The host is installed with Adobe Reader or Acrobat 7.x before 7.1.3, 8.x before 8.1.6 or 9.x before 9.1.2 and is prone to an unspecified vulnerability. The flaw is present in the Application, which fails to handle unspecified vectors that trigger memory corruption. Successful exploitation allows remote attackers to execute arbitrary code.