The host is installed with Adobe Reader 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 and is prone to arbitrary code execution vulnerability. A flaw is present in the applications, which causes memory corruptions while processing malformed contents within a PDF document. Successful exploitation allows remote attackers to inject scripting code, or execute arbitrary commands by tricking ...