描述:
Adobe 发布了修补程式,以应对于 Adobe Reader 及 Acrobat 的多个漏洞。远端攻击者可诱使目标用户开启特制的 PDF 档案来攻击漏洞。
受影响的系统:
- Acrobat DC (Windows 及 macOS) Continuous 23.008.20470 和之前版本
- Acrobat Reader DC (Windows 及 macOS) Continuous 23.008.20470 和之前版本
- Acrobat 2020 (Windows 及 macOS) Classic 2020 20.005.30539 和之前版本
- Acrobat Reader 2020 (Windows 及 macOS) Classic 2020 20.005.30539 和之前版本
影响:
成功利用漏洞可以让攻击者在受影响的系统远端执行程式码、令服务被拒绝或泄漏资讯。
建议:
受影响系统的用户应更新 Adobe Reader 及 Acrobat 至下列版本以应对以上问题。更新可透过产品本身的自动更新或从下列网址下载:
- Acrobat DC (Windows 及 macOS) Continuous 23.008.20533
https://www.adobe.com/devnet-docs/acrobatetk/tools/ReleaseNotesDC/index.html#continuous-track
- Acrobat Reader DC (Windows 及 macOS) Continuous 23.008.20533
https://www.adobe.com/devnet-docs/acrobatetk/tools/ReleaseNotesDC/index.html#continuous-track
- Acrobat 2020 (Windows 及 macOS) Classic 2020 20.005.30574
https://www.adobe.com/devnet-docs/acrobatetk/tools/ReleaseNotesDC/index.html#classic-track
- Acrobat Reader 2020 (Windows 及 macOS) Classic 2020 20.005.30574
https://www.adobe.com/devnet-docs/acrobatetk/tools/ReleaseNotesDC/index.html#classic-track
进一步资讯:
- https://helpx.adobe.com/security/products/acrobat/apsb24-07.html
- https://www.hkcert.org/tc/security-bulletin/adobe-monthly-security-update-february-2024
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20726 (to CVE-2024-20731)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20733 (to CVE-2024-20736)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20747 (to CVE-2024-20749)