描述:
有關 Adobe Reader 及 Acrobat 的安全更新已發布,以應對數個漏洞。遠端攻擊者可誘使目標用戶開啓特製的PDF檔案來攻擊這些漏洞。
受影響的系統:
- Acrobat DC (Windows) Continuous 2021.005.20060 和之前版本
- Acrobat Reader DC (Windows) Continuous 2021.005.20060 和之前版本
- Acrobat DC (macOS) Continuous 2021.005.20058 和之前版本
- Acrobat Reader DC (macOS) Continuous 2021.005.20058 和之前版本
- Acrobat 2020 (Windows 及 macOS) Classic 2020 2020.004.30006 和之前版本
- Acrobat Reader 2020 (Windows 及 macOS) Classic 2020 2020.004.30006 和之前版本
- Acrobat 2017 (Windows 及 macOS) Classic 2017 2017.011.30199 和之前版本
- Acrobat Reader 2017 (Windows 及 macOS) Classic 2017 2017.011.30199 和之前版本
影響:
成功利用這些漏洞可在受影響的系統導致執行任意程式碼、服務受阻斷或泄漏資訊。
建議:
受影響系統的用戶應更新 Adobe Reader 及 Acrobat 至以下版本以應對以上問題。更新可透過產品本身的自動更新機制或下列網址更新其軟件:
- Acrobat DC (Windows 及 macOS) Continuous 2021.007.20091
https://www.adobe.com/devnet-docs/acrobatetk/tools/ReleaseNotesDC/index.html#continuous-track
- Acrobat Reader DC (Windows 及 macOS) Continuous 2021.007.20091
https://www.adobe.com/devnet-docs/acrobatetk/tools/ReleaseNotesDC/index.html#continuous-track
- Acrobat 2020 (Windows 及 macOS) Classic 2020 2020.004.30015
https://www.adobe.com/devnet-docs/acrobatetk/tools/ReleaseNotesDC/index.html#classic-track
- Acrobat Reader 2020 (Windows 及 macOS) Classic 2020 2020.004.30015
https://www.adobe.com/devnet-docs/acrobatetk/tools/ReleaseNotesDC/index.html#classic-track
- Acrobat 2017 (Windows 及 macOS) Classic 2017 2017.011.30202
https://www.adobe.com/devnet-docs/acrobatetk/tools/ReleaseNotesDC/index.html#id3
- Acrobat Reader 2017 (Windows 及 macOS) Classic 2017 2017.011.30202
https://www.adobe.com/devnet-docs/acrobatetk/tools/ReleaseNotesDC/index.html#id3
進一步資訊:
- https://helpx.adobe.com/security/products/acrobat/apsb21-55.html
- https://www.hkcert.org/tc/security-bulletin/adobe-monthly-security-update-september-2021
- https://us-cert.cisa.gov/ncas/current-activity/2021/09/14/adobe-releases-security-updates-multiple-products
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35982
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39836 (to CVE-2021-39846)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39849 (to CVE-2021-39861)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39863