Adobe Inc Released Acrobat DC Reader v For Windows Clients OS & Windows Server OS ON On 05th May 2020, Adobe inc released acrobat DC reader v, this version is offline installer its size 170.39MB. Feb 22, 2019 As a wild guess, there are many tens of thousands of enterprise users that access the ftp site. It contains most of Adobe's products for all versions since the beginning of Adobe-time. If it was down, the forum would be flooded with posts.
![Adobe acrobat ftp site Adobe acrobat ftp site](/uploads/1/2/6/4/126450128/766037344.jpg)
Security Updates Available for Adobe Acrobat and Reader | APSB20-48
Bulletin ID | Date Published | Priority |
---|---|---|
APSB20-48 | August 11, 2020 | 2 |
Adobe has released security updates for Adobe Acrobat and Reader for Windows and macOS. These updates address critical and important vulnerabilities. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Product | Track | Affected Versions | Platform |
---|---|---|---|
Acrobat DC | Continuous | 2020.009.20074 and earlier versions | Windows & macOS |
Acrobat Reader DC | Continuous | 2020.009.20074 and earlier versions | Windows & macOS |
Acrobat 2020 | Classic 2020 | 2020.001.30002 | Windows & macOS |
Acrobat Reader 2020 | Classic 2020 | 2020.001.30002 | Windows & macOS |
Acrobat 2017 | Classic 2017 | 2017.011.30171 and earlier versions | Windows & macOS |
Acrobat Reader 2017 | Classic 2017 | 2017.011.30171 and earlier versions | Windows & macOS |
Acrobat 2015 | Classic 2015 | 2015.006.30523 and earlier versions | Windows & macOS |
Acrobat Reader 2015 | Classic 2015 | 2015.006.30523 and earlier versions | Windows & macOS |
Adobe recommends users update their software installations to the latest versions by following the instructions below.
The latest product versions are available to end users via one of the following methods:
- Users can update their product installations manually by choosing Help > Check for Updates.
- The products will update automatically, without requiring user intervention, when updates are detected.
- The full Acrobat Reader installer can be downloaded from the Acrobat Reader Download Center.
For IT administrators (managed environments):
- Download the enterprise installers from ftp://ftp.adobe.com/pub/adobe/, or refer to the specific release note version for links to installers.
- Install updates via your preferred methodology, such as AIP-GPO, bootstrapper, SCUP/SCCM (Windows), or on macOS, Apple Remote Desktop and SSH.
Adobe categorizes these updates with the following priority ratings and recommends users update their installation to the newest version:
Product | Track | Updated Versions | Platform | Priority Rating | Availability |
---|---|---|---|---|---|
Acrobat DC | Continuous | 2020.012.20041 | Windows and macOS | 2 | |
Acrobat Reader DC | Continuous | 2020.012.20041 | Windows and macOS | 2 | macOS |
Acrobat 2020 | Classic 2020 | 2020.001.30005 | Windows and macOS | 2 | |
Acrobat Reader 2020 | Classic 2020 | 2020.001.30005 | Windows and macOS | 2 | macOS |
Acrobat 2017 | Classic 2017 | 2017.011.30175 | Windows and macOS | 2 | macOS |
Acrobat Reader 2017 | Classic 2017 | 2017.011.30175 | Windows and macOS | 2 | macOS |
