Friday, February 19, 2010

Security Updates Available for Adobe Reader and Acrobat v9

Adobe shipped a critical security update to its Adobe version 9 products on Feb 18, 2010 that patches a critical vulnerability that could cause the application to crash and could potentially allow an attacker to take control of the affected system

Note: To determine the version of any of the above applications, open the Adobe program. Then from the Help menu choose About Adobe, (name of program). You should see the version listed in a new box. Then, you can click anywhere on this box to close it.

The current version of Adobe Acrobat and Adobe Reader is version 9.3.1.

Note: If you have Adobe Reader version 8.x on your computer, you should remove this version and update to Adobe Reader 9.3.1. See our How To Install and Configure Adobe Reader v9 for Windows.

Action Required: Ag IT recommends that College of Ag Science faculty and staff update any Adobe version 9 products to the current version.

To apply these updates:

  1. Close all other programs and then open your version of Adobe Reader or Acrobat Professional.
  2. From the Help menu choose Check for Updates.
  3. If updates were found, they should begin to download. If not, click the Download and Install Updates button.
  4. The updater will prompt you to close the program before the update can be installed. Click Continue.

    Note: The Installation Progress window may be minimized to the lower right of the screen (in the notification tray). To see the Installation Progress window, right click on its white icon and choose Show Progress.

  5. When the process completes, click Quit.
  6. The Adobe Reader or or Acrobat Professional program will re-open.
  7. From the Help menu choose Check for Updates. If no updates are available, click Quit.
  8. Close Adobe Reader or or Acrobat Professional.
Note: Earlier versions of Adobe Acrobat Professional (version 6 or lower) will not be patched.

The Adobe Security bulletin, Security Updates available for Adobe Reader and Acrobat, has additional information and links.

No comments: