描述:
Adobe 发布了数个安全更新,以应对于Adobe Flash Player和Adobe Acrobat 及 Reader中发现的堆阵满溢、使用已释放内存错误、绕过保安限制、内存损毁和类型混乱的问题。远程攻击者可诱使目标用户开启包含特制内容的PDF档案、网页、Flash 档案或含Flash内容的文件来攻击这些漏洞。
受影响的系统:
- Adobe Flash Player Desktop Runtime ( Windows 及 Macintosh) 24.0.0.186 和之前版本
- Adobe Flash Player ( Google Chrome) 24.0.0.186 和之前版本
- Adobe Flash Player ( Microsoft Edge及Internet Explorer 11) 24.0.0.186 和之前版本
- Adobe Acrobat DC/Acrobat Reader DC Continuous 15.020.20042 和之前版本
- Adobe Acrobat DC/Acrobat Reader DC Classic 15.006.30244 和之前版本
- Adobe Acrobat/Reader XI 11.0.18和之前版本
影响:
成功利用这些漏洞可以执行程序代码、泄漏信息、绕过保安限制或可能控制受影响的系统。
建议:
更新 Adobe Flash Player 和 Adobe Acrobat及Reader至以下版本以应对以上问题。更新可透过产品本身的自动更新装置或下列网址更新其软件:
- Adobe Flash Player Desktop Runtime 24.0.0.194 for Windows and Macintosh
http://www.adobe.com/go/getflash
http://www.adobe.com/products/players/flash-player-distribution.html
- Adobe Flash Player 24.0.0.194 for Google Chrome
http://googlechromereleases.blogspot.com/
- Adobe Flash Player 24.0.0.194 for Microsoft Edge and Internet Explorer 11
https://technet.microsoft.com/library/security/MS17-003
- Adobe Flash Player 24.0.0.194 for Linux
http://www.adobe.com/go/getflash
- Adobe Acrobat DC Continuous 15.023.20053, Classic 15.006.30279, Acrobat XI 11.0.19
http://www.adobe.com/support/downloads/product.jsp?product=1&platform=Windows
http://www.adobe.com/support/downloads/product.jsp?product=1&platform=Mac
- Adobe Acrobat Reader DC Classic 15.006.30279, Reader XI 11.0.19
http://www.adobe.com/support/downloads/product.jsp?product=10&platform=Windows
http://www.adobe.com/support/downloads/product.jsp?product=10&platform=Mac
- Adobe Acrobat Reader DC Continuous 15.023.20053
http://get.adobe.com/reader/
若安装了多个浏览器,系统中每个浏览器均须更新。Adobe Flash Player 的版本可在以下网址确认:
http://www.adobe.com/software/flash/about/
进一步信息:
https://helpx.adobe.com/security/products/acrobat/apsb17-01.html
https://helpx.adobe.com/security/products/flash-player/apsb17-02.html
https://support.microsoft.com/en-us/kb/3214628
https://www.hkcert.org/my_url/en/alert/17011102
https://www.us-cert.gov/ncas/current-activity/2017/01/10/Adobe-Releases-Security-Updates
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2925 (to CVE2017-2928)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2930 (to CVE2017-2967)