Improper input validation in Adobe Reader and Adobe Acrobat - CVE-2010-3625
Published: January 5, 2017
Adobe Reader
Adobe Acrobat
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error when processing PDF protocol handlers. A remote attacker can create a specially crafted URI, trick the victim into clicking on it and execute arbitrary commands on vulnerable system.
Successful exploitation of the vulnerability results in compromise of vulnerable system.