info
discussion
exploit
solution
references
Sumatra PDF Multiple Memory Corruption Vulnerabilities
The researcher has created a proof-of-concept. Please see the references for more information.
Privacy Statement
Copyright 2010, SecurityFocus