描述:
Adobe 發布了修補程式,以應對 Adobe Reader 及 Acrobat 的多個漏洞。遠端攻擊者可誘使目標用戶開啓特製的 PDF 檔案來攻擊漏洞。
受影響的系統:
- Acrobat DC (Windows) Continuous 24.002.20991 和之前版本
- Acrobat DC (macOS) Continuous 24.002.20964 和之前版本
- Acrobat Reader DC (Windows) Continuous 24.002.20991 和之前版本
- Acrobat Reader DC (macOS) Continuous 24.002.20964 和之前版本
- Acrobat 2024 (Windows 及 macOS) Classic 2024 24.001.30123 和之前版本
- Acrobat 2020 (Windows) Classic 2020 20.005.30636 和之前版本
- Acrobat 2020 (macOS) Classic 2020 20.005.30635 和之前版本
- Acrobat Reader 2020 (Windows) Classic 2020 20.005.30636 和之前版本
- Acrobat Reader 2020 (macOS) Classic 2020 20.005.30635 和之前版本
影響:
成功利用漏洞可以在受影響的系統導致遠端執行程式碼、泄漏資訊或權限提升。
建議:
受影響系統的用戶應更新 Adobe Reader 及 Acrobat 至下列版本以應對以上問題。更新可透過產品本身的自動更新或從下列網址下載:
- Acrobat DC (Windows 及 macOS) Continuous 24.002.21005
https://www.adobe.com/devnet-docs/acrobatetk/tools/ReleaseNotesDC/index.html#continuous-track
- Acrobat Reader DC (Windows 及 macOS) Continuous 24.002.21005
https://www.adobe.com/devnet-docs/acrobatetk/tools/ReleaseNotesDC/index.html#continuous-track
- Acrobat 2024 (Windows 及 macOS) Classic 2024 24.001.30159
https://www.adobe.com/devnet-docs/acrobatetk/tools/ReleaseNotesDC/index.html#acrobat-classic-track
- Acrobat 2020 (Windows 及 macOS) Classic 2020 20.005.30655
https://www.adobe.com/devnet-docs/acrobatetk/tools/ReleaseNotesDC/index.html#classic-track
- Acrobat Reader 2020 (Windows 及 macOS) Classic 2020 20.005.30655
https://www.adobe.com/devnet-docs/acrobatetk/tools/ReleaseNotesDC/index.html#classic-track
進一步資訊:
- https://helpx.adobe.com/security/products/acrobat/apsb24-57.html
- https://www.hkcert.org/tc/security-bulletin/adobe-monthly-security-update-august-2024
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39383
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39422 (to CVE-2024-39426)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41830 (to CVE-2024-41835)