The host is installed with Adobe Reader or Acrobat 8.x before 8.1.2 or 7.x before 7.1.0 and is prone to multiple unspecified vulnerabilities. The flaws are present in the applications, which fails to handle the specially crafted file. Successful exploitation allows remote attackers to silently print the specially crafted file arbitrary number of times.