The host is installed with Adobe Reader 9.x through 9.5.3, Adobe Reader or Acrobat 10.x through 10.1.5 or 11.x through 11.0.1 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted PDF document. Successful exploitation allows attackers to execute arbitrary code.