Acrobat 2015 | Classic 2015 | 2015.006.30527 | Windows and macOS | 2 | macOS |
Acrobat Reader 2015 | Classic 2015 | 2015.006.30527 | Windows and macOS | 2 | macOS |
Vulnerability Category | Vulnerability Impact | Severity | CVE Number |
---|---|---|---|
Disclosure of Sensitive Data | Memory Leak | Important | CVE-2020-9697 |
Security bypass | Privilege Escalation | Important | CVE-2020-9714 |
Out-of-bounds write | Arbitrary Code Execution | Critical | CVE-2020-9693 CVE-2020-9694 |
Security bypass | Security feature bypass | Critical | CVE-2020-9696 CVE-2020-9712 |
Stack exhaustion | Application denial-of-service | Important | CVE-2020-9702 CVE-2020-9703 |
Out-of-bounds read | Information disclosure | Important | CVE-2020-9723 CVE-2020-9705 CVE-2020-9706 CVE-2020-9707 CVE-2020-9710 CVE-2020-9716 CVE-2020-9717 CVE-2020-9718 CVE-2020-9719 CVE-2020-9720 CVE-2020-9721 |
Buffer error | Arbitrary Code Execution | Critical | CVE-2020-9698 CVE-2020-9699 CVE-2020-9700 CVE-2020-9701 CVE-2020-9704 |
Use-after-free | Arbitrary Code Execution | Critical | CVE-2020-9715 CVE-2020-9722 |
Memory corruption | Arbitrary Code Execution | Critical | CVE-2020-9713 CVE-2020-9695 |
Memory corruption | Information disclosure | Important | CVE-2020-9711 |
Adobe would like to thank the following individuals and organizations for reporting the relevant issues and for working with Adobe to help protect our customers:
- Anonymous working with Trend Micro Zero Day Initiative (CVE-2020-9693, CVE-2020-9694)
- Steven Seeley of Qihoo 360 Vulcan Team (CVE-2020-9723)
- Abdul-Aziz Hariri of Trend Micro Zero Day Initiative (CVE-2020-9697, CVE-2020-9706, CVE-2020-9707, CVE-2020-9710, CVE-2020-9712)
- Csaba Fitzl (@theevilbit) from Offensive Security working with iDefense Labs (CVE-2020-9714)
- Kyle Martin from North Carolina State University, Sung Ta Dinh from Arizona State University, Haehyun Cho from Arizona State University, Ruoyu 'Fish' Wang from Arizona State University, Alexandros Kapravelos from North Carolina State University and Yan Shoshitaishvili from Arizona State University (CVE-2020-9722)
- Ken Hsu of Palo Alto Networks. (CVE-2020-9695)
- Zhangqing, Zhiyuan Wang and willJ from cdsrc of Qihoo 360 (CVE-2020-9716, CVE-2020-9717, CVE-2020-9718, CVE-2020-9719, CVE-2020-9720, CVE-2020-9721)
- Mark Vincent Yason (@MarkYason) working with Trend Micro Zero Day Initiative (CVE-2020-9715)
- Xinyu Wan, Yiwei Zhang and Wei You from Renmin University of China (CVE-2020-9705, CVE-2020-9711, CVE-2020-9713)
- Xu Peng from TCA/SKLCS Institute of Software Chinese Academy of Sciences and Wang Yanhao from QiAnXin Technology Research Institute (CVE-2020-9698, CVE-2020-9699, CVE-2020-9700, CVE-2020-9701, CVE-2020-9702, CVE-2020-9703, CVE-2020-9704)
- Yuebin Sun(@yuebinsun) of Tencent Security Xuanwu Lab (CVE-2020-9696)
August 25, 2020: Updated acknowledgement for CVE-2020-9722.
August 28, 2020: Included details about CVE-2020-9713, CVE-2020-9695, CVE-2020-9711.
Adobe Acrobat 및 Reader에 대한 보안 게시판 | APSB19-02
Adobe는 Windows와 MacOS용 Adobe Acrobat 및 Reader 보안 업데이트를 발표했습니다. 이러한 업데이트는 공격 성공으로 인해 현재 사용자의 컨텍스트에서 임의 코드가 실행될 수 있는 치명적인 취약성을 해결합니다.
