Adobe Reader and Acrobat COM Objects Memory Corruption Remote Code Execution Vulnerability

To exploit this issue, an attacker must entice an unsuspecting user into visiting a malicious webpage or opening a specially crafted PDF file.

The following proof-of-concept files are available:


 

Privacy Statement
Copyright 2010, SecurityFocus