Unattended : Adobe Acrobat Reader 9.1


Adobe recently released the Adobe Acrobat Reader 9.1 which fixes critical vulnerability that would cause the application to crash and could potentially allow an attacker to take control of the affected system. Hopefully it also fixes the problems people are experiencing with Roaming of Application Data on Terminal Servers. I have not been able to test this yet in production.

Download Adobe Acrobat Reader 9.1 English / UK and extract the files with this command : C:AdbeRdr910_en_US_Std.exe -nos_ne

All my scripts are based on the ScriptFrameWork developed by Joe Shonk. The script normally uses to folders, Source and Scripts. Copy the extracted files from %UserProfile%Local SettingsApplication DataAdobeReader 9.1Setup Files and paste it into your Source catalog.


Then create an Install.cmd file in the Scripts catalog and paste the script from below. Because of the CSS on my blog be sure to search and replace all the ” ” in Notepad which will cause the script to fail!

I would recommend you to check out my favorite blog Stealthpuppy.com by Aaron Parker who has created a custom transform file for Adobe Acrobat Reader 9.1 and also Group Policy ADM/ADMX files. A lot of detailed information in this blog.

I’ve created a script for silent installation :

[sourcecode language=”plain”]

@echo off
REM Install Adobe Acrobat Reader 9.1
REM ScriptFrameWork by Joe Shonk – www.theshonkproject.com
REM Customized by Trond Eirik Haavarstein – www.xenappblog.com

pushd %~dp0
cd ..

set AppSourcePath=Source
set AppConfigPath=Configuration
set AppInstallPath=Scripts
set AppHotfixesPath=Hotfixes

set LogFile="%temp%Adobe Acrobat Reader 9.1.log"
set Switches=/qn ALLUSERS=1 REBOOT="ReallySuppress"
set MST=TRANSFORMS=AdobeReader91Custom.mst

echo Installing Adobe Acrobat Reader 9.1

cd %AppSourcePath%
start /wait msiexec /i "AcroRead.msi" %MST% %Switches% /liewa %LOGFILE%

del "C:Documents and SettingsAll UsersDesktopAcrobat.com.lnk"
del "C:Documents and SettingsAll UsersStart MenuProgramsAcrobat.com.lnk"



Leave a reply