The host is installed with Adobe Reader 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6t and is prone to remote code execution vulnerability. A flaw is present in the applications, which causes memory corruptions while parsing images. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service using a crafted image.