The host is installed with Adobe Reader 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 and is prone to input validation vulnerability. A flaw is present in the applications, which fails to properly perform input validation. Successful exploitation allows remote attackers to execute arbitrary code using a crafted 3D file.