The host is installed with Adobe Reader or Acrobat and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application which fails in properly handling the memory. Successful exploitation allows remote attacker to execute arbitrary code.