描述:
Adobe 发布了安全更新,以应对於 Adobe Reader 及 Acrobat 的多个漏洞。远端攻击者可诱使目标用户开啓特製的 PDF 档案来攻击漏洞。
受影响的系统:
- Acrobat DC (Windows 及 macOS) Continuous 22.001.20142 和之前版本
- Acrobat Reader DC (Windows 及 macOS) Continuous 22.001.20142 和之前版本
- Acrobat 2020 (Windows) Classic 2020 20.005.30334 和之前版本
- Acrobat Reader 2020 (Windows) Classic 2020 20.005.30334 和之前版本
- Acrobat 2020 (macOS) Classic 2020 20.005.30331 和之前版本
- Acrobat Reader 2020 (macOS) Classic 2020 20.005.30331 和之前版本
- Acrobat 2017 (Windows) Classic 2017 17.012.30229 和之前版本
- Acrobat Reader 2017 (Windows) Classic 2017 17.012.30229 和之前版本
- Acrobat 2017 (macOS) Classic 2017 17.012.30227 和之前版本
- Acrobat Reader 2017 (macOS) Classic 2017 17.012.30227 和之前版本
影响:
成功利用漏洞可以在受影响的系统导致执行任意程式码及记忆体泄漏。
建议:
受影响系统的用户应更新Adobe Reader 及 Acrobat至下列版本以应对以上问题。更新可透过产品本身的自动更新或从下列网址下载:
- Acrobat DC (Windows 及 macOS) Continuous 22.001.20169
https://www.adobe.com/devnet-docs/acrobatetk/tools/ReleaseNotesDC/index.html#continuous-track
- Acrobat Reader DC (Windows 及 macOS) Continuous 22.001.20169
https://www.adobe.com/devnet-docs/acrobatetk/tools/ReleaseNotesDC/index.html#continuous-track
- Acrobat 2020 (Windows 及 macOS) Classic 2020 20.005.30362
https://www.adobe.com/devnet-docs/acrobatetk/tools/ReleaseNotesDC/index.html#classic-track
- Acrobat Reader 2020 (Windows 及 macOS) Classic 2020 20.005.30362
https://www.adobe.com/devnet-docs/acrobatetk/tools/ReleaseNotesDC/index.html#classic-track
- Acrobat 2017 (Windows 及 macOS) Classic 2017 17.012.30249
https://www.adobe.com/devnet-docs/acrobatetk/tools/ReleaseNotesDC/index.html#id3
- Acrobat Reader 2017 (Windows 及 macOS) Classic 2017 17.012.30249
https://www.adobe.com/devnet-docs/acrobatetk/tools/ReleaseNotesDC/index.html#id3
进一步信息:
- https://helpx.adobe.com/security/products/acrobat/apsb22-32.html
- https://www.hkcert.org/tc/security-bulletin/adobe-monthly-security-update-july-2022
- https://www.cisa.gov/uscert/ncas/current-activity/2022/07/12/adobe-releases-security-updates-multiple-products
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34215 (to CVE-2022-34217)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34219 (to CVE-2022-34230)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34232 (to CVE-2022-34234)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34236 (to CVE-2022-34239)