A memory corruption in certain versions of Adobe Acrobat and Adobe Reader (formerly known as Adobe Acrobat Reader)
can be triggered by a specially-crafted PDF file. This vulnerability can be exploited reliably and with minimal
user interaction to take complete control over the affected systems. A user who views such a PDF file in their
browser or who even browses to a Windows folder containing such a file can be exploited.
The vulnerability is caused by a defect in how Adobe Reader interprets JBIG2 image streams embedded within