The host is installed with Adobe Reader or Acrobat and is prone to denial of service vulnerability. A flaw is present in the application which fails to properly handle the memory. Successful exploitation allows remote attacker to execute arbitrary code.