Security Updates Available for Adobe Acrobat and Reader
Release date: January 5, 2017
Last updated: January 10, 2017
Vulnerability identifier: APSB17-01
Priority: 2
CVE numbers: CVE-2017-2939, CVE-2017-2940, CVE-2017-2941, CVE-2017-2942, CVE-2017-2943, CVE-2017-2944, CVE-2017-2945, CVE-2017-2946, CVE-2017-2947, CVE-2017-2948, CVE-2017-2949, CVE-2017-2950, CVE-2017-2951, CVE-2017-2952, CVE-2017-2953, CVE-2017-2954, CVE-2017-2955, CVE-2017-2956, CVE-2017-2957, CVE-2017-2958, CVE-2017-2959, CVE-2017-2960, CVE-2017-2961, CVE-2017-2962, CVE-2017-2963, CVE-2017-2964, CVE-2017-2965, CVE-2017-2966, CVE-2017-2967
Platform: Windows and Macintosh
Adobe has released security updates for Adobe Acrobat and Reader for Windows and Macintosh. These updates address critical vulnerabilities that could potentially allow an attacker to take control of the affected system.
Product | Track | Affected Versions | Platform |
---|---|---|---|
Acrobat DC | Continuous | 15.020.20042 and earlier versions | Windows and Macintosh |
Acrobat Reader DC | Continuous | 15.020.20042 and earlier versions | Windows and Macintosh |
Acrobat DC | Classic | 15.006.30244 and earlier versions | Windows and Macintosh |
Acrobat Reader DC | Classic | 15.006.30244 and earlier versions | Windows and Macintosh |
Acrobat XI | Desktop | 11.0.18 and earlier versions | Windows and Macintosh |
Reader XI | Desktop | 11.0.18 and earlier versions | Windows and Macintosh |
For questions regarding Acrobat DC, please visit the Acrobat DC FAQ page. For questions regarding Acrobat Reader DC, please visit the Acrobat Reader DC FAQ page.
Adobe recommends users update their software installations to the latest versions by following the instructions below.
The latest product versions are available to end users via one of the following methods:
- Users can update their product installations manually by choosing Help > Check for Updates.
- The products will update automatically, without requiring user intervention, when updates are detected.
- The full Acrobat Reader installer can be downloaded from the Acrobat Reader Download Center.
For IT administrators (managed environments):
- Download the enterprise installers from ftp://ftp.adobe.com/pub/adobe/, or refer to the specific release note version for links to installers.
- Install updates via your preferred methodology, such as AIP-GPO, bootstrapper, SCUP/SCCM (Windows), or on Macintosh, Apple Remote Desktop and SSH.
Adobe categorizes these updates with the following priority ratings and recommends users update their installation to the newest version:
Product | Track | Updated Versions | Platform | Priority Rating | Availability |
---|---|---|---|---|---|
Acrobat DC | Continuous | 15.023.20053 | Windows and Macintosh | 2 | WindowsMacintosh |
Acrobat Reader DC | Continuous | 15.023.20053 | Windows and Macintosh | 2 | Download Center |
Acrobat DC | Classic | 15.006.30279 | Windows and Macintosh | 2 | WindowsMacintosh |
Acrobat Reader DC | Classic | 15.006.30279 | Windows and Macintosh | 2 | WindowsMacintosh |
Acrobat XI | Desktop | 11.0.19 | Windows and Macintosh | 2 | WindowsMacintosh |
Reader XI | Desktop | 11.0.19 | Windows and Macintosh | 2 | WindowsMacintosh |
- These updates resolve a type confusion vulnerability that could lead to code execution (CVE-2017-2962).
- These updates resolve use-after-free vulnerabilities that could lead to code execution (CVE-2017-2950, CVE-2017-2951, CVE-2017-2955, CVE-2017-2956, CVE-2017-2957, CVE-2017-2958, CVE-2017-2961).
- These updates resolve heap buffer overflow vulnerabilities that could lead to code execution (CVE-2017-2942, CVE-2017-2945, CVE-2017-2946, CVE-2017-2949, CVE-2017-2959, CVE-2017-2966).
- These updates resolve buffer overflow vulnerabilities that could lead to code execution (CVE-2017-2948, CVE-2017-2952).
- These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2017-2939, CVE-2017-2940, CVE-2017-2941, CVE-2017-2943, CVE-2017-2944, CVE-2017-2953, CVE-2017-2954, CVE-2017-2960, CVE-2017-2963, CVE-2017-2964, CVE-2017-2965, CVE-2017-2967).
- These updates resolve a security bypass vulnerability (CVE-2017-2947).
Adobe would like to thank the following individuals and organizations for reporting the relevant issues and for working with Adobe to help protect our customers:
- Jaanus Kääp of Clarified Security (CVE-2017-2939)
- kelvinwang of Tencent PC Manager (CVE-2017-2955, CVE-2017-2956, CVE-2017-2957, CVE-2017-2958)
- Steven Seeley of Source Incite working with Trend Micro's Zero Day Initiative and Kushal Arvind Shah of Fortinet's FortiGuard Labs (CVE-2017-2946)
- Sebastian Apelt (siberas) working with Trend Micro's Zero Day Initiative (CVE-2017-2961, CVE-2017-2967)
- Ke Liu of Tencent's Xuanwu LAB (CVE-2017-2940, CVE-2017-2942, CVE-2017-2943, CVE-2017-2944, CVE-2017-2945, CVE-2017-2952, CVE-2017-2953, CVE-2017-2954)
- kdot working with Trend Micro's Zero Day Initiative (CVE-2017-2941)
- Nicolas Grgoire (Agarri) working with Trend Micro's Zero Day Initiative (CVE-2017-2962)
- Nicolas Grégoire - Agarri working with iDefense Vulnerability Contributor Program (CVE-2017-2948)
- Anonymous working with Trend Micro's Zero Day Initiative (CVE-2017-2950, CVE-2017-2951)
- Ke Liu of Tencent's Xuanwu LAB working with Trend Micro's Zero Day Initiative (CVE-2017-2959, CVE-2017-2960, CVE-2017-2963, CVE-2017-2964, CVE-2017-2965, CVE-2017-2966)
- Wei Lei and Liu Yang of Nanyang Technological University and Anonymous working with Trend Micro's Zero Day Initiative (CVE-2017-2949)
- Alex Inführ of Cure53.de (CVE-2017-2947)
'취약점 정보2' 카테고리의 다른 글
Adobe Flash Player 신규 취약점 보안 업데이트 권고 (0) | 2017.01.12 |
---|---|
Adobe Flash Player update (0) | 2017.01.12 |
MS 1월 보안 위협에 따른 정기 보안 업데이트 권고 (0) | 2017.01.11 |
MongoDB의 취약한 인증을 통한 랜섬웨어 공격 주의 (0) | 2017.01.11 |
VNC라이브러리 업데이트 권고 (0) | 2017.01.10 |