The host is installed with Adobe Reader before 8.1.7 or 9.x before 9.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly validate input. Successful exploitation could allow attackers to execute arbitrary code.