP site, but it is an .exe, not
.msi...

Joe Heaton
Employment Training Panel


-----Original Message-----
From: Carl Houseman [mailto:c.house...@gmail.com]
Sent: Wednesday, March 11, 2009 8:22 AM
To: NT System Admin Issues
Subject: RE: Foxit PDF Reader Flaws

It's March 11 already in most of the world and no Adobe patch yet.  (I
know, they're hardly awake in CA yet and why should I be surprised that
Adobe can't automate something as simple putting a new version online.)

Carl

-----Original Message-----
From: Mike French [mailto:mike.fre...@theequitybank.com]
Sent: Wednesday, March 11, 2009 11:14 AM
To: NT System Admin Issues
Subject: Foxit PDF Reader Flaws

Just an FYI:

March 9, Computerworld - (International) Foxit PDF viewer open to
attack, say researchers. Security researchers on March 9 warned of
several vulnerabilities in Foxit, a free PDF document viewer that has
been recommended as an alternative to Adobe Reader, which currently
contains an unpatched critical bug of its own. Foxit Software Co.
patched its namesake on March 9 to plug three holes. One of the three
vulnerabilities is in the same JBIG2 image compression format fingered
by researchers last month as the root of the bug in Adobe System Inc.'s
popular Reader and Acrobat applications. The flaw in Adobe's software,
which has been exploited by hackers since at least early January, will
not be patched until March 11, according to Adobe's schedule. The Foxit
and Adobe bugs are unrelated, however, except for the fact that they are
both in the code that parses JBIG2 images, said the chief technology
officer at Secunia, the Danish company that reported the flaw to Foxit.
"It is a completely different vulnerability related to JBIG2," he said
in an e-mail on March 9. It was Adobe's confirmation of its bug that
prompted Secunia researchers to dig into other PDF viewers. "We did,
however, start the research in Foxit out of curiosity based on the Adobe
vulnerability, and discovered this new vulnerability," the chief
technology officer said. Secunia reported the bug to Foxit on February
27. The remaining two bugs in Foxit were reported February 18 by Core
Security Technologies, a developer of penetration testing software. One
of the vulnerabilities can trigger a buffer overflow, while the other
could be used by attackers to circumvent security warnings.



~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~



~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to