The host is installed with Adobe Reader 7 or Acrobat 7 before 7.1.3, Adobe Reader 8 or Acrobat 8 before 8.1.6, or Adobe Reader 9 or Acrobat 9 before 9.1.2 and is prone to heap-based buffer overflow vulnerability. The flaw is present in the JBIG2 filter, which fails to handle the unspecified vectors. Successful exploitation allows remote attackers to execute arbitrary code.