which
could be exploited by attackers to execute arbitrary scripting code,
cause a denial of service, or potentially take complete control of an
affected system.
The first issue is due to input validation errors in the browser plugin
when handling arguments passed to certain parameters (e.g. "FDF",
"XML", or "XFDF"), which could be exploited by malicious people to
conduct cross site scripting, request redirection, and HTTP response
splitting attacks in the security context of a Web site hosting a PDF
file by tricking a user into visiting a specially crafted URL.
The second vulnerability is due to a double free error in the web
plugin when handling malformed parameters (e.g. "FDF") passed to a PDF
document, which could be exploited by attackers to crash a vulnerable
browser or execute arbitrary commands by convincing a user to follow a
specially crafted URL using Firefox.
The third issue is due to an error in the web plugin when handling an
overly long sequence of hash characters appended to a PDF URL loaded
via Internet Explorer, which could be exploited by attackers to exhaust
all available memory resources, creating a denial of service condition.
Affected Products
Adobe Acrobat Reader version 7.0.8 and prior
Solution
Upgrade to Adobe Reader version 8.0.0 :
http://www.adobe.com/products/acrobat/readstep2.html