Feb 29, 2020 Adobe Reader is the most popular PDF file reader program. PDF (Portable Document Format) is used to store documents, including e-books and pictures. The program can only read a PDF file. It has support for all the adavnced features of a PDF document such as graphics, 3D etc. Aug 19, 2015 Adobe Reader Update 11.0.12 Adobe Reader software is the free global standard for reliably viewing, printing, and commenting on PDF documents. Sep 23, 2014 Reader 11: Adobe - Adobe Reader: For Macintosh: Adobe Reader 11.0.09 Font Packs - Asian and Extended Language Pack. One you download, double click the downloaded.DMG file. You should now see a mounted disk on your desktop by name 'FontPack11009XtdAlfLang'. Double click that.
Security Updates Available for Adobe Acrobat and Reader
Release date: October 13, 2015
Last updated: December 11, 2015
Vulnerability identifier: APSB15-24
Adobe Reader 11.0.12 Dmg Download
Priority: See table below
![Adobe Adobe](/uploads/1/2/6/0/126016372/474880118.png)
CVE numbers: CVE-2015-5583, CVE-2015-5586, CVE-2015-6683, CVE-2015-6684, CVE-2015-6685, CVE-2015-6686, CVE-2015-6687, CVE-2015-6688, CVE-2015-6689, CVE-2015-6690, CVE-2015-6691, CVE-2015-6692, CVE-2015-6693, CVE-2015-6694, CVE-2015-6695, CVE-2015-6696, CVE-2015-6697, CVE-2015-6698, CVE-2015-6699, CVE-2015-6700, CVE-2015-6701, CVE-2015-6702, CVE-2015-6703, CVE-2015-6704, CVE-2015-6705, CVE-2015-6706, CVE-2015-6707, CVE-2015-6708, CVE-2015-6709, CVE-2015-6710, CVE-2015-6711, CVE-2015-6712, CVE-2015-6713, CVE-2015-6714, CVE-2015-6715, CVE-2015-6716, CVE-2015-6717, CVE-2015-6718, CVE-2015-6719, CVE-2015-6720, CVE-2015-6721, CVE-2015-6722, CVE-2015-6723, CVE-2015-6724, CVE-2015-6725, CVE-2015-7614, CVE-2015-7615, CVE-2015-7616, CVE-2015-7617, CVE-2015-7618, CVE-2015-7619, CVE-2015-7620, CVE-2015-7621, CVE-2015-7622, CVE-2015-7623, CVE-2015-7624, CVE-2015-7650, CVE-2015-8458
Adobe Reader 11.0.12 Dmg 1
Platform: Windows and Macintosh
Adobe has released security updates for Adobe Acrobat and Reader for Windows and Macintosh. These updates address critical vulnerabilities that could potentially allow an attacker to take control of the affected system.
Product | Track | Affected Versions | Platform |
---|---|---|---|
Acrobat DC | Continuous | 2015.008.20082 and earlier versions | Windows and Macintosh |
Acrobat Reader DC | Continuous | 2015.008.20082 and earlier versions | Windows and Macintosh |
Acrobat DC | Classic | 2015.006.30060 and earlier versions | Windows and Macintosh |
Acrobat Reader DC | Classic | 2015.006.30060 and earlier versions | Windows and Macintosh |
Acrobat XI | Desktop | 11.0.12 and earlier versions | Windows and Macintosh |
Reader XI | Desktop | 11.0.12 and earlier versions | Windows and Macintosh |
Acrobat X | Desktop | 10.1.15 and earlier versions | Windows and Macintosh |
Reader X | Desktop | 10.1.15 and earlier versions | Windows and Macintosh |
For questions regarding Acrobat DC, please visit the Acrobat DC FAQ page. For questions regarding Acrobat Reader DC, please visit the Acrobat Reader DC FAQ page.
Adobe recommends users update their software installations to the latest versions by following the instructions below.
The latest product versions are available to end users via one of the following methods:
- Users can update their product installations manually by choosing Help > Check for Updates.
- The products will update automatically, without requiring user intervention, when updates are detected.
- The full Acrobat Reader installer can be downloaded from the Acrobat Reader Download Center.
For IT administrators (managed environments):
- Download the enterprise installers from ftp://ftp.adobe.com/pub/adobe/, or refer to the specific release note version for links to installers.
- Install updates via your preferred methodology, such as AIP-GPO, bootstrapper, SCUP/SCCM (Windows), or on Macintosh, Apple Remote Desktop and SSH.
