一、情况分析
Adobe近日公布在Windows和macOS版本的Acrobat DC、Acrobat Reader DC、Acrobat 2020、Acrobat Reader 2020、Acrobat 2017和Acrobat Reader 2017中修复了14个安全漏洞。其中三个漏洞被评为严重级别,它们是由释放后使用、基于堆的缓冲区溢出和越界写入错误引起的。
14个安全漏洞详细信息如下:
Vulnerability Category  | Vulnerability Impact  | Severity  | CVE Number  | 
Heap-based buffer overflow  | Arbitrary Code Execution  | Critical  | CVE-2020-24435  | 
Improper access control  | Local privilege escalation  | Important  | CVE-2020-24433  | 
Improper input validation  | Arbitrary JavaScript Execution  | Important  | CVE-2020-24432  | 
Signature validation bypass  | Minimal (defense-in-depth fix)  | Moderate  | CVE-2020-24439  | 
Signature verification bypass  | Local privilege escalation  | Important  | CVE-2020-24429  | 
Improper input validation  | Information Disclosure  | Important  | CVE-2020-24427  | 
Security feature bypass  | Dynamic library injection  | Important  | CVE-2020-24431  | 
Out-of-bounds write  | Arbitrary Code Execution  | Critical  | CVE-2020-24436  | 
Out-of-bounds read  | Information Disclosure  | Moderate  | CVE-2020-24426 CVE-2020-24434  | 
Race Condition  | Local privilege escalation  | Important  | CVE-2020-24428  | 
Use-after-free  | Arbitrary Code Execution  | Critical  | CVE-2020-24430 CVE-2020-24437  | 
Use-after-free  | Information Disclosure  | Moderate  | CVE-2020-24438  | 
产品  | 版本  | 系统  | 
Acrobat DC  | Windows & macOS  | |
Acrobat Reader DC  | 2020.012.20048 及之前  | Windows & macOS  | 
Acrobat 2020  | 2020.001.30005及之前  | Windows & macOS  | 
Acrobat Reader 2020  | 2020.001.30005及之前  | Windows & macOS  | 
Acrobat 2017  | 2017.011.30175及之前  | Windows & macOS  | 
Acrobat Reader 2017  | 2017.011.30175及之前  | Windows & macOS  | 
三、处置建议
目前厂商已发布升级补丁以修复漏洞。
1、用户可以通过产品界面帮助,点击自动获取更新;
2、可以通过如下地址下载最新版本产品:
https://get2.adobe.com/cn/reader/