The host is installed with Adobe Reader or Acrobat and is prone to memory corruption vulnerability. A flaw is present in the application which fails to properly handle the memory. Successful exploitation allows remote attacker to cause denial of service condition.