Product | Track | Updated Versions | Platform | Priority Rating | Availability |
---|---|---|---|---|---|
Acrobat DC | Continuous | 2015.009.20069 | Windows and Macintosh | 2 | Windows Macintosh |
Acrobat Reader DC | Continuous | 2015.009.20069 | Windows and Macintosh | 2 | Download Center |
Acrobat DC | Classic | 2015.006.30094 | Windows and Macintosh | 2 | Windows Macintosh |
Acrobat Reader DC | Classic | 2015.006.30094 | Windows and Macintosh | 2 | Windows Macintosh |
Acrobat XI | Desktop | 11.0.13 | Windows and Macintosh | 2 | Windows Macintosh |
Reader XI | Desktop | 11.0.13 | Windows and Macintosh | 2 | Windows Macintosh |
Acrobat X | Desktop | 10.1.16 | Windows and Macintosh | 2 | Windows Macintosh |
Reader X | Desktop | 10.1.16 | Windows and Macintosh | 2 | Windows Macintosh |
- These updates resolve a buffer overflow vulnerability that could lead to information disclosure (CVE-2015-6692).
- These updates resolve use-after-free vulnerabilities that could lead to code execution (CVE-2015-6689, CVE-2015-6688, CVE-2015-6690, CVE-2015-7615, CVE-2015-7617, CVE-2015-6687, CVE-2015-6684, CVE-2015-6691, CVE-2015-7621, CVE-2015-5586, CVE-2015-6683).
- These updates resolve heap buffer overflow vulnerabilities that could lead to code execution (CVE-2015-6696, CVE-2015-6698, CVE-2015-8458).
- These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2015-6685, CVE-2015-6693, CVE-2015-6694, CVE-2015-6695, CVE-2015-6686, CVE-2015-7622, CVE-2015-7650).
- These updates resolve memory leak vulnerabilities (CVE-2015-6699, CVE-2015-6700, CVE-2015-6701, CVE-2015-6702, CVE-2015-6703, CVE-2015-6704, CVE-2015-6697).
- These updates resolve security bypass vulnerabilities that could lead to information disclosure (CVE-2015-5583, CVE-2015-6705, CVE-2015-6706, CVE-2015-7624).
- These updates resolve various methods to bypass restrictions on Javascript API execution (CVE-2015-6707, CVE-2015-6708, CVE-2015-6709, CVE-2015-6710, CVE-2015-6711, CVE-2015-6712, CVE-2015-7614, CVE-2015-7616, CVE-2015-6716, CVE-2015-6717, CVE-2015-6718, CVE-2015-6719, CVE-2015-6720, CVE-2015-6721, CVE-2015-6722, CVE-2015-6723, CVE-2015-6724, CVE-2015-6725, CVE-2015-7618, CVE-2015-7619, CVE-2015-7620, CVE-2015-7623, CVE-2015-6713, CVE-2015-6714, CVE-2015-6715).
Adobe would like to thank the following individuals and organizations for reporting the relevant issues and for working with Adobe to help protect our customers:
- AbdulAziz Hariri of HP Zero Day Initiative (CVE-2015-6708, CVE-2015-6709, CVE-2015-6710, CVE-2015-6711, CVE-2015-6712, CVE-2015-7614, CVE-2015-7616, CVE-2015-6689, CVE-2015-6688, CVE-2015-6690, CVE-2015-7615, CVE-2015-7617, CVE-2015-6697, CVE-2015-6685, CVE-2015-6693, CVE-2015-6694, CVE-2015-6695, CVE-2015-6707)
- AbdulAziz Hariri and Jasiel Spelman of HP Zero Day Initiative (CVE-2015-5583, CVE-2015-6699, CVE-2015-6700, CVE-2015-6701, CVE-2015-6702, CVE-2015-6703, CVE-2015-6704)
- Alex Inführ of Cure53.de (CVE-2015-6705, CVE-2015-6706)
- Bill Finlayson of Vectra Networks (CVE-2015-6687)
- bilou working with VeriSign iDefense Labs (CVE-2015-6684)
- Brian Gorenc of HP Zero Day Initiative (CVE-2015-6686)
- Francis Provencher from COSIG (CVE-2015-7622)
- Jaanus Kp of Clarified Security working with HP's Zero Day Initiative (CVE-2015-6696, CVE-2015-6698)
- Jack Tang of TrendMicro (CVE-2015-6692)
- James Loureiro of MWR Labs (CVE-2015-6691)
- Joel Brewer (CVE-2015-7624)
- kdot working with HP's's Zero Day Initiative (CVE-2015-7621, CVE-2015-7650)
- Matt Molinyawe and Jasiel Spelman of HP's Zero Day Initiative (CVE-2015-6716, CVE-2015-6717, CVE-2015-6718, CVE-2015-6719, CVE-2015-6720, CVE-2015-6721, CVE-2015-6722, CVE-2015-6723, CVE-2015-6724, CVE-2015-6725, CVE-2015-7618, CVE-2015-7619, CVE-2015-7620)
- Matt Molinyawe of HP Zero Day Initiative (CVE-2015-7623)
- WanderingGlitch of HP's Zero Day Initiative (CVE-2015-6713, CVE-2015-6714, CVE-2015-6715)
- Wei Lei and Wu Hongjun of Nanyang Technological University (CVE-2015-5586)