제품 | 추적 | 해당하는 버전 | 플랫폼 |
---|---|---|---|
Acrobat DC | Continuous | 2019.010.20064 및 이전 버전 | Windows 및 macOS |
Acrobat Reader DC | Continuous | 2019.010.20064 및 이전 버전 | Windows 및 macOS |
Acrobat 2017 | Classic 2017 | 2017.011.30110 이전 버전 | Windows 및 macOS |
Acrobat Reader 2017 | Classic 2017 | 2017.011.30110 이전 버전 | Windows 및 macOS |
Acrobat DC | Classic 2015 | 2015.006.30461 및 이전 버전 | Windows 및 macOS |
Acrobat Reader DC | Classic 2015 | 2015.006.30461 및 이전 버전 | Windows 및 macOS |
아래 지침에 따라 소프트웨어 설치를 최신 버전으로 업데이트하는 것이 좋습니다.
최종 사용자는 다음 방법 중 하나로 최신 제품 버전을 사용할 수 있습니다.
최종 사용자는 다음 방법 중 하나로 최신 제품 버전을 사용할 수 있습니다.
- 사용자는 [도움말] > [업데이트 확인]을 선택하여 수동으로 제품 설치를 업데이트할 수 있습니다.
- 업데이트가 감지되면 사용자가 개입하지 않아도 제품이 자동으로 업데이트됩니다.
Adobe Ftp Download Site
IT 관리자의 경우(관리 환경):
Ftp Ftp Adobe Com Pub Adobe Reader Windows 7
- ftp://ftp.adobe.com/pub/adobe/에서 엔터프라이즈 설치 프로그램을 다운로드하거나, 특정 릴리스 노트 버전을 참조하여 설치 프로그램 링크를 찾으십시오.
- AIP-GPO, bootstrapper, SCUP/SCCM(Windows) 또는 Apple Remote Desktop 및 SSH(macOS) 등과 같은 선호하는 방법을 통해 업데이트를 설치하십시오.
Win Ftp //ftp.adobe.com/pub/adobe/reader/win/9.x/9.0/misc/
Adobe는 이러한 업데이트를 다음과 같은 우선 순위 등급으로 분류하고 사용자가 최신 버전으로 업데이트할 것을 권장합니다.
제품 | 추적 | 업데이트된 버전 | 플랫폼 | 우선 순위 등급 | 사용 가능성 |
---|---|---|---|---|---|
Acrobat DC | Continuous | 2019.010.20069 | Windows 및 macOS | 2 | Windows macOS |
Acrobat Reader DC | Continuous | 2019.010.20069 | Windows 및 macOS | 2 | Windows macOS |
Acrobat 2017 | Classic 2017 | 2017.011.30113 | Windows 및 macOS | 2 | Windows macOS |
Acrobat Reader DC 2017 | Classic 2017 | 2017.011.30113 | Windows 및 macOS | 2 | Windows macOS |
Acrobat DC | Classic 2015 | 2015.006.30464 | Windows 및 macOS | 2 | Windows macOS |
Acrobat Reader DC | Classic 2015 | 2015.006.30464 | Windows 및 macOS | 2 | Windows macOS |
취약성 카테고리 | 취약성 영향 | 심각도 | CVE 번호 |
---|---|---|---|
무료 평가판 이후 사용 | 임의 코드 실행 | 치명적 | CVE-2018-16011 |
보안 우회 | 권한 문제 제기 | 치명적 | CVE-2018-16018 |
유형 혼란 | 임의 코드 실행 | 중요 | CVE-2019-7131 |
Adobe는 관련 문제를 보고하여 Adobe 고객의 보안 유지에 도움을 주신 다음 분들께 감사의 말씀을 전합니다.
- Trend Micro Zero Day Initiative와 협력하는 Sebastian Apelt (@bitshifter123)(CVE-2018-16011)
- Trend Micro Zero Day Initiative와 협력하는 Abdul Aziz Hariri(CVE-2018-16018)
- Trend Micro Zero Day Initiative와 협력하는 Source Incite의 Steven Seeley(mr_me)(CVE-2019-7131)
Adobe Reader Ftp Download
2019년 1월 3일: CVE-2018-19725가 CVE-2018-16018로 대체되었습니다.
![Adobe Adobe](/uploads/1/2/6/4/126450128/321296435.jpg)
2019년 4월 1일: CVE-2019-7131에 대한 참조가 추가되었습니다.