The host is installed with Adobe Reader 8.x through 8.2.4 or 9.x through 9.3.4 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows remote attackers to execute arbitrary code.