- Wei Lei, as well as Wu Hongjun of Nanyang Technological University working with Verisign iDefense Labs (CVE-2015-6683)
- AbdulAziz Hariri and Jasiel Spelman of HP Zero Day Initiative for defense-in-depth contributions
- Fritz Sands working with HP's Zero Day Initiative (CVE-2015-8458)
October 14, 2015: Corrected erroneous CVE details and acknowledgments
October 29, 2015: Added a reference to CVE-2015-7829, which was reported as a vulnerability in Acrobat and Reader but resolved via a security fix in Windows referenced in MS15-090. Also, added a reference to CVE-2015-7650, which was fixed in the October 13 release of Acrobat and Reader but accidentally omitted from the bulletins.
December 11, 2015: Added a reference to CVE-2015-8458, which was fixed in the October 13 release of Acrobat and Reader but accidentally omitted from the bulletins.
- Latest Version:
- Requirements:Mac OS X (Intel, PPC)
- Author / Product:Adobe Systems Inc / Adobe Acrobat Reader DC for Mac
- Old Versions:
- Filename:AdbeRdr11010_en_US.dmg
- MD5 Checksum:c94b74b96d2da5b22749c353a2ecd54d
More powerful than other PDF software, Adobe Acrobat Reader DC for Mac (formerly Adobe Reader for Mac) is the free, trusted standard for viewing, printing, and annotating PDFs. And now, it’s connected to Adobe Document Cloud — so it’s easier than ever to work with PDFs on computers and mobile devices.
New modern interface
Acrobat Reader DC for macOS has a new modern look. This includes a full set of commenting tools to add sticky notes, highlight text, and use lines, shapes, and stamps on your PDFs.
View and annotate PDF files
With Acrobat Reader DC for Mac, you can do even more than open and view PDF files. It’s easy to add annotations to documents using a complete set of commenting tools.
Open once, read anywhere
With Mobile Link, recently viewed files are easy to access from all of your computers, web browsers, and mobile devices — regardless of where you last viewed them.
Convert PDFs to Word
Additional Adobe Document Cloud services are just a click away. Inside Reader, you can subscribe to activate additional capabilities to create PDF files and export them to Word or Excel.
Fill, sign, and send PDF forms
Say goodbye to paper forms. Instead, type responses on your PDF form. Add your e-signature. Submit the form electronically. And save a copy for your records.
Manage software rollouts and standards compliance
Use Adobe and Microsoft tools to manage and deploy updates. Get support for a wide range of document security standards. Extend Reader functionality using the free Acrobat SDK.
Also Available: Download Adobe Acrobat Reader DC for Windows
New modern interface
Acrobat Reader DC for macOS has a new modern look. This includes a full set of commenting tools to add sticky notes, highlight text, and use lines, shapes, and stamps on your PDFs.
View and annotate PDF files
With Acrobat Reader DC for Mac, you can do even more than open and view PDF files. It’s easy to add annotations to documents using a complete set of commenting tools.
Open once, read anywhere
With Mobile Link, recently viewed files are easy to access from all of your computers, web browsers, and mobile devices — regardless of where you last viewed them.
Convert PDFs to Word
Additional Adobe Document Cloud services are just a click away. Inside Reader, you can subscribe to activate additional capabilities to create PDF files and export them to Word or Excel.
Fill, sign, and send PDF forms
Say goodbye to paper forms. Instead, type responses on your PDF form. Add your e-signature. Submit the form electronically. And save a copy for your records.
Manage software rollouts and standards compliance
Use Adobe and Microsoft tools to manage and deploy updates. Get support for a wide range of document security standards. Extend Reader functionality using the free Acrobat SDK.
Also Available: Download Adobe Acrobat Reader DC for Windows